From 404d57c10cfc497ff0c5cff5ce898e441d66a25e Mon Sep 17 00:00:00 2001 From: azure-powershell-bot <65331932+azure-powershell-bot@users.noreply.github.com> Date: Tue, 4 Jun 2024 05:27:41 +0000 Subject: [PATCH] Move Network to Az.Network-preview --- src/Network/Network/Az.Network.psd1 | 37 +- ...icationGatewayAuthenticationCertificate.md | 18 +- ...-AzApplicationGatewayBackendAddressPool.md | 17 +- ...-AzApplicationGatewayBackendHttpSetting.md | 17 +- .../Add-AzApplicationGatewayBackendSetting.md | 18 +- .../Add-AzApplicationGatewayCustomError.md | 18 +- ...dd-AzApplicationGatewayFrontendIPConfig.md | 20 +- .../Add-AzApplicationGatewayFrontendPort.md | 17 +- .../Add-AzApplicationGatewayHttpListener.md | 19 +- ...plicationGatewayHttpListenerCustomError.md | 17 +- ...Add-AzApplicationGatewayIPConfiguration.md | 21 +- .../help/Add-AzApplicationGatewayListener.md | 19 +- ...licationGatewayPrivateLinkConfiguration.md | 17 +- .../Add-AzApplicationGatewayProbeConfig.md | 17 +- ...ApplicationGatewayRedirectConfiguration.md | 22 +- ...-AzApplicationGatewayRequestRoutingRule.md | 20 +- .../Add-AzApplicationGatewayRewriteRuleSet.md | 17 +- .../Add-AzApplicationGatewayRoutingRule.md | 20 +- .../Add-AzApplicationGatewaySslCertificate.md | 17 +- .../Add-AzApplicationGatewaySslProfile.md | 17 +- ...licationGatewayTrustedClientCertificate.md | 18 +- ...pplicationGatewayTrustedRootCertificate.md | 18 +- ...dd-AzApplicationGatewayUrlPathMapConfig.md | 24 +- src/Network/Network/help/Add-AzDelegation.md | 17 +- .../Add-AzExpressRouteCircuitAuthorization.md | 17 +- ...d-AzExpressRouteCircuitConnectionConfig.md | 22 +- .../Add-AzExpressRouteCircuitPeeringConfig.md | 23 +- ...dd-AzExpressRouteCrossConnectionPeering.md | 18 +- .../Add-AzExpressRoutePortAuthorization.md | 18 +- ...-AzLoadBalancerBackendAddressPoolConfig.md | 19 +- .../Add-AzLoadBalancerFrontendIpConfig.md | 31 +- .../Add-AzLoadBalancerInboundNatPoolConfig.md | 22 +- .../Add-AzLoadBalancerInboundNatRuleConfig.md | 20 +- .../Add-AzLoadBalancerOutboundRuleConfig.md | 21 +- .../help/Add-AzLoadBalancerProbeConfig.md | 18 +- .../help/Add-AzLoadBalancerRuleConfig.md | 22 +- .../help/Add-AzNetworkInterfaceIpConfig.md | 20 +- .../help/Add-AzNetworkInterfaceTapConfig.md | 23 +- .../help/Add-AzNetworkSecurityRuleConfig.md | 20 +- src/Network/Network/help/Add-AzRouteConfig.md | 19 +- .../help/Add-AzRouteFilterRuleConfig.md | 19 +- .../Network/help/Add-AzRouteServerPeer.md | 22 +- .../Network/help/Add-AzRoutingPolicy.md | 18 +- .../Add-AzServiceEndpointPolicyDefinition.md | 18 +- .../Network/help/Add-AzVirtualHubRoute.md | 18 +- .../help/Add-AzVirtualHubRouteTable.md | 17 +- .../Add-AzVirtualNetworkGatewayIpConfig.md | 21 +- .../help/Add-AzVirtualNetworkPeering.md | 17 +- .../help/Add-AzVirtualNetworkSubnetConfig.md | 21 +- .../Network/help/Add-AzVirtualRouterPeer.md | 19 +- .../help/Add-AzVpnClientRevokedCertificate.md | 17 +- .../help/Add-AzVpnClientRootCertificate.md | 17 +- .../Approve-AzPrivateEndpointConnection.md | 21 +- src/Network/Network/help/Az.Network.md | 110 +- ...zNetworkWatcherClassicConnectionMonitor.md | 48 +- .../help/Deny-AzPrivateEndpointConnection.md | 21 +- .../help/Deploy-AzNetworkManagerCommit.md | 19 +- ...Disconnect-AzP2SVpnGatewayVpnConnection.md | 24 +- ...ct-AzVirtualNetworkGatewayVpnConnection.md | 26 +- .../Network/help/Get-AzApplicationGateway.md | 17 +- ...icationGatewayAuthenticationCertificate.md | 17 +- ...pplicationGatewayAutoscaleConfiguration.md | 17 +- ...GatewayAvailableServerVariableAndHeader.md | 17 +- ...-AzApplicationGatewayAvailableSslOption.md | 18 +- ...AzApplicationGatewayAvailableWafRuleSet.md | 18 +- ...-AzApplicationGatewayBackendAddressPool.md | 17 +- .../Get-AzApplicationGatewayBackendHealth.md | 17 +- ...-AzApplicationGatewayBackendHttpSetting.md | 17 +- .../Get-AzApplicationGatewayBackendSetting.md | 17 +- ...plicationGatewayClientAuthConfiguration.md | 17 +- ...-AzApplicationGatewayConnectionDraining.md | 17 +- .../Get-AzApplicationGatewayCustomError.md | 17 +- .../Get-AzApplicationGatewayFirewallPolicy.md | 17 +- ...et-AzApplicationGatewayFrontendIPConfig.md | 17 +- .../Get-AzApplicationGatewayFrontendPort.md | 17 +- .../Get-AzApplicationGatewayHttpListener.md | 17 +- ...plicationGatewayHttpListenerCustomError.md | 17 +- ...Get-AzApplicationGatewayIPConfiguration.md | 17 +- .../help/Get-AzApplicationGatewayIdentity.md | 17 +- .../help/Get-AzApplicationGatewayListener.md | 17 +- ...licationGatewayPrivateLinkConfiguration.md | 17 +- .../Get-AzApplicationGatewayProbeConfig.md | 17 +- ...ApplicationGatewayRedirectConfiguration.md | 17 +- ...-AzApplicationGatewayRequestRoutingRule.md | 17 +- .../Get-AzApplicationGatewayRewriteRuleSet.md | 17 +- .../Get-AzApplicationGatewayRoutingRule.md | 17 +- .../help/Get-AzApplicationGatewaySku.md | 17 +- .../Get-AzApplicationGatewaySslCertificate.md | 17 +- .../help/Get-AzApplicationGatewaySslPolicy.md | 17 +- ...AzApplicationGatewaySslPredefinedPolicy.md | 17 +- .../Get-AzApplicationGatewaySslProfile.md | 17 +- ...et-AzApplicationGatewaySslProfilePolicy.md | 17 +- ...licationGatewayTrustedClientCertificate.md | 17 +- ...pplicationGatewayTrustedRootCertificate.md | 17 +- ...et-AzApplicationGatewayUrlPathMapConfig.md | 17 +- ...-AzApplicationGatewayWafDynamicManifest.md | 17 +- ...ewayWebApplicationFirewallConfiguration.md | 17 +- .../help/Get-AzApplicationSecurityGroup.md | 17 +- .../Get-AzAutoApprovedPrivateLinkService.md | 17 +- .../Get-AzAvailablePrivateEndpointType.md | 17 +- .../help/Get-AzAvailableServiceAlias.md | 18 +- .../help/Get-AzAvailableServiceDelegation.md | 17 +- src/Network/Network/help/Get-AzBastion.md | 30 +- .../Network/help/Get-AzBgpServiceCommunity.md | 18 +- .../Network/help/Get-AzCustomIpPrefix.md | 20 +- .../Network/help/Get-AzDdosProtectionPlan.md | 17 +- src/Network/Network/help/Get-AzDelegation.md | 17 +- .../Get-AzEffectiveNetworkSecurityGroup.md | 17 +- .../Network/help/Get-AzEffectiveRouteTable.md | 17 +- .../Network/help/Get-AzExpressRouteCircuit.md | 17 +- .../help/Get-AzExpressRouteCircuitARPTable.md | 17 +- .../Get-AzExpressRouteCircuitAuthorization.md | 17 +- ...t-AzExpressRouteCircuitConnectionConfig.md | 17 +- .../Get-AzExpressRouteCircuitPeeringConfig.md | 17 +- .../Get-AzExpressRouteCircuitRouteTable.md | 17 +- ...-AzExpressRouteCircuitRouteTableSummary.md | 17 +- .../help/Get-AzExpressRouteCircuitStat.md | 18 +- .../help/Get-AzExpressRouteConnection.md | 21 +- .../help/Get-AzExpressRouteCrossConnection.md | 17 +- ...t-AzExpressRouteCrossConnectionArpTable.md | 19 +- ...et-AzExpressRouteCrossConnectionPeering.md | 17 +- ...AzExpressRouteCrossConnectionRouteTable.md | 19 +- ...ssRouteCrossConnectionRouteTableSummary.md | 19 +- .../Network/help/Get-AzExpressRouteGateway.md | 23 +- .../Network/help/Get-AzExpressRoutePort.md | 20 +- .../Get-AzExpressRoutePortAuthorization.md | 17 +- .../help/Get-AzExpressRoutePortIdentity.md | 17 +- .../help/Get-AzExpressRoutePortLinkConfig.md | 19 +- .../help/Get-AzExpressRoutePortsLocation.md | 17 +- .../help/Get-AzExpressRouteServiceProvider.md | 18 +- src/Network/Network/help/Get-AzFirewall.md | 17 +- .../Network/help/Get-AzFirewallFqdnTag.md | 18 +- .../help/Get-AzFirewallLearnedIpPrefix.md | 17 +- .../Network/help/Get-AzFirewallPolicy.md | 20 +- ...Get-AzFirewallPolicyRuleCollectionGroup.md | 22 +- .../Network/help/Get-AzIpAllocation.md | 22 +- src/Network/Network/help/Get-AzIpGroup.md | 20 +- .../Network/help/Get-AzLoadBalancer.md | 19 +- ...BackendAddressInboundNatRulePortMapping.md | 23 +- .../Get-AzLoadBalancerBackendAddressPool.md | 21 +- ...-AzLoadBalancerBackendAddressPoolConfig.md | 17 +- .../Get-AzLoadBalancerFrontendIpConfig.md | 17 +- .../Get-AzLoadBalancerInboundNatPoolConfig.md | 17 +- .../Get-AzLoadBalancerInboundNatRuleConfig.md | 17 +- .../Get-AzLoadBalancerOutboundRuleConfig.md | 17 +- .../help/Get-AzLoadBalancerProbeConfig.md | 17 +- .../help/Get-AzLoadBalancerRuleConfig.md | 17 +- .../Network/help/Get-AzLocalNetworkGateway.md | 17 +- src/Network/Network/help/Get-AzNatGateway.md | 23 +- .../Network/help/Get-AzNetworkInterface.md | 29 +- .../help/Get-AzNetworkInterfaceIpConfig.md | 17 +- .../help/Get-AzNetworkInterfaceTapConfig.md | 22 +- .../Network/help/Get-AzNetworkManager.md | 19 +- ...kManagerActiveConnectivityConfiguration.md | 18 +- ...AzNetworkManagerActiveSecurityAdminRule.md | 18 +- ...NetworkManagerConnectivityConfiguration.md | 21 +- .../Get-AzNetworkManagerDeploymentStatus.md | 17 +- ...nagerEffectiveConnectivityConfiguration.md | 17 +- ...etworkManagerEffectiveSecurityAdminRule.md | 17 +- .../Network/help/Get-AzNetworkManagerGroup.md | 19 +- ...NetworkManagerManagementGroupConnection.md | 19 +- .../Get-AzNetworkManagerScopeConnection.md | 19 +- ...etworkManagerSecurityAdminConfiguration.md | 21 +- .../Get-AzNetworkManagerSecurityAdminRule.md | 19 +- ...tworkManagerSecurityAdminRuleCollection.md | 19 +- .../help/Get-AzNetworkManagerStaticMember.md | 21 +- ...-AzNetworkManagerSubscriptionConnection.md | 19 +- .../Network/help/Get-AzNetworkProfile.md | 24 +- .../help/Get-AzNetworkSecurityGroup.md | 117 +- .../help/Get-AzNetworkSecurityPerimeter.md | 116 +- ...et-AzNetworkSecurityPerimeterAccessRule.md | 138 +- ...SecurityPerimeterAssociableResourceType.md | 51 +- ...t-AzNetworkSecurityPerimeterAssociation.md | 118 +- .../Get-AzNetworkSecurityPerimeterLink.md | 105 +- ...AzNetworkSecurityPerimeterLinkReference.md | 105 +- .../Get-AzNetworkSecurityPerimeterProfile.md | 118 +- .../help/Get-AzNetworkSecurityRuleConfig.md | 17 +- .../Network/help/Get-AzNetworkServiceTag.md | 18 +- .../Network/help/Get-AzNetworkUsage.md | 18 +- .../help/Get-AzNetworkVirtualAppliance.md | 19 +- ...Get-AzNetworkVirtualApplianceConnection.md | 22 +- .../help/Get-AzNetworkVirtualApplianceSku.md | 17 +- .../Network/help/Get-AzNetworkWatcher.md | 20 +- .../Get-AzNetworkWatcherConnectionMonitor.md | 23 +- ...AzNetworkWatcherConnectionMonitorReport.md | 26 +- .../help/Get-AzNetworkWatcherFlowLog.md | 23 +- .../help/Get-AzNetworkWatcherFlowLogStatus.md | 22 +- .../help/Get-AzNetworkWatcherNextHop.md | 22 +- .../help/Get-AzNetworkWatcherPacketCapture.md | 22 +- ...NetworkWatcherReachabilityProvidersList.md | 24 +- .../Get-AzNetworkWatcherReachabilityReport.md | 26 +- .../Get-AzNetworkWatcherSecurityGroupView.md | 22 +- .../help/Get-AzNetworkWatcherTopology.md | 22 +- ...t-AzNetworkWatcherTroubleshootingResult.md | 22 +- .../Network/help/Get-AzP2sVpnGateway.md | 20 +- .../Get-AzP2sVpnGatewayConnectionHealth.md | 21 +- ...AzP2sVpnGatewayDetailedConnectionHealth.md | 23 +- .../help/Get-AzP2sVpnGatewayVpnProfile.md | 21 +- .../Network/help/Get-AzPrivateDnsZoneGroup.md | 19 +- .../Network/help/Get-AzPrivateEndpoint.md | 19 +- .../help/Get-AzPrivateEndpointConnection.md | 23 +- .../Network/help/Get-AzPrivateLinkResource.md | 20 +- .../Network/help/Get-AzPrivateLinkService.md | 19 +- .../Network/help/Get-AzPublicIpAddress.md | 24 +- .../Network/help/Get-AzPublicIpPrefix.md | 20 +- src/Network/Network/help/Get-AzRouteConfig.md | 17 +- src/Network/Network/help/Get-AzRouteFilter.md | 19 +- .../help/Get-AzRouteFilterRuleConfig.md | 17 +- src/Network/Network/help/Get-AzRouteMap.md | 21 +- src/Network/Network/help/Get-AzRouteServer.md | 23 +- .../Network/help/Get-AzRouteServerPeer.md | 20 +- .../Get-AzRouteServerPeerAdvertisedRoute.md | 19 +- .../help/Get-AzRouteServerPeerLearnedRoute.md | 19 +- src/Network/Network/help/Get-AzRouteTable.md | 19 +- .../Network/help/Get-AzRoutingIntent.md | 21 +- .../Network/help/Get-AzRoutingPolicy.md | 17 +- .../help/Get-AzSecurityPartnerProvider.md | 19 +- .../help/Get-AzServiceEndpointPolicy.md | 22 +- .../Get-AzServiceEndpointPolicyDefinition.md | 18 +- .../Network/help/Get-AzVHubEffectiveRoute.md | 24 +- .../Network/help/Get-AzVHubInboundRoute.md | 24 +- .../Network/help/Get-AzVHubOutboundRoute.md | 24 +- .../Network/help/Get-AzVHubRouteTable.md | 21 +- .../help/Get-AzVirtualApplianceSite.md | 20 +- src/Network/Network/help/Get-AzVirtualHub.md | 20 +- .../help/Get-AzVirtualHubBgpConnection.md | 21 +- .../help/Get-AzVirtualHubRouteTable.md | 21 +- .../help/Get-AzVirtualHubVnetConnection.md | 21 +- .../Network/help/Get-AzVirtualNetwork.md | 19 +- ...zVirtualNetworkAvailableEndpointService.md | 17 +- .../help/Get-AzVirtualNetworkGateway.md | 17 +- ...-AzVirtualNetworkGatewayAdvertisedRoute.md | 18 +- ...et-AzVirtualNetworkGatewayBGPPeerStatus.md | 18 +- .../Get-AzVirtualNetworkGatewayConnection.md | 17 +- ...-AzVirtualNetworkGatewayConnectionIkeSa.md | 21 +- ...irtualNetworkGatewayConnectionSharedKey.md | 17 +- ...kGatewayConnectionVpnDeviceConfigScript.md | 18 +- ...Get-AzVirtualNetworkGatewayLearnedRoute.md | 17 +- .../Get-AzVirtualNetworkGatewayNatRule.md | 21 +- ...VirtualNetworkGatewaySupportedVpnDevice.md | 17 +- ...NetworkGatewayVpnClientConnectionHealth.md | 25 +- .../help/Get-AzVirtualNetworkPeering.md | 17 +- .../help/Get-AzVirtualNetworkSubnetConfig.md | 19 +- .../Network/help/Get-AzVirtualNetworkTap.md | 22 +- .../help/Get-AzVirtualNetworkUsageList.md | 17 +- .../Network/help/Get-AzVirtualRouter.md | 23 +- .../Network/help/Get-AzVirtualRouterPeer.md | 20 +- .../Get-AzVirtualRouterPeerAdvertisedRoute.md | 20 +- .../Get-AzVirtualRouterPeerLearnedRoute.md | 19 +- src/Network/Network/help/Get-AzVirtualWan.md | 20 +- .../help/Get-AzVirtualWanVpnConfiguration.md | 33 +- .../Get-AzVirtualWanVpnServerConfiguration.md | 21 +- ...tualWanVpnServerConfigurationVpnProfile.md | 28 +- .../help/Get-AzVpnClientConfiguration.md | 18 +- .../help/Get-AzVpnClientIpsecParameter.md | 17 +- .../Network/help/Get-AzVpnClientPackage.md | 18 +- .../help/Get-AzVpnClientRevokedCertificate.md | 17 +- .../help/Get-AzVpnClientRootCertificate.md | 18 +- .../Network/help/Get-AzVpnConnection.md | 21 +- src/Network/Network/help/Get-AzVpnGateway.md | 20 +- .../Network/help/Get-AzVpnGatewayNatRule.md | 21 +- .../help/Get-AzVpnServerConfiguration.md | 20 +- ...Get-AzVpnServerConfigurationPolicyGroup.md | 35 +- src/Network/Network/help/Get-AzVpnSite.md | 20 +- .../help/Get-AzVpnSiteLinkConnectionIkeSa.md | 21 +- .../help/Invoke-AzFirewallPacketCapture.md | 29 +- ...ecurityPerimeterNspAccessRulesReconcile.md | 353 +++ ...ecurityPerimeterNspAssociationReconcile.md | 308 +++ ...rkWatcherNetworkConfigurationDiagnostic.md | 23 +- .../help/Move-AzExpressRouteCircuit.md | 19 +- .../Network/help/New-AzApplicationGateway.md | 53 +- ...icationGatewayAuthenticationCertificate.md | 18 +- ...pplicationGatewayAutoscaleConfiguration.md | 18 +- ...-AzApplicationGatewayBackendAddressPool.md | 19 +- ...-AzApplicationGatewayBackendHttpSetting.md | 17 +- .../New-AzApplicationGatewayBackendSetting.md | 18 +- ...plicationGatewayClientAuthConfiguration.md | 17 +- ...-AzApplicationGatewayConnectionDraining.md | 17 +- .../New-AzApplicationGatewayCustomError.md | 17 +- ...w-AzApplicationGatewayFirewallCondition.md | 17 +- ...-AzApplicationGatewayFirewallCustomRule.md | 18 +- ...wayFirewallCustomRuleGroupByUserSession.md | 17 +- ...atewayFirewallCustomRuleGroupByVariable.md | 17 +- ...nGatewayFirewallDisabledRuleGroupConfig.md | 17 +- ...plicationGatewayFirewallExclusionConfig.md | 17 +- ...ApplicationGatewayFirewallMatchVariable.md | 17 +- .../New-AzApplicationGatewayFirewallPolicy.md | 18 +- ...plicationGatewayFirewallPolicyExclusion.md | 17 +- ...tewayFirewallPolicyExclusionManagedRule.md | 17 +- ...FirewallPolicyExclusionManagedRuleGroup.md | 17 +- ...ayFirewallPolicyExclusionManagedRuleSet.md | 17 +- ...FirewallPolicyLogScrubbingConfiguration.md | 17 +- ...onGatewayFirewallPolicyLogScrubbingRule.md | 17 +- ...icationGatewayFirewallPolicyManagedRule.md | 17 +- ...yFirewallPolicyManagedRuleGroupOverride.md | 17 +- ...atewayFirewallPolicyManagedRuleOverride.md | 17 +- ...tionGatewayFirewallPolicyManagedRuleSet.md | 17 +- ...ApplicationGatewayFirewallPolicySetting.md | 31 +- ...ew-AzApplicationGatewayFrontendIPConfig.md | 19 +- .../New-AzApplicationGatewayFrontendPort.md | 17 +- ...-AzApplicationGatewayHeaderValueMatcher.md | 17 +- .../New-AzApplicationGatewayHttpListener.md | 19 +- ...New-AzApplicationGatewayIPConfiguration.md | 19 +- .../help/New-AzApplicationGatewayIdentity.md | 17 +- .../help/New-AzApplicationGatewayListener.md | 20 +- .../New-AzApplicationGatewayPathRuleConfig.md | 20 +- ...licationGatewayPrivateLinkConfiguration.md | 17 +- ...cationGatewayPrivateLinkIpConfiguration.md | 17 +- .../New-AzApplicationGatewayProbeConfig.md | 17 +- ...licationGatewayProbeHealthResponseMatch.md | 17 +- ...ApplicationGatewayRedirectConfiguration.md | 21 +- ...-AzApplicationGatewayRequestRoutingRule.md | 19 +- .../New-AzApplicationGatewayRewriteRule.md | 17 +- ...zApplicationGatewayRewriteRuleActionSet.md | 17 +- ...zApplicationGatewayRewriteRuleCondition.md | 17 +- ...onGatewayRewriteRuleHeaderConfiguration.md | 17 +- .../New-AzApplicationGatewayRewriteRuleSet.md | 17 +- ...ationGatewayRewriteRuleUrlConfiguration.md | 18 +- .../New-AzApplicationGatewayRoutingRule.md | 19 +- .../help/New-AzApplicationGatewaySku.md | 17 +- .../New-AzApplicationGatewaySslCertificate.md | 18 +- .../help/New-AzApplicationGatewaySslPolicy.md | 18 +- .../New-AzApplicationGatewaySslProfile.md | 17 +- ...licationGatewayTrustedClientCertificate.md | 17 +- ...pplicationGatewayTrustedRootCertificate.md | 18 +- ...ew-AzApplicationGatewayUrlPathMapConfig.md | 24 +- ...ewayWebApplicationFirewallConfiguration.md | 19 +- .../help/New-AzApplicationSecurityGroup.md | 18 +- src/Network/Network/help/New-AzBastion.md | 39 +- .../Network/help/New-AzContainerNicConfig.md | 18 +- .../help/New-AzContainerNicConfigIpConfig.md | 18 +- .../Network/help/New-AzCustomIpPrefix.md | 19 +- .../Network/help/New-AzDdosProtectionPlan.md | 18 +- src/Network/Network/help/New-AzDelegation.md | 17 +- .../Network/help/New-AzExpressRouteCircuit.md | 21 +- .../New-AzExpressRouteCircuitAuthorization.md | 17 +- .../New-AzExpressRouteCircuitPeeringConfig.md | 23 +- .../help/New-AzExpressRouteConnection.md | 25 +- .../Network/help/New-AzExpressRouteGateway.md | 24 +- .../Network/help/New-AzExpressRoutePort.md | 20 +- .../help/New-AzExpressRoutePortIdentity.md | 17 +- .../Network/help/New-AzExpressRoutePortLOA.md | 23 +- src/Network/Network/help/New-AzFirewall.md | 30 +- .../help/New-AzFirewallApplicationRule.md | 22 +- ...New-AzFirewallApplicationRuleCollection.md | 17 +- .../help/New-AzFirewallHubIpAddress.md | 17 +- .../help/New-AzFirewallHubPublicIpAddress.md | 17 +- .../Network/help/New-AzFirewallNatRule.md | 18 +- .../help/New-AzFirewallNatRuleCollection.md | 18 +- .../Network/help/New-AzFirewallNetworkRule.md | 18 +- .../New-AzFirewallNetworkRuleCollection.md | 18 +- .../New-AzFirewallPacketCaptureParameter.md | 39 +- .../help/New-AzFirewallPacketCaptureRule.md | 20 +- .../Network/help/New-AzFirewallPolicy.md | 18 +- .../New-AzFirewallPolicyApplicationRule.md | 33 +- ...llPolicyApplicationRuleCustomHttpHeader.md | 18 +- .../help/New-AzFirewallPolicyDnsSetting.md | 17 +- .../help/New-AzFirewallPolicyExplicitProxy.md | 17 +- ...ew-AzFirewallPolicyFilterRuleCollection.md | 17 +- .../New-AzFirewallPolicyIntrusionDetection.md | 84 +- ...llPolicyIntrusionDetectionBypassTraffic.md | 17 +- ...licyIntrusionDetectionSignatureOverride.md | 18 +- .../help/New-AzFirewallPolicyNatRule.md | 27 +- .../New-AzFirewallPolicyNatRuleCollection.md | 17 +- .../help/New-AzFirewallPolicyNetworkRule.md | 19 +- ...New-AzFirewallPolicyRuleCollectionGroup.md | 22 +- .../Network/help/New-AzFirewallPolicySnat.md | 17 +- .../help/New-AzFirewallPolicySqlSetting.md | 19 +- ...ew-AzFirewallPolicyThreatIntelWhitelist.md | 17 +- .../help/New-AzFirewallPublicIpAddress.md | 17 +- .../New-AzFirewallThreatIntelWhitelist.md | 17 +- ...AzGatewayCustomBgpIpConfigurationObject.md | 18 +- .../Network/help/New-AzIpAllocation.md | 17 +- ...zIpConfigurationBgpPeeringAddressObject.md | 17 +- src/Network/Network/help/New-AzIpGroup.md | 19 +- src/Network/Network/help/New-AzIpsecPolicy.md | 17 +- .../help/New-AzIpsecTrafficSelectorPolicy.md | 18 +- .../Network/help/New-AzLoadBalancer.md | 18 +- .../New-AzLoadBalancerBackendAddressConfig.md | 24 +- .../New-AzLoadBalancerBackendAddressPool.md | 23 +- ...-AzLoadBalancerBackendAddressPoolConfig.md | 18 +- ...BackendAddressPoolTunnelInterfaceConfig.md | 18 +- .../New-AzLoadBalancerFrontendIpConfig.md | 33 +- .../New-AzLoadBalancerInboundNatPoolConfig.md | 22 +- .../New-AzLoadBalancerInboundNatRuleConfig.md | 22 +- .../New-AzLoadBalancerOutboundRuleConfig.md | 23 +- .../help/New-AzLoadBalancerProbeConfig.md | 18 +- .../help/New-AzLoadBalancerRuleConfig.md | 21 +- .../Network/help/New-AzLocalNetworkGateway.md | 21 +- src/Network/Network/help/New-AzNatGateway.md | 19 +- .../Network/help/New-AzNetworkInterface.md | 27 +- .../help/New-AzNetworkInterfaceIpConfig.md | 20 +- .../Network/help/New-AzNetworkManager.md | 18 +- .../New-AzNetworkManagerAddressPrefixItem.md | 17 +- ...NetworkManagerConnectivityConfiguration.md | 19 +- ...w-AzNetworkManagerConnectivityGroupItem.md | 18 +- .../Network/help/New-AzNetworkManagerGroup.md | 17 +- .../Network/help/New-AzNetworkManagerHub.md | 17 +- ...NetworkManagerManagementGroupConnection.md | 18 +- .../Network/help/New-AzNetworkManagerScope.md | 17 +- .../New-AzNetworkManagerScopeConnection.md | 18 +- ...etworkManagerSecurityAdminConfiguration.md | 18 +- .../New-AzNetworkManagerSecurityAdminRule.md | 22 +- ...tworkManagerSecurityAdminRuleCollection.md | 18 +- .../New-AzNetworkManagerSecurityGroupItem.md | 17 +- .../help/New-AzNetworkManagerStaticMember.md | 17 +- ...-AzNetworkManagerSubscriptionConnection.md | 18 +- .../Network/help/New-AzNetworkProfile.md | 18 +- .../help/New-AzNetworkSecurityGroup.md | 18 +- .../help/New-AzNetworkSecurityPerimeter.md | 113 +- ...ew-AzNetworkSecurityPerimeterAccessRule.md | 205 +- ...w-AzNetworkSecurityPerimeterAssociation.md | 134 +- .../New-AzNetworkSecurityPerimeterLink.md | 158 +- .../New-AzNetworkSecurityPerimeterProfile.md | 133 +- .../help/New-AzNetworkSecurityRuleConfig.md | 21 +- .../help/New-AzNetworkVirtualAppliance.md | 54 +- .../Network/help/New-AzNetworkWatcher.md | 18 +- .../New-AzNetworkWatcherConnectionMonitor.md | 38 +- ...kWatcherConnectionMonitorEndpointObject.md | 39 +- ...onnectionMonitorEndpointScopeItemObject.md | 17 +- ...AzNetworkWatcherConnectionMonitorObject.md | 24 +- ...orkWatcherConnectionMonitorOutputObject.md | 18 +- ...ctionMonitorProtocolConfigurationObject.md | 22 +- ...onnectionMonitorTestConfigurationObject.md | 19 +- ...WatcherConnectionMonitorTestGroupObject.md | 18 +- .../help/New-AzNetworkWatcherFlowLog.md | 33 +- ...erNetworkConfigurationDiagnosticProfile.md | 17 +- .../help/New-AzNetworkWatcherPacketCapture.md | 24 +- .../New-AzNetworkWatcherPacketCaptureV2.md | 24 +- ...w-AzNetworkWatcherProtocolConfiguration.md | 18 +- .../Network/help/New-AzO365PolicyProperty.md | 17 +- .../help/New-AzOffice365PolicyProperty.md | 17 +- .../Network/help/New-AzP2sVpnGateway.md | 35 +- .../help/New-AzPacketCaptureFilterConfig.md | 18 +- .../help/New-AzPacketCaptureScopeConfig.md | 17 +- .../help/New-AzPrivateDnsZoneConfig.md | 17 +- .../Network/help/New-AzPrivateDnsZoneGroup.md | 18 +- .../Network/help/New-AzPrivateEndpoint.md | 18 +- .../New-AzPrivateEndpointIpConfiguration.md | 18 +- .../Network/help/New-AzPrivateLinkService.md | 18 +- .../New-AzPrivateLinkServiceConnection.md | 20 +- .../help/New-AzPrivateLinkServiceIpConfig.md | 17 +- .../Network/help/New-AzPublicIpAddress.md | 19 +- .../Network/help/New-AzPublicIpPrefix.md | 18 +- src/Network/Network/help/New-AzPublicIpTag.md | 19 +- .../Network/help/New-AzRadiusServer.md | 18 +- src/Network/Network/help/New-AzRouteConfig.md | 19 +- src/Network/Network/help/New-AzRouteFilter.md | 19 +- .../help/New-AzRouteFilterRuleConfig.md | 18 +- src/Network/Network/help/New-AzRouteMap.md | 25 +- .../Network/help/New-AzRouteMapRule.md | 19 +- .../Network/help/New-AzRouteMapRuleAction.md | 18 +- .../help/New-AzRouteMapRuleActionParameter.md | 18 +- .../help/New-AzRouteMapRuleCriterion.md | 18 +- src/Network/Network/help/New-AzRouteServer.md | 17 +- src/Network/Network/help/New-AzRouteTable.md | 19 +- .../help/New-AzRoutingConfiguration.md | 18 +- .../Network/help/New-AzRoutingIntent.md | 25 +- .../Network/help/New-AzRoutingPolicy.md | 18 +- .../help/New-AzSaaSNetworkVirtualAppliance.md | 20 +- .../help/New-AzSecurityPartnerProvider.md | 17 +- .../help/New-AzServiceEndpointPolicy.md | 19 +- .../New-AzServiceEndpointPolicyDefinition.md | 18 +- src/Network/Network/help/New-AzStaticRoute.md | 17 +- src/Network/Network/help/New-AzVHubRoute.md | 18 +- .../Network/help/New-AzVHubRouteTable.md | 25 +- ...AzVirtualApplianceAdditionalNicProperty.md | 18 +- ...alApplianceInboundSecurityRulesProperty.md | 24 +- ...tualApplianceInternetIngressIpsProperty.md | 26 +- .../New-AzVirtualApplianceIpConfiguration.md | 30 +- ...lApplianceNetworkInterfaceConfiguration.md | 29 +- .../New-AzVirtualApplianceNetworkProfile.md | 26 +- .../help/New-AzVirtualApplianceSite.md | 21 +- .../help/New-AzVirtualApplianceSkuProperty.md | 17 +- src/Network/Network/help/New-AzVirtualHub.md | 21 +- .../help/New-AzVirtualHubBgpConnection.md | 33 +- .../Network/help/New-AzVirtualHubRoute.md | 17 +- .../help/New-AzVirtualHubRouteTable.md | 17 +- .../help/New-AzVirtualHubVnetConnection.md | 39 +- .../Network/help/New-AzVirtualNetwork.md | 19 +- .../help/New-AzVirtualNetworkGateway.md | 19 +- .../New-AzVirtualNetworkGatewayConnection.md | 23 +- .../New-AzVirtualNetworkGatewayIpConfig.md | 21 +- .../New-AzVirtualNetworkGatewayNatRule.md | 19 +- .../New-AzVirtualNetworkGatewayPolicyGroup.md | 17 +- ...zVirtualNetworkGatewayPolicyGroupMember.md | 17 +- .../help/New-AzVirtualNetworkSubnetConfig.md | 20 +- .../Network/help/New-AzVirtualNetworkTap.md | 21 +- .../Network/help/New-AzVirtualRouter.md | 19 +- ...w-AzVirtualRouterAutoScaleConfiguration.md | 17 +- src/Network/Network/help/New-AzVirtualWan.md | 18 +- .../help/New-AzVpnClientConfiguration.md | 19 +- .../New-AzVpnClientConnectionConfiguration.md | 17 +- .../help/New-AzVpnClientIpsecParameter.md | 18 +- .../help/New-AzVpnClientIpsecPolicy.md | 18 +- .../help/New-AzVpnClientRevokedCertificate.md | 17 +- .../help/New-AzVpnClientRootCertificate.md | 17 +- .../Network/help/New-AzVpnConnection.md | 32 +- src/Network/Network/help/New-AzVpnGateway.md | 24 +- .../Network/help/New-AzVpnGatewayNatRule.md | 24 +- .../help/New-AzVpnServerConfiguration.md | 18 +- ...New-AzVpnServerConfigurationPolicyGroup.md | 35 +- src/Network/Network/help/New-AzVpnSite.md | 31 +- src/Network/Network/help/New-AzVpnSiteLink.md | 19 +- .../help/New-AzVpnSiteLinkConnection.md | 17 +- .../help/Remove-AzApplicationGateway.md | 18 +- ...icationGatewayAuthenticationCertificate.md | 18 +- ...pplicationGatewayAutoscaleConfiguration.md | 18 +- ...-AzApplicationGatewayBackendAddressPool.md | 18 +- ...-AzApplicationGatewayBackendHttpSetting.md | 17 +- ...move-AzApplicationGatewayBackendSetting.md | 17 +- ...plicationGatewayClientAuthConfiguration.md | 17 +- ...-AzApplicationGatewayConnectionDraining.md | 17 +- .../Remove-AzApplicationGatewayCustomError.md | 17 +- ...-AzApplicationGatewayFirewallCustomRule.md | 18 +- ...move-AzApplicationGatewayFirewallPolicy.md | 25 +- ...ve-AzApplicationGatewayFrontendIPConfig.md | 17 +- ...Remove-AzApplicationGatewayFrontendPort.md | 17 +- ...Remove-AzApplicationGatewayHttpListener.md | 17 +- ...plicationGatewayHttpListenerCustomError.md | 17 +- ...ove-AzApplicationGatewayIPConfiguration.md | 17 +- .../Remove-AzApplicationGatewayIdentity.md | 18 +- .../Remove-AzApplicationGatewayListener.md | 17 +- ...licationGatewayPrivateLinkConfiguration.md | 17 +- .../Remove-AzApplicationGatewayProbeConfig.md | 17 +- ...ApplicationGatewayRedirectConfiguration.md | 17 +- ...-AzApplicationGatewayRequestRoutingRule.md | 17 +- ...move-AzApplicationGatewayRewriteRuleSet.md | 17 +- .../Remove-AzApplicationGatewayRoutingRule.md | 17 +- ...move-AzApplicationGatewaySslCertificate.md | 17 +- .../Remove-AzApplicationGatewaySslPolicy.md | 18 +- .../Remove-AzApplicationGatewaySslProfile.md | 17 +- ...ve-AzApplicationGatewaySslProfilePolicy.md | 17 +- ...licationGatewayTrustedClientCertificate.md | 17 +- ...pplicationGatewayTrustedRootCertificate.md | 18 +- ...ve-AzApplicationGatewayUrlPathMapConfig.md | 17 +- .../help/Remove-AzApplicationSecurityGroup.md | 18 +- src/Network/Network/help/Remove-AzBastion.md | 24 +- .../Network/help/Remove-AzCustomIpPrefix.md | 24 +- .../help/Remove-AzDdosProtectionPlan.md | 18 +- .../Network/help/Remove-AzDelegation.md | 17 +- .../help/Remove-AzExpressRouteCircuit.md | 18 +- ...move-AzExpressRouteCircuitAuthorization.md | 17 +- ...e-AzExpressRouteCircuitConnectionConfig.md | 19 +- ...move-AzExpressRouteCircuitPeeringConfig.md | 18 +- .../help/Remove-AzExpressRouteConnection.md | 24 +- ...ve-AzExpressRouteCrossConnectionPeering.md | 19 +- .../help/Remove-AzExpressRouteGateway.md | 24 +- .../Network/help/Remove-AzExpressRoutePort.md | 24 +- .../Remove-AzExpressRoutePortAuthorization.md | 18 +- .../help/Remove-AzExpressRoutePortIdentity.md | 17 +- src/Network/Network/help/Remove-AzFirewall.md | 18 +- .../Network/help/Remove-AzFirewallPolicy.md | 24 +- ...ove-AzFirewallPolicyRuleCollectionGroup.md | 28 +- .../Network/help/Remove-AzIpAllocation.md | 24 +- src/Network/Network/help/Remove-AzIpGroup.md | 22 +- .../Network/help/Remove-AzLoadBalancer.md | 18 +- ...Remove-AzLoadBalancerBackendAddressPool.md | 28 +- ...-AzLoadBalancerBackendAddressPoolConfig.md | 18 +- .../Remove-AzLoadBalancerFrontendIpConfig.md | 18 +- ...move-AzLoadBalancerInboundNatPoolConfig.md | 18 +- ...move-AzLoadBalancerInboundNatRuleConfig.md | 18 +- ...Remove-AzLoadBalancerOutboundRuleConfig.md | 18 +- .../help/Remove-AzLoadBalancerProbeConfig.md | 18 +- .../help/Remove-AzLoadBalancerRuleConfig.md | 18 +- .../help/Remove-AzLocalNetworkGateway.md | 18 +- .../Network/help/Remove-AzNatGateway.md | 24 +- .../Network/help/Remove-AzNetworkInterface.md | 18 +- .../help/Remove-AzNetworkInterfaceIpConfig.md | 17 +- .../Remove-AzNetworkInterfaceTapConfig.md | 24 +- .../Network/help/Remove-AzNetworkManager.md | 18 +- ...NetworkManagerConnectivityConfiguration.md | 18 +- .../help/Remove-AzNetworkManagerGroup.md | 19 +- ...NetworkManagerManagementGroupConnection.md | 18 +- .../Remove-AzNetworkManagerScopeConnection.md | 19 +- ...etworkManagerSecurityAdminConfiguration.md | 18 +- ...emove-AzNetworkManagerSecurityAdminRule.md | 19 +- ...tworkManagerSecurityAdminRuleCollection.md | 18 +- .../Remove-AzNetworkManagerStaticMember.md | 19 +- ...-AzNetworkManagerSubscriptionConnection.md | 18 +- .../Network/help/Remove-AzNetworkProfile.md | 24 +- .../help/Remove-AzNetworkSecurityGroup.md | 18 +- .../help/Remove-AzNetworkSecurityPerimeter.md | 77 +- ...ve-AzNetworkSecurityPerimeterAccessRule.md | 121 +- ...e-AzNetworkSecurityPerimeterAssociation.md | 105 +- .../Remove-AzNetworkSecurityPerimeterLink.md | 103 +- ...AzNetworkSecurityPerimeterLinkReference.md | 105 +- ...emove-AzNetworkSecurityPerimeterProfile.md | 99 +- .../Remove-AzNetworkSecurityRuleConfig.md | 17 +- .../help/Remove-AzNetworkVirtualAppliance.md | 24 +- .../Network/help/Remove-AzNetworkWatcher.md | 23 +- ...emove-AzNetworkWatcherConnectionMonitor.md | 31 +- .../help/Remove-AzNetworkWatcherFlowLog.md | 30 +- .../Remove-AzNetworkWatcherPacketCapture.md | 25 +- .../Network/help/Remove-AzP2sVpnGateway.md | 23 +- .../help/Remove-AzPrivateDnsZoneGroup.md | 18 +- .../Network/help/Remove-AzPrivateEndpoint.md | 18 +- .../Remove-AzPrivateEndpointConnection.md | 23 +- .../help/Remove-AzPrivateLinkService.md | 18 +- .../Network/help/Remove-AzPublicIpAddress.md | 18 +- .../Network/help/Remove-AzPublicIpPrefix.md | 24 +- .../Network/help/Remove-AzRouteConfig.md | 17 +- .../Network/help/Remove-AzRouteFilter.md | 18 +- .../help/Remove-AzRouteFilterRuleConfig.md | 18 +- src/Network/Network/help/Remove-AzRouteMap.md | 27 +- .../Network/help/Remove-AzRouteServer.md | 24 +- .../Network/help/Remove-AzRouteServerPeer.md | 23 +- .../Network/help/Remove-AzRouteTable.md | 18 +- .../Network/help/Remove-AzRoutingIntent.md | 27 +- .../Network/help/Remove-AzRoutingPolicy.md | 18 +- .../help/Remove-AzSecurityPartnerProvider.md | 24 +- .../help/Remove-AzServiceEndpointPolicy.md | 24 +- ...emove-AzServiceEndpointPolicyDefinition.md | 25 +- .../Network/help/Remove-AzVHubRouteTable.md | 27 +- .../help/Remove-AzVirtualApplianceSite.md | 25 +- .../Network/help/Remove-AzVirtualHub.md | 24 +- .../help/Remove-AzVirtualHubBgpConnection.md | 27 +- .../help/Remove-AzVirtualHubRouteTable.md | 27 +- .../help/Remove-AzVirtualHubVnetConnection.md | 25 +- .../Network/help/Remove-AzVirtualNetwork.md | 18 +- .../help/Remove-AzVirtualNetworkGateway.md | 18 +- ...emove-AzVirtualNetworkGatewayConnection.md | 18 +- ...move-AzVirtualNetworkGatewayDefaultSite.md | 17 +- .../Remove-AzVirtualNetworkGatewayIpConfig.md | 18 +- .../Remove-AzVirtualNetworkGatewayNatRule.md | 24 +- .../help/Remove-AzVirtualNetworkPeering.md | 18 +- .../Remove-AzVirtualNetworkSubnetConfig.md | 17 +- .../help/Remove-AzVirtualNetworkTap.md | 24 +- .../Network/help/Remove-AzVirtualRouter.md | 24 +- .../help/Remove-AzVirtualRouterPeer.md | 23 +- .../Network/help/Remove-AzVirtualWan.md | 22 +- .../help/Remove-AzVpnClientIpsecParameter.md | 25 +- .../Remove-AzVpnClientRevokedCertificate.md | 17 +- .../help/Remove-AzVpnClientRootCertificate.md | 17 +- .../Network/help/Remove-AzVpnConnection.md | 23 +- .../Network/help/Remove-AzVpnGateway.md | 22 +- .../help/Remove-AzVpnGatewayNatRule.md | 23 +- .../help/Remove-AzVpnServerConfiguration.md | 24 +- ...ove-AzVpnServerConfigurationPolicyGroup.md | 35 +- src/Network/Network/help/Remove-AzVpnSite.md | 24 +- src/Network/Network/help/Reset-AzHubRouter.md | 26 +- .../Network/help/Reset-AzP2sVpnGateway.md | 24 +- .../help/Reset-AzVirtualNetworkGateway.md | 17 +- ...Reset-AzVirtualNetworkGatewayConnection.md | 24 +- ...irtualNetworkGatewayConnectionSharedKey.md | 18 +- .../Network/help/Reset-AzVpnGateway.md | 24 +- .../help/Reset-AzVpnSiteLinkConnection.md | 23 +- .../help/Resize-AzVirtualNetworkGateway.md | 17 +- .../Network/help/Set-AzApplicationGateway.md | 17 +- ...icationGatewayAuthenticationCertificate.md | 18 +- ...pplicationGatewayAutoscaleConfiguration.md | 18 +- ...-AzApplicationGatewayBackendAddressPool.md | 17 +- ...-AzApplicationGatewayBackendHttpSetting.md | 17 +- .../Set-AzApplicationGatewayBackendSetting.md | 18 +- ...plicationGatewayClientAuthConfiguration.md | 17 +- ...-AzApplicationGatewayConnectionDraining.md | 18 +- .../Set-AzApplicationGatewayCustomError.md | 18 +- .../Set-AzApplicationGatewayFirewallPolicy.md | 24 +- ...et-AzApplicationGatewayFrontendIPConfig.md | 20 +- .../Set-AzApplicationGatewayFrontendPort.md | 17 +- .../Set-AzApplicationGatewayHttpListener.md | 19 +- ...plicationGatewayHttpListenerCustomError.md | 17 +- ...Set-AzApplicationGatewayIPConfiguration.md | 21 +- .../help/Set-AzApplicationGatewayIdentity.md | 18 +- .../help/Set-AzApplicationGatewayListener.md | 19 +- ...licationGatewayPrivateLinkConfiguration.md | 17 +- .../Set-AzApplicationGatewayProbeConfig.md | 17 +- ...ApplicationGatewayRedirectConfiguration.md | 22 +- ...-AzApplicationGatewayRequestRoutingRule.md | 20 +- .../Set-AzApplicationGatewayRewriteRuleSet.md | 17 +- .../Set-AzApplicationGatewayRoutingRule.md | 20 +- .../help/Set-AzApplicationGatewaySku.md | 18 +- .../Set-AzApplicationGatewaySslCertificate.md | 17 +- .../help/Set-AzApplicationGatewaySslPolicy.md | 18 +- .../Set-AzApplicationGatewaySslProfile.md | 17 +- ...et-AzApplicationGatewaySslProfilePolicy.md | 18 +- ...licationGatewayTrustedClientCertificate.md | 18 +- ...pplicationGatewayTrustedRootCertificate.md | 18 +- ...et-AzApplicationGatewayUrlPathMapConfig.md | 24 +- ...ewayWebApplicationFirewallConfiguration.md | 19 +- src/Network/Network/help/Set-AzBastion.md | 18 +- .../Network/help/Set-AzExpressRouteCircuit.md | 17 +- ...t-AzExpressRouteCircuitConnectionConfig.md | 22 +- .../Set-AzExpressRouteCircuitPeeringConfig.md | 23 +- .../help/Set-AzExpressRouteConnection.md | 25 +- .../help/Set-AzExpressRouteCrossConnection.md | 21 +- .../Network/help/Set-AzExpressRouteGateway.md | 23 +- .../Network/help/Set-AzExpressRoutePort.md | 18 +- .../help/Set-AzExpressRoutePortIdentity.md | 17 +- src/Network/Network/help/Set-AzFirewall.md | 19 +- .../Network/help/Set-AzFirewallPolicy.md | 24 +- ...Set-AzFirewallPolicyRuleCollectionGroup.md | 26 +- .../Network/help/Set-AzIpAllocation.md | 21 +- src/Network/Network/help/Set-AzIpGroup.md | 19 +- .../Network/help/Set-AzLoadBalancer.md | 19 +- .../Set-AzLoadBalancerBackendAddressPool.md | 26 +- .../Set-AzLoadBalancerFrontendIpConfig.md | 31 +- .../Set-AzLoadBalancerInboundNatPoolConfig.md | 22 +- .../Set-AzLoadBalancerInboundNatRuleConfig.md | 20 +- .../Set-AzLoadBalancerOutboundRuleConfig.md | 21 +- .../help/Set-AzLoadBalancerProbeConfig.md | 18 +- .../help/Set-AzLoadBalancerRuleConfig.md | 22 +- .../Network/help/Set-AzLocalNetworkGateway.md | 17 +- src/Network/Network/help/Set-AzNatGateway.md | 25 +- .../Network/help/Set-AzNetworkInterface.md | 17 +- .../help/Set-AzNetworkInterfaceIpConfig.md | 20 +- .../help/Set-AzNetworkInterfaceTapConfig.md | 18 +- .../Network/help/Set-AzNetworkManager.md | 17 +- ...NetworkManagerConnectivityConfiguration.md | 18 +- .../Network/help/Set-AzNetworkManagerGroup.md | 18 +- ...NetworkManagerManagementGroupConnection.md | 18 +- .../Set-AzNetworkManagerScopeConnection.md | 18 +- ...etworkManagerSecurityAdminConfiguration.md | 18 +- .../Set-AzNetworkManagerSecurityAdminRule.md | 18 +- ...tworkManagerSecurityAdminRuleCollection.md | 18 +- ...-AzNetworkManagerSubscriptionConnection.md | 18 +- .../Network/help/Set-AzNetworkProfile.md | 17 +- .../help/Set-AzNetworkSecurityGroup.md | 18 +- .../help/Set-AzNetworkSecurityRuleConfig.md | 20 +- .../help/Set-AzNetworkWatcherConfigFlowLog.md | 47 +- .../Set-AzNetworkWatcherConnectionMonitor.md | 44 +- .../help/Set-AzNetworkWatcherFlowLog.md | 42 +- .../Network/help/Set-AzPrivateDnsZoneGroup.md | 18 +- .../Network/help/Set-AzPrivateEndpoint.md | 17 +- .../help/Set-AzPrivateEndpointConnection.md | 21 +- .../Network/help/Set-AzPrivateLinkService.md | 17 +- .../Network/help/Set-AzPublicIpAddress.md | 17 +- .../Network/help/Set-AzPublicIpPrefix.md | 17 +- src/Network/Network/help/Set-AzRouteConfig.md | 19 +- src/Network/Network/help/Set-AzRouteFilter.md | 17 +- .../help/Set-AzRouteFilterRuleConfig.md | 19 +- src/Network/Network/help/Set-AzRouteTable.md | 19 +- .../Network/help/Set-AzRoutingIntent.md | 28 +- .../Network/help/Set-AzRoutingPolicy.md | 18 +- .../help/Set-AzSecurityPartnerProvider.md | 18 +- .../help/Set-AzServiceEndpointPolicy.md | 18 +- .../Set-AzServiceEndpointPolicyDefinition.md | 18 +- src/Network/Network/help/Set-AzVirtualHub.md | 25 +- .../Network/help/Set-AzVirtualNetwork.md | 17 +- .../help/Set-AzVirtualNetworkGateway.md | 21 +- .../Set-AzVirtualNetworkGatewayConnection.md | 21 +- ...irtualNetworkGatewayConnectionSharedKey.md | 18 +- .../Set-AzVirtualNetworkGatewayDefaultSite.md | 18 +- .../help/Set-AzVirtualNetworkPeering.md | 17 +- .../help/Set-AzVirtualNetworkSubnetConfig.md | 21 +- .../Network/help/Set-AzVirtualNetworkTap.md | 18 +- .../help/Set-AzVpnClientIpsecParameter.md | 25 +- .../help/Start-AzApplicationGateway.md | 17 +- ...Start-AzNetworkWatcherConnectionMonitor.md | 30 +- ...AzNetworkWatcherResourceTroubleshooting.md | 23 +- ...alNetworkGatewayConnectionPacketCapture.md | 26 +- ...rt-AzVirtualnetworkGatewayPacketCapture.md | 24 +- .../Start-AzVpnConnectionPacketCapture.md | 24 +- .../help/Start-AzVpnGatewayPacketCapture.md | 24 +- .../Network/help/Stop-AzApplicationGateway.md | 17 +- .../Stop-AzNetworkWatcherConnectionMonitor.md | 30 +- .../Stop-AzNetworkWatcherPacketCapture.md | 25 +- ...alNetworkGatewayConnectionPacketCapture.md | 24 +- ...op-AzVirtualNetworkGatewayPacketCapture.md | 24 +- .../help/Stop-AzVpnConnectionPacketCapture.md | 25 +- .../help/Stop-AzVpnGatewayPacketCapture.md | 24 +- .../help/Sync-AzVirtualNetworkPeering.md | 21 +- .../Network/help/Test-AzDnsAvailability.md | 17 +- .../help/Test-AzNetworkWatcherConnectivity.md | 21 +- .../help/Test-AzNetworkWatcherIPFlow.md | 21 +- .../Test-AzPrivateIPAddressAvailability.md | 20 +- .../Test-AzPrivateLinkServiceVisibility.md | 18 +- .../Network/help/Update-AzCustomIpPrefix.md | 23 +- .../help/Update-AzNetworkSecurityPerimeter.md | 288 +++ ...te-AzNetworkSecurityPerimeterAccessRule.md | 134 +- ...e-AzNetworkSecurityPerimeterAssociation.md | 103 +- .../Update-AzNetworkSecurityPerimeterLink.md | 105 +- .../help/Update-AzNetworkVirtualAppliance.md | 18 +- ...ate-AzNetworkVirtualApplianceConnection.md | 29 +- .../Network/help/Update-AzP2sVpnGateway.md | 36 +- src/Network/Network/help/Update-AzRouteMap.md | 28 +- .../Network/help/Update-AzRouteServer.md | 22 +- .../Network/help/Update-AzRouteServerPeer.md | 28 +- .../Network/help/Update-AzVHubRouteTable.md | 29 +- ...e-AzVirtualApplianceInboundSecurityRule.md | 41 +- .../help/Update-AzVirtualApplianceSite.md | 18 +- .../Network/help/Update-AzVirtualHub.md | 24 +- .../help/Update-AzVirtualHubBgpConnection.md | 45 +- .../help/Update-AzVirtualHubVnetConnection.md | 25 +- .../Update-AzVirtualNetworkGatewayNatRule.md | 25 +- .../Network/help/Update-AzVirtualRouter.md | 21 +- .../help/Update-AzVirtualRouterPeer.md | 29 +- .../Network/help/Update-AzVirtualWan.md | 24 +- .../Network/help/Update-AzVpnConnection.md | 22 +- .../Network/help/Update-AzVpnGateway.md | 27 +- .../help/Update-AzVpnGatewayNatRule.md | 25 +- .../help/Update-AzVpnServerConfiguration.md | 24 +- ...ate-AzVpnServerConfigurationPolicyGroup.md | 35 +- src/Network/Network/help/Update-AzVpnSite.md | 45 +- .../Az.NetworkSecurityPerimeter.psd1 | 2 +- .../Az.NetworkSecurityPerimeter.psm1 | 24 +- .../README.md | 7 +- ...workSecurityPerimeters-linkReferences.json | 2 +- .../networkSecurityPerimeters-links.json | 2 +- ...curityPerimeters-profiles-accessRules.json | 50 +- .../networkSecurityPerimeters-profiles.json | 2 +- ...curityPerimeters-resourceAssociations.json | 45 +- .../networkSecurityPerimeters.json | 2 +- .../build-module.ps1 | 12 +- ...e-AzNetworkSecurityPerimeterAccessRule.ps1 | 8 +- ...ecurityPerimeterNspAccessRulesReconcile.md | 15 + ...ecurityPerimeterNspAssociationReconcile.md | 15 + .../Update-AzNetworkSecurityPerimeter.md | 28 + .../Get-AzNetworkSecurityPerimeter.ps1 | 9 +- ...t-AzNetworkSecurityPerimeterAccessRule.ps1 | 11 +- ...ecurityPerimeterAssociableResourceType.ps1 | 8 +- ...-AzNetworkSecurityPerimeterAssociation.ps1 | 10 +- .../Get-AzNetworkSecurityPerimeterLink.ps1 | 10 +- ...zNetworkSecurityPerimeterLinkReference.ps1 | 10 +- .../Get-AzNetworkSecurityPerimeterProfile.ps1 | 10 +- ...curityPerimeterNspAccessRulesReconcile.ps1 | 319 +++ ...curityPerimeterNspAssociationReconcile.ps1 | 284 +++ .../New-AzNetworkSecurityPerimeter.ps1 | 10 +- ...w-AzNetworkSecurityPerimeterAccessRule.ps1 | 24 +- ...-AzNetworkSecurityPerimeterAssociation.ps1 | 11 +- .../New-AzNetworkSecurityPerimeterLink.ps1 | 17 +- .../New-AzNetworkSecurityPerimeterProfile.ps1 | 11 +- .../exports/ProxyCmdletDefinitions.ps1 | 1062 +++++++- .../Remove-AzNetworkSecurityPerimeter.ps1 | 9 +- ...e-AzNetworkSecurityPerimeterAccessRule.ps1 | 11 +- ...-AzNetworkSecurityPerimeterAssociation.ps1 | 10 +- .../Remove-AzNetworkSecurityPerimeterLink.ps1 | 10 +- ...zNetworkSecurityPerimeterLinkReference.ps1 | 10 +- ...move-AzNetworkSecurityPerimeterProfile.ps1 | 10 +- .../Update-AzNetworkSecurityPerimeter.ps1 | 266 ++ ...e-AzNetworkSecurityPerimeterAccessRule.ps1 | 17 +- ...-AzNetworkSecurityPerimeterAssociation.ps1 | 10 +- .../Update-AzNetworkSecurityPerimeterLink.ps1 | 10 +- .../generated/Module.cs | 33 +- .../generated/api/Models/Any.PowerShell.cs | 156 ++ .../generated/api/Models/Any.TypeConverter.cs | 146 ++ .../generated/api/Models/Any.cs | 34 + .../generated/api/Models/Any.json.cs | 106 + .../api/Models/NspAccessRule.PowerShell.cs | 8 + .../generated/api/Models/NspAccessRule.cs | 17 + .../NspAccessRuleProperties.PowerShell.cs | 8 + .../api/Models/NspAccessRuleProperties.cs | 20 + .../Models/NspAccessRuleProperties.json.cs | 10 + .../generated/api/Models/NspLink.cs | 19 +- .../generated/api/Models/NspLinkProperties.cs | 19 +- .../generated/api/Models/NspLinkReference.cs | 41 +- .../api/Models/NspLinkReferenceProperties.cs | 41 +- .../generated/api/NetworkSecurityPerimeter.cs | 2257 ++++++++++++++--- ...zNetworkSecurityPerimeterAccessRule_Get.cs | 35 +- ...urityPerimeterAccessRule_GetViaIdentity.cs | 35 +- ..._GetViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...rimeterAccessRule_GetViaIdentityProfile.cs | 35 +- ...NetworkSecurityPerimeterAccessRule_List.cs | 35 +- ...ityPerimeterAssociableResourceType_List.cs | 35 +- ...NetworkSecurityPerimeterAssociation_Get.cs | 35 +- ...rityPerimeterAssociation_GetViaIdentity.cs | 35 +- ..._GetViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...etworkSecurityPerimeterAssociation_List.cs | 35 +- ...tworkSecurityPerimeterLinkReference_Get.cs | 35 +- ...tyPerimeterLinkReference_GetViaIdentity.cs | 35 +- ..._GetViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...workSecurityPerimeterLinkReference_List.cs | 35 +- .../GetAzNetworkSecurityPerimeterLink_Get.cs | 35 +- ...orkSecurityPerimeterLink_GetViaIdentity.cs | 35 +- ..._GetViaIdentityNetworkSecurityPerimeter.cs | 35 +- .../GetAzNetworkSecurityPerimeterLink_List.cs | 35 +- ...etAzNetworkSecurityPerimeterProfile_Get.cs | 35 +- ...SecurityPerimeterProfile_GetViaIdentity.cs | 35 +- ..._GetViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...tAzNetworkSecurityPerimeterProfile_List.cs | 35 +- .../GetAzNetworkSecurityPerimeter_Get.cs | 35 +- ...NetworkSecurityPerimeter_GetViaIdentity.cs | 35 +- .../GetAzNetworkSecurityPerimeter_List.cs | 35 +- .../GetAzNetworkSecurityPerimeter_List1.cs | 35 +- ...tyPerimeterNspAccessRulesReconcile_Post.cs | 552 ++++ ...terNspAccessRulesReconcile_PostExpanded.cs | 542 ++++ ...NspAccessRulesReconcile_PostViaIdentity.cs | 511 ++++ ...sRulesReconcile_PostViaIdentityExpanded.cs | 500 ++++ ...PostViaIdentityNetworkSecurityPerimeter.cs | 532 ++++ ...dentityNetworkSecurityPerimeterExpanded.cs | 521 ++++ ...ssRulesReconcile_PostViaIdentityProfile.cs | 522 ++++ ...econcile_PostViaIdentityProfileExpanded.cs | 511 ++++ ...ccessRulesReconcile_PostViaJsonFilePath.cs | 555 ++++ ...pAccessRulesReconcile_PostViaJsonString.cs | 553 ++++ ...tyPerimeterNspAssociationReconcile_Post.cs | 538 ++++ ...terNspAssociationReconcile_PostExpanded.cs | 528 ++++ ...NspAssociationReconcile_PostViaIdentity.cs | 507 ++++ ...iationReconcile_PostViaIdentityExpanded.cs | 496 ++++ ...PostViaIdentityNetworkSecurityPerimeter.cs | 518 ++++ ...dentityNetworkSecurityPerimeterExpanded.cs | 507 ++++ ...ssociationReconcile_PostViaJsonFilePath.cs | 541 ++++ ...pAssociationReconcile_PostViaJsonString.cs | 539 ++++ ...tworkSecurityPerimeterAccessRule_Create.cs | 35 +- ...urityPerimeterAccessRule_CreateExpanded.cs | 47 +- ...tyPerimeterAccessRule_CreateViaIdentity.cs | 35 +- ...terAccessRule_CreateViaIdentityExpanded.cs | 47 +- ...eateViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...dentityNetworkSecurityPerimeterExpanded.cs | 47 +- ...eterAccessRule_CreateViaIdentityProfile.cs | 35 +- ...ssRule_CreateViaIdentityProfileExpanded.cs | 47 +- ...rimeterAccessRule_CreateViaJsonFilePath.cs | 35 +- ...PerimeterAccessRule_CreateViaJsonString.cs | 35 +- ...workSecurityPerimeterAssociation_Create.cs | 35 +- ...rityPerimeterAssociation_CreateExpanded.cs | 35 +- ...yPerimeterAssociation_CreateViaIdentity.cs | 35 +- ...erAssociation_CreateViaIdentityExpanded.cs | 35 +- ...eateViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...dentityNetworkSecurityPerimeterExpanded.cs | 35 +- ...imeterAssociation_CreateViaJsonFilePath.cs | 35 +- ...erimeterAssociation_CreateViaJsonString.cs | 35 +- ...ewAzNetworkSecurityPerimeterLink_Create.cs | 35 +- ...orkSecurityPerimeterLink_CreateExpanded.cs | 48 +- ...SecurityPerimeterLink_CreateViaIdentity.cs | 35 +- ...PerimeterLink_CreateViaIdentityExpanded.cs | 48 +- ...eateViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...dentityNetworkSecurityPerimeterExpanded.cs | 48 +- ...rityPerimeterLink_CreateViaJsonFilePath.cs | 35 +- ...curityPerimeterLink_CreateViaJsonString.cs | 35 +- ...zNetworkSecurityPerimeterProfile_Create.cs | 35 +- ...SecurityPerimeterProfile_CreateExpanded.cs | 35 +- ...urityPerimeterProfile_CreateViaIdentity.cs | 35 +- ...imeterProfile_CreateViaIdentityExpanded.cs | 35 +- ...eateViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...dentityNetworkSecurityPerimeterExpanded.cs | 35 +- ...yPerimeterProfile_CreateViaJsonFilePath.cs | 35 +- ...ityPerimeterProfile_CreateViaJsonString.cs | 35 +- .../NewAzNetworkSecurityPerimeter_Create.cs | 35 +- ...NetworkSecurityPerimeter_CreateExpanded.cs | 35 +- ...workSecurityPerimeter_CreateViaIdentity.cs | 35 +- ...rityPerimeter_CreateViaIdentityExpanded.cs | 35 +- ...SecurityPerimeter_CreateViaJsonFilePath.cs | 35 +- ...rkSecurityPerimeter_CreateViaJsonString.cs | 35 +- ...tworkSecurityPerimeterAccessRule_Delete.cs | 35 +- ...tyPerimeterAccessRule_DeleteViaIdentity.cs | 35 +- ...leteViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...eterAccessRule_DeleteViaIdentityProfile.cs | 35 +- ...workSecurityPerimeterAssociation_Delete.cs | 35 +- ...yPerimeterAssociation_DeleteViaIdentity.cs | 35 +- ...leteViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...rkSecurityPerimeterLinkReference_Delete.cs | 35 +- ...erimeterLinkReference_DeleteViaIdentity.cs | 35 +- ...leteViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...veAzNetworkSecurityPerimeterLink_Delete.cs | 35 +- ...SecurityPerimeterLink_DeleteViaIdentity.cs | 35 +- ...leteViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...zNetworkSecurityPerimeterProfile_Delete.cs | 35 +- ...urityPerimeterProfile_DeleteViaIdentity.cs | 35 +- ...leteViaIdentityNetworkSecurityPerimeter.cs | 35 +- ...RemoveAzNetworkSecurityPerimeter_Delete.cs | 35 +- ...workSecurityPerimeter_DeleteViaIdentity.cs | 35 +- .../UpdateAzNetworkSecurityPerimeter_Patch.cs | 525 ++++ ...zNetworkSecurityPerimeter_PatchExpanded.cs | 526 ++++ ...tworkSecurityPerimeter_PatchViaIdentity.cs | 502 ++++ ...urityPerimeter_PatchViaIdentityExpanded.cs | 503 ++++ ...kSecurityPerimeter_PatchViaJsonFilePath.cs | 527 ++++ ...orkSecurityPerimeter_PatchViaJsonString.cs | 525 ++++ .../BuildTime/Cmdlets/ExportProxyCmdlet.cs | 4 +- .../BuildTime/Cmdlets/ExportTestStub.cs | 186 +- .../runtime/BuildTime/MarkdownRenderer.cs | 2 +- .../BuildTime/Models/PsProxyOutputs.cs | 26 +- .../runtime/BuildTime/Models/PsProxyTypes.cs | 18 +- .../help/Az.NetworkSecurityPerimeter.md | 9 + .../help/Get-AzNetworkSecurityPerimeter.md | 1 - ...et-AzNetworkSecurityPerimeterAccessRule.md | 3 - ...t-AzNetworkSecurityPerimeterAssociation.md | 2 - .../Get-AzNetworkSecurityPerimeterLink.md | 2 - ...AzNetworkSecurityPerimeterLinkReference.md | 2 - .../Get-AzNetworkSecurityPerimeterProfile.md | 2 - ...ecurityPerimeterNspAccessRulesReconcile.md | 335 +++ ...ecurityPerimeterNspAssociationReconcile.md | 290 +++ .../help/New-AzNetworkSecurityPerimeter.md | 2 - ...ew-AzNetworkSecurityPerimeterAccessRule.md | 36 +- ...w-AzNetworkSecurityPerimeterAssociation.md | 3 - .../New-AzNetworkSecurityPerimeterLink.md | 5 - .../New-AzNetworkSecurityPerimeterProfile.md | 3 - .../help/Remove-AzNetworkSecurityPerimeter.md | 1 - ...ve-AzNetworkSecurityPerimeterAccessRule.md | 3 - ...e-AzNetworkSecurityPerimeterAssociation.md | 2 - .../Remove-AzNetworkSecurityPerimeterLink.md | 2 - ...AzNetworkSecurityPerimeterLinkReference.md | 2 - ...emove-AzNetworkSecurityPerimeterProfile.md | 2 - .../help/Update-AzNetworkSecurityPerimeter.md | 271 ++ ...te-AzNetworkSecurityPerimeterAccessRule.md | 24 +- .../Az.NetworkSecurityPerimeter.internal.psm1 | 4 +- .../New-AzNetworkSecurityPerimeter.ps1 | 2 - ...w-AzNetworkSecurityPerimeterAccessRule.ps1 | 3 +- ...-AzNetworkSecurityPerimeterAssociation.ps1 | 2 - .../New-AzNetworkSecurityPerimeterLink.ps1 | 6 +- .../New-AzNetworkSecurityPerimeterProfile.ps1 | 2 - .../internal/ProxyCmdletDefinitions.ps1 | 15 +- .../test-module.ps1 | 8 +- ...-AzNetworkSecurityPerimeter.Recording.json | 22 +- ...SecurityPerimeterAccessRule.Recording.json | 24 +- ...meterAssociableResourceType.Recording.json | 16 +- ...ecurityPerimeterAssociation.Recording.json | 16 +- ...etworkSecurityPerimeterLink.Recording.json | 16 +- ...urityPerimeterLinkReference.Recording.json | 24 +- ...orkSecurityPerimeterProfile.Recording.json | 16 +- ...PerimeterNspAccessRulesReconcile.Tests.ps1 | 57 + ...PerimeterNspAssociationReconcile.Tests.ps1 | 49 + ...-AzNetworkSecurityPerimeter.Recording.json | 4 +- ...SecurityPerimeterAccessRule.Recording.json | 59 +- ...tworkSecurityPerimeterAccessRule.Tests.ps1 | 9 + ...ecurityPerimeterAssociation.Recording.json | 6 +- ...etworkSecurityPerimeterLink.Recording.json | 4 +- ...orkSecurityPerimeterProfile.Recording.json | 4 +- ...-AzNetworkSecurityPerimeter.Recording.json | 12 +- ...SecurityPerimeterAccessRule.Recording.json | 14 +- ...ecurityPerimeterAssociation.Recording.json | 12 +- ...etworkSecurityPerimeterLink.Recording.json | 32 +- ...urityPerimeterLinkReference.Recording.json | 40 +- ...orkSecurityPerimeterProfile.Recording.json | 12 +- ...pdate-AzNetworkSecurityPerimeter.Tests.ps1 | 41 + ...SecurityPerimeterAccessRule.Recording.json | 208 +- ...tworkSecurityPerimeterAccessRule.Tests.ps1 | 11 + ...ecurityPerimeterAssociation.Recording.json | 24 +- ...etworkSecurityPerimeterLink.Recording.json | 20 +- .../test/loadEnv.ps1 | 2 +- .../utils/Get-SubscriptionIdTestSafe.ps1 | 7 + 1019 files changed, 38127 insertions(+), 4090 deletions(-) create mode 100644 src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md create mode 100644 src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md create mode 100644 src/Network/Network/help/Update-AzNetworkSecurityPerimeter.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/examples/Update-AzNetworkSecurityPerimeter.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.ps1 create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.ps1 create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeter.ps1 create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.PowerShell.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.TypeConverter.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.json.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_Post.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_Post.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_Patch.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentity.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentityExpanded.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonFilePath.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonString.cs create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeter.md create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.Tests.ps1 create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.Tests.ps1 create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeter.Tests.ps1 create mode 100644 src/Network/NetworkSecurityPerimeter.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 diff --git a/src/Network/Network/Az.Network.psd1 b/src/Network/Network/Az.Network.psd1 index be94fd760ff6..452089080bfe 100644 --- a/src/Network/Network/Az.Network.psd1 +++ b/src/Network/Network/Az.Network.psd1 @@ -3,7 +3,7 @@ # # Generated by: Microsoft Corporation # -# Generated on: 5/16/2024 +# Generated on: 6/4/2024 # @{ @@ -61,10 +61,10 @@ RequiredAssemblies = 'Microsoft.Azure.PowerShell.AutoMapper.dll', 'NetworkSecurityPerimeter.Autorest/bin/Az.NetworkSecurityPerimeter.private.dll' # Script files (.ps1) that are run in the caller's environment prior to importing this module. -# ScriptsToProcess = @() +ScriptsToProcess = @() # Type files (.ps1xml) to be loaded when importing this module -# TypesToProcess = @() +TypesToProcess = @() # Format files (.ps1xml) to be loaded when importing this module FormatsToProcess = 'Network.generated.format.ps1xml', @@ -82,6 +82,8 @@ FunctionsToExport = 'Get-AzNetworkSecurityPerimeter', 'Get-AzNetworkSecurityPerimeterLink', 'Get-AzNetworkSecurityPerimeterLinkReference', 'Get-AzNetworkSecurityPerimeterProfile', + 'Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile', + 'Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile', 'New-AzNetworkSecurityPerimeter', 'New-AzNetworkSecurityPerimeterAccessRule', 'New-AzNetworkSecurityPerimeterAssociation', @@ -93,6 +95,7 @@ FunctionsToExport = 'Get-AzNetworkSecurityPerimeter', 'Remove-AzNetworkSecurityPerimeterLink', 'Remove-AzNetworkSecurityPerimeterLinkReference', 'Remove-AzNetworkSecurityPerimeterProfile', + 'Update-AzNetworkSecurityPerimeter', 'Update-AzNetworkSecurityPerimeterAccessRule', 'Update-AzNetworkSecurityPerimeterAssociation', 'Update-AzNetworkSecurityPerimeterLink' @@ -295,6 +298,7 @@ CmdletsToExport = 'Add-AzApplicationGatewayAuthenticationCertificate', 'Get-AzVpnServerConfiguration', 'Get-AzVpnServerConfigurationPolicyGroup', 'Get-AzVpnSite', 'Get-AzVpnSiteLinkConnectionIkeSa', + 'Invoke-AzFirewallPacketCapture', 'Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic', 'Move-AzExpressRouteCircuit', 'New-AzApplicationGateway', 'New-AzApplicationGatewayAuthenticationCertificate', @@ -367,7 +371,9 @@ CmdletsToExport = 'Add-AzApplicationGatewayAuthenticationCertificate', 'New-AzFirewallHubIpAddress', 'New-AzFirewallHubPublicIpAddress', 'New-AzFirewallNatRule', 'New-AzFirewallNatRuleCollection', 'New-AzFirewallNetworkRule', 'New-AzFirewallNetworkRuleCollection', - 'New-AzFirewallPolicy', 'New-AzFirewallPolicyApplicationRule', + 'New-AzFirewallPacketCaptureParameter', + 'New-AzFirewallPacketCaptureRule', 'New-AzFirewallPolicy', + 'New-AzFirewallPolicyApplicationRule', 'New-AzFirewallPolicyApplicationRuleCustomHttpHeader', 'New-AzFirewallPolicyDnsSetting', 'New-AzFirewallPolicyExplicitProxy', @@ -443,6 +449,11 @@ CmdletsToExport = 'Add-AzApplicationGatewayAuthenticationCertificate', 'New-AzServiceEndpointPolicyDefinition', 'New-AzStaticRoute', 'New-AzVHubRoute', 'New-AzVHubRouteTable', 'New-AzVirtualApplianceAdditionalNicProperty', + 'New-AzVirtualApplianceInboundSecurityRulesProperty', + 'New-AzVirtualApplianceInternetIngressIpsProperty', + 'New-AzVirtualApplianceIpConfiguration', + 'New-AzVirtualApplianceNetworkInterfaceConfiguration', + 'New-AzVirtualApplianceNetworkProfile', 'New-AzVirtualApplianceSite', 'New-AzVirtualApplianceSkuProperty', 'New-AzVirtualHub', 'New-AzVirtualHubBgpConnection', 'New-AzVirtualHubRoute', 'New-AzVirtualHubRouteTable', @@ -660,19 +671,11 @@ CmdletsToExport = 'Add-AzApplicationGatewayAuthenticationCertificate', 'Test-AzNetworkWatcherIPFlow', 'Test-AzPrivateIPAddressAvailability', 'Test-AzPrivateLinkServiceVisibility', 'Update-AzCustomIpPrefix', + 'Update-AzNetworkVirtualAppliance', 'Update-AzNetworkVirtualApplianceConnection', - 'New-AzVirtualApplianceInternetIngressIpsProperty', - 'New-AzVirtualApplianceNetworkProfile', - 'New-AzVirtualApplianceNetworkInterfaceConfiguration', - 'New-AzVirtualApplianceIpConfiguration', - 'New-AzVirtualApplianceInboundSecurityRulesProperty', - 'Update-AzVirtualApplianceInboundSecurityRule', - 'New-AzFirewallPacketCaptureRule', - 'New-AzFirewallPacketCaptureParameter', - 'Invoke-AzFirewallPacketCapture', - 'Update-AzNetworkVirtualAppliance', 'Update-AzP2sVpnGateway', - 'Update-AzRouteMap', 'Update-AzRouteServer', + 'Update-AzP2sVpnGateway', 'Update-AzRouteMap', 'Update-AzRouteServer', 'Update-AzRouteServerPeer', 'Update-AzVHubRouteTable', + 'Update-AzVirtualApplianceInboundSecurityRule', 'Update-AzVirtualApplianceSite', 'Update-AzVirtualHub', 'Update-AzVirtualHubBgpConnection', 'Update-AzVirtualHubVnetConnection', @@ -715,7 +718,7 @@ PrivateData = @{ PSData = @{ # Tags applied to this module. These help with module discovery in online galleries. - Tags = 'Azure','ResourceManager','ARM','Network','VirtualNetwork' + Tags = 'Azure', 'ResourceManager', 'ARM', 'Network', 'VirtualNetwork' # A URL to the license for this module. LicenseUri = 'https://aka.ms/azps-license' @@ -751,7 +754,7 @@ PrivateData = @{ } # End of PSData hashtable - } # End of PrivateData hashtable +} # End of PrivateData hashtable # HelpInfo URI of this module # HelpInfoURI = '' diff --git a/src/Network/Network/help/Add-AzApplicationGatewayAuthenticationCertificate.md b/src/Network/Network/help/Add-AzApplicationGatewayAuthenticationCertificate.md index ef444f03d2c6..66fafd0c91c5 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayAuthenticationCertificate.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayAuthenticationCertificate.md @@ -15,7 +15,8 @@ Adds an authentication certificate to an application gateway. ``` Add-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway -Name - -CertificateFile [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -CertificateFile [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -96,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayBackendAddressPool.md b/src/Network/Network/help/Add-AzApplicationGatewayBackendAddressPool.md index 38ead4a90a4e..4d2eaeb6dfc1 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayBackendAddressPool.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayBackendAddressPool.md @@ -16,7 +16,7 @@ Adds a back-end address pool to an application gateway. ``` Add-AzApplicationGatewayBackendAddressPool -ApplicationGateway -Name [-BackendIPAddresses ] [-BackendFqdns ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -118,6 +118,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayBackendHttpSetting.md b/src/Network/Network/help/Add-AzApplicationGatewayBackendHttpSetting.md index a4137c6f1c0c..89b43dc3295e 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayBackendHttpSetting.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayBackendHttpSetting.md @@ -20,7 +20,7 @@ Add-AzApplicationGatewayBackendHttpSetting -ApplicationGateway ] [-TrustedRootCertificate ] [-PickHostNameFromBackendAddress] [-HostName ] [-AffinityCookieName ] [-Path ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -248,6 +248,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol for communication between application gateway and back-end servers. The acceptable values for this parameter are: Http and Https. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayBackendSetting.md b/src/Network/Network/help/Add-AzApplicationGatewayBackendSetting.md index 2a24cbe07217..6570328c8223 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayBackendSetting.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayBackendSetting.md @@ -16,7 +16,8 @@ Adds back-end TCP\TLS settings to an application gateway. Add-AzApplicationGatewayBackendSetting -ApplicationGateway -Name -Port -Protocol [-Timeout ] [-ProbeId ] [-Probe ] [-TrustedRootCertificate ] [-PickHostNameFromBackendAddress] - [-HostName ] [-DefaultProfile ] [] + [-HostName ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -155,6 +156,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol diff --git a/src/Network/Network/help/Add-AzApplicationGatewayCustomError.md b/src/Network/Network/help/Add-AzApplicationGatewayCustomError.md index 9dbaa3913b2e..56cbff684959 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayCustomError.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayCustomError.md @@ -14,7 +14,8 @@ Adds a custom error to an application gateway. ``` Add-AzApplicationGatewayCustomError -ApplicationGateway -StatusCode - -CustomErrorPageUrl [-DefaultProfile ] [] + -CustomErrorPageUrl [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -95,6 +96,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayFrontendIPConfig.md b/src/Network/Network/help/Add-AzApplicationGatewayFrontendIPConfig.md index 259a1cb7c665..effece05b96b 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayFrontendIPConfig.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayFrontendIPConfig.md @@ -17,7 +17,8 @@ Adds a front-end IP configuration to an application gateway. ``` Add-AzApplicationGatewayFrontendIPConfig -ApplicationGateway -Name [-PrivateIPAddress ] [-SubnetId ] [-PublicIPAddressId ] - [-PrivateLinkConfigurationId ] [-DefaultProfile ] [] + [-PrivateLinkConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResource @@ -25,7 +26,7 @@ Add-AzApplicationGatewayFrontendIPConfig -ApplicationGateway -Name [-PrivateIPAddress ] [-Subnet ] [-PublicIPAddress ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -168,6 +169,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIPAddress Specifies the public IP address which this cmdlet adds as a front-end IP address for the application gateway. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayFrontendPort.md b/src/Network/Network/help/Add-AzApplicationGatewayFrontendPort.md index 684b0088e36a..c9cd1d38e2af 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayFrontendPort.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayFrontendPort.md @@ -15,7 +15,7 @@ Adds a front-end port to an application gateway. ``` Add-AzApplicationGatewayFrontendPort -ApplicationGateway -Name -Port - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -94,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzApplicationGatewayHttpListener.md b/src/Network/Network/help/Add-AzApplicationGatewayHttpListener.md index 616f147fcacc..c88789883ee0 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayHttpListener.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayHttpListener.md @@ -20,7 +20,7 @@ Add-AzApplicationGatewayHttpListener -ApplicationGateway [-FirewallPolicyId ] [-SslProfileId ] [-HostName ] [-HostNames ] [-RequireServerNameIndication ] -Protocol [-CustomErrorConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResource @@ -32,7 +32,7 @@ Add-AzApplicationGatewayHttpListener -ApplicationGateway [-SslCertificate ] [-SslProfile ] [-HostName ] [-HostNames ] [-RequireServerNameIndication ] -Protocol [-CustomErrorConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -248,6 +248,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol of the HTTP listener. Both HTTP and HTTPS are supported. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayHttpListenerCustomError.md b/src/Network/Network/help/Add-AzApplicationGatewayHttpListenerCustomError.md index 902febc97cd0..51e8b4798812 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayHttpListenerCustomError.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayHttpListenerCustomError.md @@ -15,7 +15,7 @@ Adds a custom error to a http listener of an application gateway. ``` Add-AzApplicationGatewayHttpListenerCustomError -HttpListener -StatusCode -CustomErrorPageUrl [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayIPConfiguration.md b/src/Network/Network/help/Add-AzApplicationGatewayIPConfiguration.md index 9be338a19f71..ba9d9d1b399b 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayIPConfiguration.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayIPConfiguration.md @@ -16,13 +16,15 @@ Adds an IP configuration to an application gateway. ### SetByResourceId ``` Add-AzApplicationGatewayIPConfiguration -ApplicationGateway -Name - [-SubnetId ] [-DefaultProfile ] [] + [-SubnetId ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResource ``` Add-AzApplicationGatewayIPConfiguration -ApplicationGateway -Name - [-Subnet ] [-DefaultProfile ] [] + [-Subnet ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -91,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet Specifies a subnet. This is the subnet in which the application gateway is deployed. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayListener.md b/src/Network/Network/help/Add-AzApplicationGatewayListener.md index 8d8cf398411d..1f458ad6ea98 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayListener.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayListener.md @@ -18,7 +18,7 @@ Add-AzApplicationGatewayListener -ApplicationGateway -Nam [-FrontendIPConfiguration ] [-FrontendPort ] [-SslCertificate ] [-SslProfile ] -Protocol [-HostNames ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId @@ -26,7 +26,7 @@ Add-AzApplicationGatewayListener -ApplicationGateway -Nam Add-AzApplicationGatewayListener -ApplicationGateway -Name [-FrontendIPConfigurationId ] [-FrontendPortId ] [-SslCertificateId ] [-SslProfileId ] -Protocol [-HostNames ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -164,6 +164,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol diff --git a/src/Network/Network/help/Add-AzApplicationGatewayPrivateLinkConfiguration.md b/src/Network/Network/help/Add-AzApplicationGatewayPrivateLinkConfiguration.md index f3bef7aa6d01..5647fa3305c0 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayPrivateLinkConfiguration.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayPrivateLinkConfiguration.md @@ -15,7 +15,7 @@ Adds a private link configuration to an application gateway. ``` Add-AzApplicationGatewayPrivateLinkConfiguration -ApplicationGateway -Name -IpConfiguration [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -96,6 +96,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzApplicationGatewayProbeConfig.md b/src/Network/Network/help/Add-AzApplicationGatewayProbeConfig.md index 53a3e88199e4..11a67d624b03 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayProbeConfig.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayProbeConfig.md @@ -17,7 +17,7 @@ Add-AzApplicationGatewayProbeConfig -ApplicationGateway - -Protocol [-HostName ] [-Path ] -Interval -Timeout -UnhealthyThreshold [-PickHostNameFromBackendHttpSettings] [-MinServers ] [-Port ] [-Match ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -192,6 +192,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol used to send probe. This cmdlet supports HTTP only. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayRedirectConfiguration.md b/src/Network/Network/help/Add-AzApplicationGatewayRedirectConfiguration.md index 184e8c338cdb..68ea3a132500 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayRedirectConfiguration.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayRedirectConfiguration.md @@ -16,21 +16,22 @@ Adds a redirect configuration to an Application Gateway. ``` Add-AzApplicationGatewayRedirectConfiguration -ApplicationGateway -Name -RedirectType [-TargetListenerID ] [-IncludePath ] [-IncludeQueryString ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` Add-AzApplicationGatewayRedirectConfiguration -ApplicationGateway -Name -RedirectType [-TargetListener ] [-IncludePath ] - [-IncludeQueryString ] [-DefaultProfile ] [] + [-IncludeQueryString ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByURL ``` Add-AzApplicationGatewayRedirectConfiguration -ApplicationGateway -Name -RedirectType [-TargetUrl ] [-IncludePath ] [-IncludeQueryString ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -137,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectType The type of redirect diff --git a/src/Network/Network/help/Add-AzApplicationGatewayRequestRoutingRule.md b/src/Network/Network/help/Add-AzApplicationGatewayRequestRoutingRule.md index e9f63fbf4386..57fcfd5d66b8 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayRequestRoutingRule.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayRequestRoutingRule.md @@ -18,7 +18,8 @@ Adds a request routing rule to an application gateway. Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway -Name -RuleType [-Priority ] [-BackendHttpSettingsId ] [-HttpListenerId ] [-BackendAddressPoolId ] [-UrlPathMapId ] [-RewriteRuleSetId ] - [-RedirectConfigurationId ] [-DefaultProfile ] [] + [-RedirectConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResource @@ -29,7 +30,7 @@ Add-AzApplicationGatewayRequestRoutingRule -ApplicationGateway ] [-UrlPathMap ] [-RewriteRuleSet ] [-RedirectConfiguration ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -198,6 +199,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectConfiguration Application gateway RedirectConfiguration diff --git a/src/Network/Network/help/Add-AzApplicationGatewayRewriteRuleSet.md b/src/Network/Network/help/Add-AzApplicationGatewayRewriteRuleSet.md index 2cb36a51e1d2..0b294096296c 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayRewriteRuleSet.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayRewriteRuleSet.md @@ -15,7 +15,7 @@ Adds a rewrite rule set to an application gateway. ``` Add-AzApplicationGatewayRewriteRuleSet -ApplicationGateway -Name -RewriteRule - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RewriteRule List of rewrite rules diff --git a/src/Network/Network/help/Add-AzApplicationGatewayRoutingRule.md b/src/Network/Network/help/Add-AzApplicationGatewayRoutingRule.md index fea241770a21..d6605dc1dd40 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayRoutingRule.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayRoutingRule.md @@ -17,14 +17,15 @@ Adds a routing rule to an application gateway. Add-AzApplicationGatewayRoutingRule -ApplicationGateway -Name -RuleType -Priority [-BackendSettings ] [-Listener ] [-BackendAddressPool ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId ``` Add-AzApplicationGatewayRoutingRule -ApplicationGateway -Name -RuleType -Priority [-BackendSettingsId ] [-ListenerId ] - [-BackendAddressPoolId ] [-DefaultProfile ] [] + [-BackendAddressPoolId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -193,6 +194,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleType The type of rule diff --git a/src/Network/Network/help/Add-AzApplicationGatewaySslCertificate.md b/src/Network/Network/help/Add-AzApplicationGatewaySslCertificate.md index 171aeb58c036..1e24a21bdb7d 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewaySslCertificate.md +++ b/src/Network/Network/help/Add-AzApplicationGatewaySslCertificate.md @@ -16,7 +16,7 @@ Adds an SSL certificate to an application gateway. ``` Add-AzApplicationGatewaySslCertificate -ApplicationGateway -Name [-CertificateFile ] [-Password ] [-KeyVaultSecretId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -147,6 +147,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzApplicationGatewaySslProfile.md b/src/Network/Network/help/Add-AzApplicationGatewaySslProfile.md index 9f781dad9cf7..02326ea2d8c8 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewaySslProfile.md +++ b/src/Network/Network/help/Add-AzApplicationGatewaySslProfile.md @@ -17,7 +17,7 @@ Add-AzApplicationGatewaySslProfile -ApplicationGateway -N [-SslPolicy ] [-ClientAuthConfiguration ] [-TrustedClientCertificates ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -101,6 +101,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslPolicy SSL policy diff --git a/src/Network/Network/help/Add-AzApplicationGatewayTrustedClientCertificate.md b/src/Network/Network/help/Add-AzApplicationGatewayTrustedClientCertificate.md index c3b6818b7269..fc8d065c2c72 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayTrustedClientCertificate.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayTrustedClientCertificate.md @@ -14,7 +14,8 @@ Adds a trusted client CA certificate chain to an application gateway. ``` Add-AzApplicationGatewayTrustedClientCertificate -ApplicationGateway -Name - -CertificateFile [-DefaultProfile ] [] + -CertificateFile [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -95,6 +96,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzApplicationGatewayTrustedRootCertificate.md b/src/Network/Network/help/Add-AzApplicationGatewayTrustedRootCertificate.md index d6ca63a39a9f..94ac09f51c59 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayTrustedRootCertificate.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayTrustedRootCertificate.md @@ -14,7 +14,8 @@ Adds a trusted root certificate to an application gateway. ``` Add-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway -Name - -CertificateFile [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -CertificateFile [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -97,6 +98,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Add-AzApplicationGatewayUrlPathMapConfig.md b/src/Network/Network/help/Add-AzApplicationGatewayUrlPathMapConfig.md index 34c8b0c30053..c6d17deaf30a 100644 --- a/src/Network/Network/help/Add-AzApplicationGatewayUrlPathMapConfig.md +++ b/src/Network/Network/help/Add-AzApplicationGatewayUrlPathMapConfig.md @@ -20,7 +20,7 @@ Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -DefaultBackendHttpSettings [-DefaultRewriteRuleSet ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### BackendSetByResourceId @@ -28,7 +28,7 @@ Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -Name -PathRules -DefaultBackendAddressPoolId -DefaultBackendHttpSettingsId [-DefaultRewriteRuleSetId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RedirectSetByResource @@ -36,14 +36,15 @@ Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -Name -PathRules [-DefaultRewriteRuleSet ] -DefaultRedirectConfiguration - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RedirectSetByResourceId ``` Add-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -Name -PathRules [-DefaultRewriteRuleSetId ] - -DefaultRedirectConfigurationId [-DefaultProfile ] [] + -DefaultRedirectConfigurationId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -251,6 +252,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzDelegation.md b/src/Network/Network/help/Add-AzDelegation.md index 4360eb29e8d1..c5b53a8d1d6e 100644 --- a/src/Network/Network/help/Add-AzDelegation.md +++ b/src/Network/Network/help/Add-AzDelegation.md @@ -14,7 +14,7 @@ Adds a delegation to a subnet. ``` Add-AzDelegation -Name -ServiceName -Subnet - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -64,6 +64,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ServiceName The name of the service to which the subnet should be delegated diff --git a/src/Network/Network/help/Add-AzExpressRouteCircuitAuthorization.md b/src/Network/Network/help/Add-AzExpressRouteCircuitAuthorization.md index 4cc1b5fbe936..d259d482eaa5 100644 --- a/src/Network/Network/help/Add-AzExpressRouteCircuitAuthorization.md +++ b/src/Network/Network/help/Add-AzExpressRouteCircuitAuthorization.md @@ -15,7 +15,7 @@ Adds an ExpressRoute circuit authorization. ``` Add-AzExpressRouteCircuitAuthorization -Name -ExpressRouteCircuit - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -98,6 +98,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzExpressRouteCircuitConnectionConfig.md b/src/Network/Network/help/Add-AzExpressRouteCircuitConnectionConfig.md index ac42b97a13ff..fae3da6b27e3 100644 --- a/src/Network/Network/help/Add-AzExpressRouteCircuitConnectionConfig.md +++ b/src/Network/Network/help/Add-AzExpressRouteCircuitConnectionConfig.md @@ -17,15 +17,16 @@ Adds a circuit connection configuration to Private Peering of an Express Route C ``` Add-AzExpressRouteCircuitConnectionConfig [-Name] [-ExpressRouteCircuit] [-AddressPrefix] [-AddressPrefixType ] [-AuthorizationKey ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` Add-AzExpressRouteCircuitConnectionConfig [-Name] [-ExpressRouteCircuit] [-PeerExpressRouteCircuitPeering] [-AddressPrefix] [-AddressPrefixType ] - [-AuthorizationKey ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-AuthorizationKey ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -163,6 +164,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Add-AzExpressRouteCircuitPeeringConfig.md b/src/Network/Network/help/Add-AzExpressRouteCircuitPeeringConfig.md index 807de7e1160d..1dca1778acc9 100644 --- a/src/Network/Network/help/Add-AzExpressRouteCircuitPeeringConfig.md +++ b/src/Network/Network/help/Add-AzExpressRouteCircuitPeeringConfig.md @@ -20,7 +20,7 @@ Add-AzExpressRouteCircuitPeeringConfig -Name -ExpressRouteCircuit -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] [-PeerAddressType ] [-LegacyMode ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### MicrosoftPeeringConfigRoutFilterId @@ -30,7 +30,8 @@ Add-AzExpressRouteCircuitPeeringConfig -Name -ExpressRouteCircuit -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] -RouteFilterId [-PeerAddressType ] - [-LegacyMode ] [-DefaultProfile ] [] + [-LegacyMode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### MicrosoftPeeringConfigRoutFilter @@ -40,7 +41,8 @@ Add-AzExpressRouteCircuitPeeringConfig -Name -ExpressRouteCircuit -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] -RouteFilter [-PeerAddressType ] - [-LegacyMode ] [-DefaultProfile ] [] + [-LegacyMode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -257,6 +259,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter This is an existing RouteFilter object. diff --git a/src/Network/Network/help/Add-AzExpressRouteCrossConnectionPeering.md b/src/Network/Network/help/Add-AzExpressRouteCrossConnectionPeering.md index 22498f41a904..7c63a765dcf4 100644 --- a/src/Network/Network/help/Add-AzExpressRouteCrossConnectionPeering.md +++ b/src/Network/Network/help/Add-AzExpressRouteCrossConnectionPeering.md @@ -19,7 +19,8 @@ Add-AzExpressRouteCrossConnectionPeering -Name -PrimaryPeerAddressPrefix -SecondaryPeerAddressPrefix -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefix ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] [-PeerAddressType ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -224,6 +225,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SecondaryPeerAddressPrefix This is the IP Address range for the secondary routing path of this peering relationship. This must be a /30 CIDR subnet. The first odd-numbered address in this subnet should be assigned to your diff --git a/src/Network/Network/help/Add-AzExpressRoutePortAuthorization.md b/src/Network/Network/help/Add-AzExpressRoutePortAuthorization.md index db01a4d6dd31..d6bf56c30931 100644 --- a/src/Network/Network/help/Add-AzExpressRoutePortAuthorization.md +++ b/src/Network/Network/help/Add-AzExpressRoutePortAuthorization.md @@ -14,7 +14,8 @@ Adds an ExpressRoutePort authorization. ``` Add-AzExpressRoutePortAuthorization -Name -ExpressRoutePortObject - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -159,6 +160,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Add-AzLoadBalancerBackendAddressPoolConfig.md b/src/Network/Network/help/Add-AzLoadBalancerBackendAddressPoolConfig.md index f86bdd112e15..38363e55dff8 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerBackendAddressPoolConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerBackendAddressPoolConfig.md @@ -15,8 +15,8 @@ Adds a backend address pool configuration to a load balancer. ``` Add-AzLoadBalancerBackendAddressPoolConfig -LoadBalancer -Name - [-TunnelInterface ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-TunnelInterface ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -TunnelInterface Gateway Load Balancer provider configurations. diff --git a/src/Network/Network/help/Add-AzLoadBalancerFrontendIpConfig.md b/src/Network/Network/help/Add-AzLoadBalancerFrontendIpConfig.md index 8f9225ca243e..be55e276aa96 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerFrontendIpConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerFrontendIpConfig.md @@ -17,42 +17,46 @@ Adds a front-end IP configuration to a load balancer. ``` Add-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-PrivateIpAddress ] [-PrivateIpAddressVersion ] [-Zone ] -Subnet [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdSubnet ``` Add-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-PrivateIpAddress ] [-PrivateIpAddressVersion ] [-Zone ] -SubnetId [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdPublicIpAddress ``` Add-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddressId [-GatewayLoadBalancerId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourcePublicIpAddress ``` Add-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddress [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdPublicIpAddressPrefix ``` Add-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddressPrefixId [-GatewayLoadBalancerId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourcePublicIpAddressPrefix ``` Add-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddressPrefix [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -192,6 +196,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies the public IP address to associate with a front-end IP configuration. diff --git a/src/Network/Network/help/Add-AzLoadBalancerInboundNatPoolConfig.md b/src/Network/Network/help/Add-AzLoadBalancerInboundNatPoolConfig.md index 4c55be25d07a..ee13dbf62bbb 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerInboundNatPoolConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerInboundNatPoolConfig.md @@ -18,8 +18,8 @@ Adds an inbound NAT pool to a load balancer. Add-AzLoadBalancerInboundNatPoolConfig -LoadBalancer -Name -Protocol -FrontendPortRangeStart -FrontendPortRangeEnd -BackendPort [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] - [-FrontendIpConfiguration ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-FrontendIpConfiguration ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceId @@ -27,7 +27,8 @@ Add-AzLoadBalancerInboundNatPoolConfig -LoadBalancer -Name -Name -Protocol -FrontendPortRangeStart -FrontendPortRangeEnd -BackendPort [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfigurationId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -207,6 +208,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol ```yaml Type: System.String diff --git a/src/Network/Network/help/Add-AzLoadBalancerInboundNatRuleConfig.md b/src/Network/Network/help/Add-AzLoadBalancerInboundNatRuleConfig.md index b92cb93cee55..a8cf195edb60 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerInboundNatRuleConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerInboundNatRuleConfig.md @@ -19,7 +19,8 @@ Add-AzLoadBalancerInboundNatRuleConfig -LoadBalancer -Name ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfiguration ] [-FrontendPortRangeStart ] [-FrontendPortRangeEnd ] [-BackendAddressPool ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -28,7 +29,7 @@ Add-AzLoadBalancerInboundNatRuleConfig -LoadBalancer -Name ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfigurationId ] [-FrontendPortRangeStart ] [-FrontendPortRangeEnd ] [-BackendAddressPoolId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -271,6 +272,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that is matched by an inbound NAT rule. The acceptable values for this parameter are: Tcp or Udp. diff --git a/src/Network/Network/help/Add-AzLoadBalancerOutboundRuleConfig.md b/src/Network/Network/help/Add-AzLoadBalancerOutboundRuleConfig.md index 95f407046f95..8ae4897706af 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerOutboundRuleConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerOutboundRuleConfig.md @@ -17,7 +17,8 @@ Adds an outbound rule configuration to a load balancer. Add-AzLoadBalancerOutboundRuleConfig -LoadBalancer -Name [-AllocatedOutboundPort ] -Protocol [-EnableTcpReset] [-IdleTimeoutInMinutes ] -FrontendIpConfiguration -BackendAddressPool - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -25,7 +26,8 @@ Add-AzLoadBalancerOutboundRuleConfig -LoadBalancer -Name -Name [-AllocatedOutboundPort ] -Protocol [-EnableTcpReset] [-IdleTimeoutInMinutes ] -FrontendIpConfiguration -BackendAddressPoolId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -182,6 +184,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol - TCP, UDP or All diff --git a/src/Network/Network/help/Add-AzLoadBalancerProbeConfig.md b/src/Network/Network/help/Add-AzLoadBalancerProbeConfig.md index ec0736e1b9e0..7626ffb7350a 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerProbeConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerProbeConfig.md @@ -16,7 +16,8 @@ Adds a probe configuration to a load balancer. ``` Add-AzLoadBalancerProbeConfig -LoadBalancer -Name [-Protocol ] -Port -IntervalInSeconds -ProbeCount [-ProbeThreshold ] [-RequestPath ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -139,6 +140,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol to use for the probe. The acceptable values for this parameter are: Tcp or Http. diff --git a/src/Network/Network/help/Add-AzLoadBalancerRuleConfig.md b/src/Network/Network/help/Add-AzLoadBalancerRuleConfig.md index 3d16dc741360..4ab9a00c7595 100644 --- a/src/Network/Network/help/Add-AzLoadBalancerRuleConfig.md +++ b/src/Network/Network/help/Add-AzLoadBalancerRuleConfig.md @@ -19,7 +19,8 @@ Add-AzLoadBalancerRuleConfig -LoadBalancer -Name [-Pro [-LoadDistribution ] [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-DisableOutboundSNAT] [-FrontendIpConfiguration ] [-BackendAddressPool ] - [-Probe ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Probe ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByResourceId @@ -27,8 +28,8 @@ Add-AzLoadBalancerRuleConfig -LoadBalancer -Name [-Pro Add-AzLoadBalancerRuleConfig -LoadBalancer -Name [-Protocol ] [-LoadDistribution ] [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-DisableOutboundSNAT] [-FrontendIpConfigurationId ] - [-BackendAddressPoolId ] [-ProbeId ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-BackendAddressPoolId ] [-ProbeId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -305,6 +306,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that is matched by a load balancer rule. The acceptable values for this parameter are: Tcp or Udp. diff --git a/src/Network/Network/help/Add-AzNetworkInterfaceIpConfig.md b/src/Network/Network/help/Add-AzNetworkInterfaceIpConfig.md index 09ba7d2d5ef7..ff24acdd8fb9 100644 --- a/src/Network/Network/help/Add-AzNetworkInterfaceIpConfig.md +++ b/src/Network/Network/help/Add-AzNetworkInterfaceIpConfig.md @@ -21,7 +21,7 @@ Add-AzNetworkInterfaceIpConfig -Name -NetworkInterface ] [-ApplicationGatewayBackendAddressPool ] [-ApplicationSecurityGroup ] [-GatewayLoadBalancerId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId @@ -30,7 +30,8 @@ Add-AzNetworkInterfaceIpConfig -Name -NetworkInterface ] [-PrivateIpAddress ] [-Primary] [-SubnetId ] [-PublicIpAddressId ] [-LoadBalancerBackendAddressPoolId ] [-LoadBalancerInboundNatRuleId ] [-ApplicationGatewayBackendAddressPoolId ] - [-ApplicationSecurityGroupId ] [-DefaultProfile ] [] + [-ApplicationSecurityGroupId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -284,6 +285,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies a **PublicIPAddress** object. This cmdlet creates a reference to a public IP Address to associate with this network interface IP configuration. diff --git a/src/Network/Network/help/Add-AzNetworkInterfaceTapConfig.md b/src/Network/Network/help/Add-AzNetworkInterfaceTapConfig.md index 603621613d72..eb9fc0dbb9f1 100644 --- a/src/Network/Network/help/Add-AzNetworkInterfaceTapConfig.md +++ b/src/Network/Network/help/Add-AzNetworkInterfaceTapConfig.md @@ -15,15 +15,15 @@ Creates a TapConfiguration resource associated to a NetworkInterface. This will ### SetByResource (Default) ``` Add-AzNetworkInterfaceTapConfig -NetworkInterface -Name - [-VirtualNetworkTap ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-VirtualNetworkTap ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceId ``` Add-AzNetworkInterfaceTapConfig -NetworkInterface -Name - [-VirtualNetworkTapId ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-VirtualNetworkTapId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: True (ByPropertyName, ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkTap The reference of the virtual network tap resource. diff --git a/src/Network/Network/help/Add-AzNetworkSecurityRuleConfig.md b/src/Network/Network/help/Add-AzNetworkSecurityRuleConfig.md index bee4c4256b4d..371ec89532b1 100644 --- a/src/Network/Network/help/Add-AzNetworkSecurityRuleConfig.md +++ b/src/Network/Network/help/Add-AzNetworkSecurityRuleConfig.md @@ -20,7 +20,8 @@ Add-AzNetworkSecurityRuleConfig -Name -NetworkSecurityGroup ] [-DestinationAddressPrefix ] [-SourceApplicationSecurityGroup ] [-DestinationApplicationSecurityGroup ] [-Access ] [-Priority ] - [-Direction ] [-DefaultProfile ] [] + [-Direction ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResourceId @@ -30,7 +31,7 @@ Add-AzNetworkSecurityRuleConfig -Name -NetworkSecurityGroup ] [-DestinationAddressPrefix ] [-SourceApplicationSecurityGroupId ] [-DestinationApplicationSecurityGroupId ] [-Access ] [-Priority ] [-Direction ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -247,6 +248,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the network protocol that a rule configuration applies to. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/Add-AzRouteConfig.md b/src/Network/Network/help/Add-AzRouteConfig.md index b3d17615e243..7e4c65724eea 100644 --- a/src/Network/Network/help/Add-AzRouteConfig.md +++ b/src/Network/Network/help/Add-AzRouteConfig.md @@ -15,8 +15,8 @@ Adds a route to a route table. ``` Add-AzRouteConfig -RouteTable [-Name ] [-AddressPrefix ] [-NextHopType ] - [-NextHopIpAddress ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-NextHopIpAddress ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -189,6 +189,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteTable Specifies the route table to which this cmdlet adds a route. diff --git a/src/Network/Network/help/Add-AzRouteFilterRuleConfig.md b/src/Network/Network/help/Add-AzRouteFilterRuleConfig.md index 47f54bb1ef60..a0ded67c35d1 100644 --- a/src/Network/Network/help/Add-AzRouteFilterRuleConfig.md +++ b/src/Network/Network/help/Add-AzRouteFilterRuleConfig.md @@ -14,8 +14,8 @@ Adds a route filter rule to a route filter. ``` Add-AzRouteFilterRuleConfig -RouteFilter [-Force] -Name -Access - -RouteFilterRuleType -CommunityList [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -RouteFilterRuleType -CommunityList [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter Specifies the route filter to which this cmdlet adds a route filter rule. diff --git a/src/Network/Network/help/Add-AzRouteServerPeer.md b/src/Network/Network/help/Add-AzRouteServerPeer.md index 6a70d66b2d50..2a761b16c8aa 100644 --- a/src/Network/Network/help/Add-AzRouteServerPeer.md +++ b/src/Network/Network/help/Add-AzRouteServerPeer.md @@ -15,14 +15,15 @@ Add a peer to an Azure RouteServer ### RouteServerNPeerNameParameterSet (Default) ``` Add-AzRouteServerPeer -ResourceGroupName -PeerName -PeerIp -PeerAsn - [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### RouteServerNameParameterSet ``` Add-AzRouteServerPeer -ResourceGroupName -PeerName -PeerIp -PeerAsn - -RouteServerName [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -RouteServerName [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -127,6 +128,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server/peer. diff --git a/src/Network/Network/help/Add-AzRoutingPolicy.md b/src/Network/Network/help/Add-AzRoutingPolicy.md index 104efb411a3b..9ddede72f4c9 100644 --- a/src/Network/Network/help/Add-AzRoutingPolicy.md +++ b/src/Network/Network/help/Add-AzRoutingPolicy.md @@ -14,7 +14,8 @@ Add a Routing Policy to the Routing Intent object. ``` Add-AzRoutingPolicy -RoutingIntent -Destination -NextHop -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -113,6 +114,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutingIntent The routing intent resource to which this rouing policy has to be added. diff --git a/src/Network/Network/help/Add-AzServiceEndpointPolicyDefinition.md b/src/Network/Network/help/Add-AzServiceEndpointPolicyDefinition.md index aacfe1d12b81..bef59b4f9468 100644 --- a/src/Network/Network/help/Add-AzServiceEndpointPolicyDefinition.md +++ b/src/Network/Network/help/Add-AzServiceEndpointPolicyDefinition.md @@ -15,7 +15,8 @@ Adds a service endpoint policy definition to a specified policy. ``` Add-AzServiceEndpointPolicyDefinition -Name -ServiceEndpointPolicy [-Description ] [-ServiceResource ] [-Service ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -78,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Service Name of the service diff --git a/src/Network/Network/help/Add-AzVirtualHubRoute.md b/src/Network/Network/help/Add-AzVirtualHubRoute.md index 06206cc9b9a5..c91a233b3115 100644 --- a/src/Network/Network/help/Add-AzVirtualHubRoute.md +++ b/src/Network/Network/help/Add-AzVirtualHubRoute.md @@ -14,7 +14,8 @@ Creates a VirtualHubRoute object which can be passed as parameter to the Add-AzV ``` Add-AzVirtualHubRoute -Destination -DestinationType -NextHop - -NextHopType [-DefaultProfile ] [] + -NextHopType [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -115,6 +116,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Add-AzVirtualHubRouteTable.md b/src/Network/Network/help/Add-AzVirtualHubRouteTable.md index 286cee400693..215d129c045b 100644 --- a/src/Network/Network/help/Add-AzVirtualHubRouteTable.md +++ b/src/Network/Network/help/Add-AzVirtualHubRouteTable.md @@ -14,7 +14,7 @@ Creates a Virtual Hub Route Table resource which is a child of VirtualHub. ``` Add-AzVirtualHubRouteTable -Name -Route -Connection - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -86,6 +86,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Route List of virtual hub routes. diff --git a/src/Network/Network/help/Add-AzVirtualNetworkGatewayIpConfig.md b/src/Network/Network/help/Add-AzVirtualNetworkGatewayIpConfig.md index 3f6baeb161d5..c9c2b744d3f6 100644 --- a/src/Network/Network/help/Add-AzVirtualNetworkGatewayIpConfig.md +++ b/src/Network/Network/help/Add-AzVirtualNetworkGatewayIpConfig.md @@ -17,14 +17,16 @@ Adds an IP configuration to a virtual network gateway. ``` Add-AzVirtualNetworkGatewayIpConfig -VirtualNetworkGateway -Name [-PrivateIpAddress ] [-SubnetId ] [-PublicIpAddressId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResource ``` Add-AzVirtualNetworkGatewayIpConfig -VirtualNetworkGateway -Name [-PrivateIpAddress ] [-Subnet ] [-PublicIpAddress ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -133,6 +135,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies the public IP address. diff --git a/src/Network/Network/help/Add-AzVirtualNetworkPeering.md b/src/Network/Network/help/Add-AzVirtualNetworkPeering.md index 81e4d05b02f2..e5261200d9ee 100644 --- a/src/Network/Network/help/Add-AzVirtualNetworkPeering.md +++ b/src/Network/Network/help/Add-AzVirtualNetworkPeering.md @@ -16,7 +16,7 @@ Creates a peering between two virtual networks. ``` Add-AzVirtualNetworkPeering -Name -VirtualNetwork -RemoteVirtualNetworkId [-BlockVirtualNetworkAccess] [-AllowForwardedTraffic] [-AllowGatewayTransit] [-UseRemoteGateways] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -163,6 +163,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RemoteVirtualNetworkId Specifies the ID of the remote virtual network. diff --git a/src/Network/Network/help/Add-AzVirtualNetworkSubnetConfig.md b/src/Network/Network/help/Add-AzVirtualNetworkSubnetConfig.md index 5b51dafbd480..a4c646c5f950 100644 --- a/src/Network/Network/help/Add-AzVirtualNetworkSubnetConfig.md +++ b/src/Network/Network/help/Add-AzVirtualNetworkSubnetConfig.md @@ -20,7 +20,8 @@ Add-AzVirtualNetworkSubnetConfig -Name -VirtualNetwork ] [-ServiceEndpointPolicy ] [-Delegation ] [-PrivateEndpointNetworkPoliciesFlag ] [-PrivateLinkServiceNetworkPoliciesFlag ] [-IpAllocation ] - [-DefaultOutboundAccess ] [-DefaultProfile ] [] + [-DefaultOutboundAccess ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResourceId @@ -30,7 +31,8 @@ Add-AzVirtualNetworkSubnetConfig -Name -VirtualNetwork ] [-ServiceEndpointPolicy ] [-Delegation ] [-PrivateEndpointNetworkPoliciesFlag ] [-PrivateLinkServiceNetworkPoliciesFlag ] [-IpAllocation ] - [-DefaultOutboundAccess ] [-DefaultProfile ] [] + [-DefaultOutboundAccess ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -230,6 +232,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Specifies the Id of NAT Gateway resource associated with the subnet configuration. diff --git a/src/Network/Network/help/Add-AzVirtualRouterPeer.md b/src/Network/Network/help/Add-AzVirtualRouterPeer.md index c6cac04d4f99..77361484ab63 100644 --- a/src/Network/Network/help/Add-AzVirtualRouterPeer.md +++ b/src/Network/Network/help/Add-AzVirtualRouterPeer.md @@ -14,8 +14,8 @@ Add a Peer to an Azure VirtualRouter ``` Add-AzVirtualRouterPeer -ResourceGroupName -PeerName -PeerIp -PeerAsn - -VirtualRouterName [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -VirtualRouterName [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -120,6 +120,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router/peer. diff --git a/src/Network/Network/help/Add-AzVpnClientRevokedCertificate.md b/src/Network/Network/help/Add-AzVpnClientRevokedCertificate.md index 03779990c727..3c4674fc39ec 100644 --- a/src/Network/Network/help/Add-AzVpnClientRevokedCertificate.md +++ b/src/Network/Network/help/Add-AzVpnClientRevokedCertificate.md @@ -16,7 +16,7 @@ Adds a VPN client-revocation certificate. ``` Add-AzVpnClientRevokedCertificate -VpnClientRevokedCertificateName -VirtualNetworkGatewayName -ResourceGroupName -Thumbprint [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -51,6 +51,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that the virtual network gateway is assigned to. Resource groups categorize items to help simplify inventory management and general Azure administration. diff --git a/src/Network/Network/help/Add-AzVpnClientRootCertificate.md b/src/Network/Network/help/Add-AzVpnClientRootCertificate.md index 96f00e9e5893..7d4df834dfc5 100644 --- a/src/Network/Network/help/Add-AzVpnClientRootCertificate.md +++ b/src/Network/Network/help/Add-AzVpnClientRootCertificate.md @@ -16,7 +16,7 @@ Adds a VPN client root certificate. ``` Add-AzVpnClientRootCertificate -VpnClientRootCertificateName -VirtualNetworkGatewayName -ResourceGroupName -PublicCertData [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +61,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicCertData Specifies the text representation of the root certificate to be added. To obtain the text representation, export your certificate in .cer format (using Base64 encoding), then open the resulting file in a text editor. diff --git a/src/Network/Network/help/Approve-AzPrivateEndpointConnection.md b/src/Network/Network/help/Approve-AzPrivateEndpointConnection.md index aa552989985d..fc0b39fce4ec 100644 --- a/src/Network/Network/help/Approve-AzPrivateEndpointConnection.md +++ b/src/Network/Network/help/Approve-AzPrivateEndpointConnection.md @@ -15,14 +15,14 @@ Approves a private endpoint connection. ### ByResourceId (Default) ``` Approve-AzPrivateEndpointConnection [-Description ] -ResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByResource ``` Approve-AzPrivateEndpointConnection -Name [-Description ] -ResourceGroupName - -ServiceName [-DefaultProfile ] -PrivateLinkResourceType - [] + -ServiceName [-DefaultProfile ] [-ProgressAction ] + -PrivateLinkResourceType [] ``` ## DESCRIPTION @@ -100,6 +100,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Az.Network.md b/src/Network/Network/help/Az.Network.md index 59607d2cbeb8..3e7b78fa38a3 100644 --- a/src/Network/Network/help/Az.Network.md +++ b/src/Network/Network/help/Az.Network.md @@ -167,6 +167,9 @@ Adds a VPN client root certificate. ### [Approve-AzPrivateEndpointConnection](Approve-AzPrivateEndpointConnection.md) Approves a private endpoint connection. +### [Convert-AzNetworkWatcherClassicConnectionMonitor](Convert-AzNetworkWatcherClassicConnectionMonitor.md) +Convert a classic connection monitor into connection monitor v2 with specified name. + ### [Deny-AzPrivateEndpointConnection](Deny-AzPrivateEndpointConnection.md) denies a private endpoint connection. @@ -509,6 +512,28 @@ Gets an existing network profile top level resource ### [Get-AzNetworkSecurityGroup](Get-AzNetworkSecurityGroup.md) Gets a network security group. +### [Get-AzNetworkSecurityPerimeter](Get-AzNetworkSecurityPerimeter.md) +Gets the specified network security perimeter by the name. + +### [Get-AzNetworkSecurityPerimeterAccessRule](Get-AzNetworkSecurityPerimeterAccessRule.md) +Gets the specified NSP access rule by name. + +### [Get-AzNetworkSecurityPerimeterAssociableResourceType](Get-AzNetworkSecurityPerimeterAssociableResourceType.md) +Gets the list of resources that are onboarded with NSP. +These resources can be associated with a network security perimeter + +### [Get-AzNetworkSecurityPerimeterAssociation](Get-AzNetworkSecurityPerimeterAssociation.md) +Gets the specified NSP association by name. + +### [Get-AzNetworkSecurityPerimeterLink](Get-AzNetworkSecurityPerimeterLink.md) +Gets the specified NSP link resource. + +### [Get-AzNetworkSecurityPerimeterLinkReference](Get-AzNetworkSecurityPerimeterLinkReference.md) +Gets the specified NSP linkReference resource. + +### [Get-AzNetworkSecurityPerimeterProfile](Get-AzNetworkSecurityPerimeterProfile.md) +Gets the specified NSP profile. + ### [Get-AzNetworkSecurityRuleConfig](Get-AzNetworkSecurityRuleConfig.md) Get a network security rule configuration for a network security group. @@ -782,6 +807,15 @@ This is an RM representation of customer branches that are uploaded to Azure for ### [Get-AzVpnSiteLinkConnectionIkeSa](Get-AzVpnSiteLinkConnectionIkeSa.md) Get IKE Security Associations of VPN Site Link Connections +### [Invoke-AzFirewallPacketCapture](Invoke-AzFirewallPacketCapture.md) +Invoke Packet Capture on Azure Firewall + +### [Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile](Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md) +Reconcile NSP access rules + +### [Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile](Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md) +Reconcile NSP association + ### [Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic](Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic.md) Invoke network configuration diagnostic session for specified network profiles on target resource. @@ -878,6 +912,9 @@ Creates a front-end IP configuration for an application gateway. ### [New-AzApplicationGatewayFrontendPort](New-AzApplicationGatewayFrontendPort.md) Creates a front-end port for an application gateway. +### [New-AzApplicationGatewayHeaderValueMatcher](New-AzApplicationGatewayHeaderValueMatcher.md) +Creates a **HeaderValueMatcher** object configuration to use in **ApplicationGatewayRewriteRuleHeaderConfiguration** for an application gateway. + ### [New-AzApplicationGatewayHttpListener](New-AzApplicationGatewayHttpListener.md) Creates an HTTP listener for an application gateway. @@ -1029,13 +1066,10 @@ Creates a Firewall Network Rule. Creates a Azure Firewall Network Collection of Network rules. ### [New-AzFirewallPacketCaptureParameter](New-AzFirewallPacketCaptureParameter.md) -Creates a Azure Firewall Packet Capture Parameter. +Create a Packet Capture Parameter for Azure Firewall ### [New-AzFirewallPacketCaptureRule](New-AzFirewallPacketCaptureRule.md) -Creates a Azure Firewall Packet Capture Rule. - -### [Invoke-AzFirewallPacketCapture](Invoke-AzFirewallPacketCapture.md) -Invoke a Packet Capture request on Azure Firewall. +Creates a Packet Capture Rule for Azure Firewall ### [New-AzFirewallPolicy](New-AzFirewallPolicy.md) Creates a new Azure Firewall Policy @@ -1205,6 +1239,21 @@ Creates a new network profile. ### [New-AzNetworkSecurityGroup](New-AzNetworkSecurityGroup.md) Creates a network security group. +### [New-AzNetworkSecurityPerimeter](New-AzNetworkSecurityPerimeter.md) +Create a Network Security Perimeter. + +### [New-AzNetworkSecurityPerimeterAccessRule](New-AzNetworkSecurityPerimeterAccessRule.md) +Create a network access rule. + +### [New-AzNetworkSecurityPerimeterAssociation](New-AzNetworkSecurityPerimeterAssociation.md) +Create a NSP resource association. + +### [New-AzNetworkSecurityPerimeterLink](New-AzNetworkSecurityPerimeterLink.md) +Create NSP link resource. + +### [New-AzNetworkSecurityPerimeterProfile](New-AzNetworkSecurityPerimeterProfile.md) +Create a network profile. + ### [New-AzNetworkSecurityRuleConfig](New-AzNetworkSecurityRuleConfig.md) Creates a network security rule configuration. @@ -1365,6 +1414,21 @@ Creates a hub route table resource associated with a VirtualHub. ### [New-AzVirtualApplianceAdditionalNicProperty](New-AzVirtualApplianceAdditionalNicProperty.md) Define a Network Virtual Appliance Additional Nic Property for the resource. +### [New-AzVirtualApplianceInboundSecurityRulesProperty](New-AzVirtualApplianceInboundSecurityRulesProperty.md) +Define Inbound Security Rules Property + +### [New-AzVirtualApplianceInternetIngressIpsProperty](New-AzVirtualApplianceInternetIngressIpsProperty.md) +Define a Network Virtual Appliance Internet Ingress IPs Property for the resource. + +### [New-AzVirtualApplianceIpConfiguration](New-AzVirtualApplianceIpConfiguration.md) +Defines an IP configuration for an interface of virtual appliance. + +### [New-AzVirtualApplianceNetworkInterfaceConfiguration](New-AzVirtualApplianceNetworkInterfaceConfiguration.md) +Defines a Interface Configuration for Network Profile of Virtual Appliance. + +### [New-AzVirtualApplianceNetworkProfile](New-AzVirtualApplianceNetworkProfile.md) +Define a Network Profile for virtual appliance. + ### [New-AzVirtualApplianceSite](New-AzVirtualApplianceSite.md) Create a site connected to a Network Virtual Appliance. @@ -1696,6 +1760,24 @@ Removes a network profile. ### [Remove-AzNetworkSecurityGroup](Remove-AzNetworkSecurityGroup.md) Removes a network security group. +### [Remove-AzNetworkSecurityPerimeter](Remove-AzNetworkSecurityPerimeter.md) +Deletes a network security perimeter. + +### [Remove-AzNetworkSecurityPerimeterAccessRule](Remove-AzNetworkSecurityPerimeterAccessRule.md) +Deletes an NSP access rule. + +### [Remove-AzNetworkSecurityPerimeterAssociation](Remove-AzNetworkSecurityPerimeterAssociation.md) +Deletes an NSP association resource. + +### [Remove-AzNetworkSecurityPerimeterLink](Remove-AzNetworkSecurityPerimeterLink.md) +Deletes an NSP Link resource. + +### [Remove-AzNetworkSecurityPerimeterLinkReference](Remove-AzNetworkSecurityPerimeterLinkReference.md) +Deletes an NSP LinkReference resource. + +### [Remove-AzNetworkSecurityPerimeterProfile](Remove-AzNetworkSecurityPerimeterProfile.md) +Deletes an NSP profile. + ### [Remove-AzNetworkSecurityRuleConfig](Remove-AzNetworkSecurityRuleConfig.md) Removes a network security rule from a network security group. @@ -2236,9 +2318,24 @@ The **Test-AzPrivateLinkServiceVisibility** checks whether a private link servic ### [Update-AzCustomIpPrefix](Update-AzCustomIpPrefix.md) Updates a CustomIpPrefix +### [Update-AzNetworkSecurityPerimeter](Update-AzNetworkSecurityPerimeter.md) +Patch Tags for a Network Security Perimeter. + +### [Update-AzNetworkSecurityPerimeterAccessRule](Update-AzNetworkSecurityPerimeterAccessRule.md) +Updates an access rule. + +### [Update-AzNetworkSecurityPerimeterAssociation](Update-AzNetworkSecurityPerimeterAssociation.md) +Updates an association + +### [Update-AzNetworkSecurityPerimeterLink](Update-AzNetworkSecurityPerimeterLink.md) +Updates a NSP Link + ### [Update-AzNetworkVirtualAppliance](Update-AzNetworkVirtualAppliance.md) Update or Change a Network Virtual Appliance resource. +### [Update-AzNetworkVirtualApplianceConnection](Update-AzNetworkVirtualApplianceConnection.md) +Update or Change a Network Virtual Appliance Connection resource. + ### [Update-AzP2sVpnGateway](Update-AzP2sVpnGateway.md) Update an existing P2SVpnGateway under VirtualHub for point to site connectivity. @@ -2254,6 +2351,9 @@ Update a Peer in an Azure RouteServer ### [Update-AzVHubRouteTable](Update-AzVHubRouteTable.md) Delete a hub route table resource associated with a VirtualHub. +### [Update-AzVirtualApplianceInboundSecurityRule](Update-AzVirtualApplianceInboundSecurityRule.md) +Update the Inbound Security Rule of a Network Virtual Appliance Resource + ### [Update-AzVirtualApplianceSite](Update-AzVirtualApplianceSite.md) Change or Modify a Virtual Appliance site connected to a Network Virtual Appliance resource. diff --git a/src/Network/Network/help/Convert-AzNetworkWatcherClassicConnectionMonitor.md b/src/Network/Network/help/Convert-AzNetworkWatcherClassicConnectionMonitor.md index 1488212a86e6..886b1e0930fe 100644 --- a/src/Network/Network/help/Convert-AzNetworkWatcherClassicConnectionMonitor.md +++ b/src/Network/Network/help/Convert-AzNetworkWatcherClassicConnectionMonitor.md @@ -14,7 +14,8 @@ Convert a classic connection monitor into connection monitor v2 with specified n ``` Convert-AzNetworkWatcherClassicConnectionMonitor -NetworkWatcherName -ResourceGroupName - -Name [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -Name [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -46,7 +47,6 @@ This Connection Monitor is already V2 Passing the V2 connection monitor name and corresponding network watcher name and its resource group name. - ## PARAMETERS ### -DefaultProfile @@ -94,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. @@ -109,6 +124,35 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Deny-AzPrivateEndpointConnection.md b/src/Network/Network/help/Deny-AzPrivateEndpointConnection.md index c7f1d214e70a..f8a695a80767 100644 --- a/src/Network/Network/help/Deny-AzPrivateEndpointConnection.md +++ b/src/Network/Network/help/Deny-AzPrivateEndpointConnection.md @@ -15,14 +15,14 @@ denies a private endpoint connection. ### ByResourceId (Default) ``` Deny-AzPrivateEndpointConnection [-Description ] -ResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByResource ``` Deny-AzPrivateEndpointConnection -Name [-Description ] -ResourceGroupName - -ServiceName [-DefaultProfile ] -PrivateLinkResourceType - [] + -ServiceName [-DefaultProfile ] [-ProgressAction ] + -PrivateLinkResourceType [] ``` ## DESCRIPTION @@ -100,6 +100,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Deploy-AzNetworkManagerCommit.md b/src/Network/Network/help/Deploy-AzNetworkManagerCommit.md index df83b89aa403..4c006b2a230b 100644 --- a/src/Network/Network/help/Deploy-AzNetworkManagerCommit.md +++ b/src/Network/Network/help/Deploy-AzNetworkManagerCommit.md @@ -14,8 +14,8 @@ Deploys a network manager commit. ``` Deploy-AzNetworkManagerCommit -Name -ResourceGroupName -TargetLocation - [-ConfigurationId ] -CommitType [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-ConfigurationId ] -CommitType [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -112,6 +112,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Disconnect-AzP2SVpnGatewayVpnConnection.md b/src/Network/Network/help/Disconnect-AzP2SVpnGatewayVpnConnection.md index c851eef987b9..a507584b77d0 100644 --- a/src/Network/Network/help/Disconnect-AzP2SVpnGatewayVpnConnection.md +++ b/src/Network/Network/help/Disconnect-AzP2SVpnGatewayVpnConnection.md @@ -15,19 +15,22 @@ Disconnect given connected vpn client connections with a given p2s vpn gateway ### ByP2SVpnGatewayName (Default) ``` Disconnect-AzP2SVpnGatewayVpnConnection -ResourceGroupName -Name -VpnConnectionId - [-AsJob] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByP2SVpnGatewayResourceId ``` Disconnect-AzP2SVpnGatewayVpnConnection -ResourceId -VpnConnectionId [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByP2SVpnGatewayObject ``` Disconnect-AzP2SVpnGatewayVpnConnection -InputObject -VpnConnectionId [-AsJob] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -146,6 +149,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Disconnect-AzVirtualNetworkGatewayVpnConnection.md b/src/Network/Network/help/Disconnect-AzVirtualNetworkGatewayVpnConnection.md index e82a00d21014..38c3dd497d0f 100644 --- a/src/Network/Network/help/Disconnect-AzVirtualNetworkGatewayVpnConnection.md +++ b/src/Network/Network/help/Disconnect-AzVirtualNetworkGatewayVpnConnection.md @@ -15,21 +15,22 @@ Disconnect given connected vpn client connections with a given virtual network g ### ByFactoryName (Default) ``` Disconnect-AzVirtualNetworkGatewayVpnConnection -VirtualNetworkGatewayName -ResourceGroupName - -VpnConnectionId [-AsJob] [-PassThru] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -VpnConnectionId [-AsJob] [-PassThru] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` Disconnect-AzVirtualNetworkGatewayVpnConnection -ResourceId -VpnConnectionId [-AsJob] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByFactoryObject ``` Disconnect-AzVirtualNetworkGatewayVpnConnection [-InputObject ] - -VpnConnectionId [-AsJob] [-PassThru] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -VpnConnectionId [-AsJob] [-PassThru] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -104,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual network gateway resource group's name diff --git a/src/Network/Network/help/Get-AzApplicationGateway.md b/src/Network/Network/help/Get-AzApplicationGateway.md index bd0f87352b94..0b2a05bd397b 100644 --- a/src/Network/Network/help/Get-AzApplicationGateway.md +++ b/src/Network/Network/help/Get-AzApplicationGateway.md @@ -15,7 +15,7 @@ Gets an application gateway. ``` Get-AzApplicationGateway [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -299,6 +299,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the application gateway. diff --git a/src/Network/Network/help/Get-AzApplicationGatewayAuthenticationCertificate.md b/src/Network/Network/help/Get-AzApplicationGatewayAuthenticationCertificate.md index 6f1590e41c0e..0b6b646073c7 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayAuthenticationCertificate.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayAuthenticationCertificate.md @@ -15,7 +15,7 @@ Gets an authentication certificate for an application gateway. ``` Get-AzApplicationGatewayAuthenticationCertificate [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayAutoscaleConfiguration.md b/src/Network/Network/help/Get-AzApplicationGatewayAutoscaleConfiguration.md index 67653cea6036..0cd4bd2eee9a 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayAutoscaleConfiguration.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayAutoscaleConfiguration.md @@ -14,7 +14,7 @@ Gets the Autoscale Configuration of the Application Gateway. ``` Get-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -64,6 +64,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayAvailableServerVariableAndHeader.md b/src/Network/Network/help/Get-AzApplicationGatewayAvailableServerVariableAndHeader.md index ae2d64398b9e..722fad48c490 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayAvailableServerVariableAndHeader.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayAvailableServerVariableAndHeader.md @@ -14,7 +14,7 @@ Get the supported server variables and available request and response headers. ``` Get-AzApplicationGatewayAvailableServerVariableAndHeader [-DefaultProfile ] - [-ServerVariable] [-RequestHeader] [-ResponseHeader] [] + [-ServerVariable] [-RequestHeader] [-ResponseHeader] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -74,6 +74,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RequestHeader Application Gateway available request headers. diff --git a/src/Network/Network/help/Get-AzApplicationGatewayAvailableSslOption.md b/src/Network/Network/help/Get-AzApplicationGatewayAvailableSslOption.md index 088b3d82abcb..47146824a2ce 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayAvailableSslOption.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayAvailableSslOption.md @@ -13,7 +13,8 @@ Gets all available ssl options for ssl policy for Application Gateway. ## SYNTAX ``` -Get-AzApplicationGatewayAvailableSslOption [-DefaultProfile ] [] +Get-AzApplicationGatewayAvailableSslOption [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -45,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayAvailableWafRuleSet.md b/src/Network/Network/help/Get-AzApplicationGatewayAvailableWafRuleSet.md index 5eaa12e91886..bc29f19a1852 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayAvailableWafRuleSet.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayAvailableWafRuleSet.md @@ -13,7 +13,8 @@ Gets all available web application firewall rule sets. ## SYNTAX ``` -Get-AzApplicationGatewayAvailableWafRuleSet [-DefaultProfile ] [] +Get-AzApplicationGatewayAvailableWafRuleSet [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -45,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayBackendAddressPool.md b/src/Network/Network/help/Get-AzApplicationGatewayBackendAddressPool.md index d748f50702be..b4eb4fe6b006 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayBackendAddressPool.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayBackendAddressPool.md @@ -15,7 +15,7 @@ Gets a back-end address pool for an application gateway. ``` Get-AzApplicationGatewayBackendAddressPool [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -88,6 +88,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayBackendHealth.md b/src/Network/Network/help/Get-AzApplicationGatewayBackendHealth.md index d3075d6d8006..ed7c7a5104d1 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayBackendHealth.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayBackendHealth.md @@ -15,7 +15,7 @@ Gets application gateway backend health. ``` Get-AzApplicationGatewayBackendHealth -Name -ResourceGroupName [-ExpandResource ] - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -97,6 +97,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the application gateway. diff --git a/src/Network/Network/help/Get-AzApplicationGatewayBackendHttpSetting.md b/src/Network/Network/help/Get-AzApplicationGatewayBackendHttpSetting.md index 76abee39e4bc..ae2e44116b22 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayBackendHttpSetting.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayBackendHttpSetting.md @@ -14,7 +14,7 @@ Gets the back-end HTTP settings of an application gateway. ``` Get-AzApplicationGatewayBackendHttpSetting [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayBackendSetting.md b/src/Network/Network/help/Get-AzApplicationGatewayBackendSetting.md index edea379d5e2e..30783a2dbc96 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayBackendSetting.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayBackendSetting.md @@ -14,7 +14,7 @@ Gets the back-end TCP\TLS settings of an application gateway. ``` Get-AzApplicationGatewayBackendSetting [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayClientAuthConfiguration.md b/src/Network/Network/help/Get-AzApplicationGatewayClientAuthConfiguration.md index a45dc1425cb8..0de724a0a160 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayClientAuthConfiguration.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayClientAuthConfiguration.md @@ -14,7 +14,7 @@ Gets the client authentication configuration of a SSL profile object. ``` Get-AzApplicationGatewayClientAuthConfiguration -SslProfile - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -48,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslProfile The ssl profile diff --git a/src/Network/Network/help/Get-AzApplicationGatewayConnectionDraining.md b/src/Network/Network/help/Get-AzApplicationGatewayConnectionDraining.md index 40f7d3a537b7..d030e96691f5 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayConnectionDraining.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayConnectionDraining.md @@ -14,7 +14,7 @@ Gets the connection draining configuration of a back-end HTTP settings object. ``` Get-AzApplicationGatewayConnectionDraining -BackendHttpSettings - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -65,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayCustomError.md b/src/Network/Network/help/Get-AzApplicationGatewayCustomError.md index 628ad9fdb8f6..83f83b9442cd 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayCustomError.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayCustomError.md @@ -14,7 +14,7 @@ Gets custom error(s) from an application gateway. ``` Get-AzApplicationGatewayCustomError [-StatusCode ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -68,6 +68,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Get-AzApplicationGatewayFirewallPolicy.md b/src/Network/Network/help/Get-AzApplicationGatewayFirewallPolicy.md index cb96ed45f495..b6bf380725d8 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayFirewallPolicy.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayFirewallPolicy.md @@ -14,7 +14,7 @@ Gets an application gateway firewall policy. ``` Get-AzApplicationGatewayFirewallPolicy [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +61,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzApplicationGatewayFrontendIPConfig.md b/src/Network/Network/help/Get-AzApplicationGatewayFrontendIPConfig.md index 6b08d678bd81..9dc1bffbc1bc 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayFrontendIPConfig.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayFrontendIPConfig.md @@ -15,7 +15,7 @@ Gets the front-end IP configuration of an application gateway. ``` Get-AzApplicationGatewayFrontendIPConfig [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -86,6 +86,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayFrontendPort.md b/src/Network/Network/help/Get-AzApplicationGatewayFrontendPort.md index 8a7a63d3bbba..eae4376474df 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayFrontendPort.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayFrontendPort.md @@ -15,7 +15,7 @@ Gets the front-end port of an application gateway. ``` Get-AzApplicationGatewayFrontendPort [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -88,6 +88,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayHttpListener.md b/src/Network/Network/help/Get-AzApplicationGatewayHttpListener.md index f337c8e4f26e..a9463a0208b7 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayHttpListener.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayHttpListener.md @@ -15,7 +15,7 @@ Gets the HTTP listener of an application gateway. ``` Get-AzApplicationGatewayHttpListener [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -86,6 +86,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayHttpListenerCustomError.md b/src/Network/Network/help/Get-AzApplicationGatewayHttpListenerCustomError.md index 2c67ad193aba..7592aa6be80b 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayHttpListenerCustomError.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayHttpListenerCustomError.md @@ -15,7 +15,7 @@ Gets custom error(s) from a http listener of an application gateway. ``` Get-AzApplicationGatewayHttpListenerCustomError [-StatusCode ] -HttpListener [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Get-AzApplicationGatewayIPConfiguration.md b/src/Network/Network/help/Get-AzApplicationGatewayIPConfiguration.md index 5ed544eb952b..2c36eb604029 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayIPConfiguration.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayIPConfiguration.md @@ -15,7 +15,7 @@ Gets the IP configuration of an application gateway. ``` Get-AzApplicationGatewayIPConfiguration [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -87,6 +87,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayIdentity.md b/src/Network/Network/help/Get-AzApplicationGatewayIdentity.md index c2bc2ef3b53b..03adada131fe 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayIdentity.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayIdentity.md @@ -14,7 +14,7 @@ Get identity assigned to the application gateway. ``` Get-AzApplicationGatewayIdentity -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayListener.md b/src/Network/Network/help/Get-AzApplicationGatewayListener.md index e1dbe1f9017f..751e473e8cc4 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayListener.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayListener.md @@ -14,7 +14,7 @@ Gets the TCP\TLS listener of an application gateway. ``` Get-AzApplicationGatewayListener [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayPrivateLinkConfiguration.md b/src/Network/Network/help/Get-AzApplicationGatewayPrivateLinkConfiguration.md index 4765995137be..31e92c392f7a 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayPrivateLinkConfiguration.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayPrivateLinkConfiguration.md @@ -14,7 +14,7 @@ Gets the private link configuration of an application gateway. ``` Get-AzApplicationGatewayPrivateLinkConfiguration -ApplicationGateway [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -87,6 +87,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayProbeConfig.md b/src/Network/Network/help/Get-AzApplicationGatewayProbeConfig.md index af6eaae6680b..544bff86e9f5 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayProbeConfig.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayProbeConfig.md @@ -14,7 +14,7 @@ Gets an existing health probe configuration from an Application Gateway. ``` Get-AzApplicationGatewayProbeConfig [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayRedirectConfiguration.md b/src/Network/Network/help/Get-AzApplicationGatewayRedirectConfiguration.md index 2471d55233c0..e92c95893827 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayRedirectConfiguration.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayRedirectConfiguration.md @@ -14,7 +14,7 @@ Gets an existing redirect configuration from an Application Gateway. ``` Get-AzApplicationGatewayRedirectConfiguration [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayRequestRoutingRule.md b/src/Network/Network/help/Get-AzApplicationGatewayRequestRoutingRule.md index 7cdcdae1822f..99d47f3b0eb4 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayRequestRoutingRule.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayRequestRoutingRule.md @@ -15,7 +15,7 @@ Gets the request routing rule of an application gateway. ``` Get-AzApplicationGatewayRequestRoutingRule [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -88,6 +88,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayRewriteRuleSet.md b/src/Network/Network/help/Get-AzApplicationGatewayRewriteRuleSet.md index 84c955583637..2c77f5a026c9 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayRewriteRuleSet.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayRewriteRuleSet.md @@ -14,7 +14,7 @@ Gets the rewrite rule set of an application gateway. ``` Get-AzApplicationGatewayRewriteRuleSet [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayRoutingRule.md b/src/Network/Network/help/Get-AzApplicationGatewayRoutingRule.md index f11fd0052525..01056d25038e 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayRoutingRule.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayRoutingRule.md @@ -14,7 +14,7 @@ Gets the routing rule of an application gateway. ``` Get-AzApplicationGatewayRoutingRule [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -87,6 +87,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewaySku.md b/src/Network/Network/help/Get-AzApplicationGatewaySku.md index 70a23ea5422c..3e47d9a1122f 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewaySku.md +++ b/src/Network/Network/help/Get-AzApplicationGatewaySku.md @@ -15,7 +15,7 @@ Gets the SKU of an application gateway. ``` Get-AzApplicationGatewaySku -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -64,6 +64,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewaySslCertificate.md b/src/Network/Network/help/Get-AzApplicationGatewaySslCertificate.md index 3ff6df9e2ed4..dd12b696c36f 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewaySslCertificate.md +++ b/src/Network/Network/help/Get-AzApplicationGatewaySslCertificate.md @@ -15,7 +15,7 @@ Gets an SSL certificate for an application gateway. ``` Get-AzApplicationGatewaySslCertificate [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -90,6 +90,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewaySslPolicy.md b/src/Network/Network/help/Get-AzApplicationGatewaySslPolicy.md index 6b898c811a8f..c1c9c5016ee8 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewaySslPolicy.md +++ b/src/Network/Network/help/Get-AzApplicationGatewaySslPolicy.md @@ -15,7 +15,7 @@ Gets the SSL policy of an application gateway. ``` Get-AzApplicationGatewaySslPolicy -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -64,6 +64,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewaySslPredefinedPolicy.md b/src/Network/Network/help/Get-AzApplicationGatewaySslPredefinedPolicy.md index cc46619df422..a7e2f71fe126 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewaySslPredefinedPolicy.md +++ b/src/Network/Network/help/Get-AzApplicationGatewaySslPredefinedPolicy.md @@ -14,7 +14,7 @@ Gets Predefined SSL Policies provided by Application Gateway. ``` Get-AzApplicationGatewaySslPredefinedPolicy [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -216,6 +216,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewaySslProfile.md b/src/Network/Network/help/Get-AzApplicationGatewaySslProfile.md index af661d1f27fc..bd2e9d620faf 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewaySslProfile.md +++ b/src/Network/Network/help/Get-AzApplicationGatewaySslProfile.md @@ -14,7 +14,7 @@ Gets the SSL profile of an application gateway. ``` Get-AzApplicationGatewaySslProfile [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewaySslProfilePolicy.md b/src/Network/Network/help/Get-AzApplicationGatewaySslProfilePolicy.md index 4e30e13e959f..f8d3f4092497 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewaySslProfilePolicy.md +++ b/src/Network/Network/help/Get-AzApplicationGatewaySslProfilePolicy.md @@ -14,7 +14,7 @@ Gets the SSL policy of an application gateway SSL profile. ``` Get-AzApplicationGatewaySslProfilePolicy -SslProfile - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -48,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslProfile The application Gateway SSL profile diff --git a/src/Network/Network/help/Get-AzApplicationGatewayTrustedClientCertificate.md b/src/Network/Network/help/Get-AzApplicationGatewayTrustedClientCertificate.md index 737de1aceda9..7ffd853588de 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayTrustedClientCertificate.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayTrustedClientCertificate.md @@ -14,7 +14,7 @@ Gets the trusted client CA certificate chain with a specific name from the Appli ``` Get-AzApplicationGatewayTrustedClientCertificate [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayTrustedRootCertificate.md b/src/Network/Network/help/Get-AzApplicationGatewayTrustedRootCertificate.md index 74896c5c16eb..abfee848f4f7 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayTrustedRootCertificate.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayTrustedRootCertificate.md @@ -14,7 +14,7 @@ Gets the Trusted Root Certificate with a specific name from the Application Gate ``` Get-AzApplicationGatewayTrustedRootCertificate [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayUrlPathMapConfig.md b/src/Network/Network/help/Get-AzApplicationGatewayUrlPathMapConfig.md index 367c5ae8c5b8..c310c915ddd1 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayUrlPathMapConfig.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayUrlPathMapConfig.md @@ -15,7 +15,7 @@ Gets an array of URL path mappings to a backend server pool. ``` Get-AzApplicationGatewayUrlPathMapConfig [-Name ] -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayWafDynamicManifest.md b/src/Network/Network/help/Get-AzApplicationGatewayWafDynamicManifest.md index 9f2c349a0de9..a043962ce61f 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayWafDynamicManifest.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayWafDynamicManifest.md @@ -14,7 +14,7 @@ Gets the web application firewall manifest and all the supported rule sets. ``` Get-AzApplicationGatewayWafDynamicManifest -Location [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +61,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationGatewayWebApplicationFirewallConfiguration.md b/src/Network/Network/help/Get-AzApplicationGatewayWebApplicationFirewallConfiguration.md index a4b520f213d9..ed4a581265bd 100644 --- a/src/Network/Network/help/Get-AzApplicationGatewayWebApplicationFirewallConfiguration.md +++ b/src/Network/Network/help/Get-AzApplicationGatewayWebApplicationFirewallConfiguration.md @@ -15,7 +15,7 @@ Gets the WAF configuration of an application gateway. ``` Get-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -65,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzApplicationSecurityGroup.md b/src/Network/Network/help/Get-AzApplicationSecurityGroup.md index f8d0a5904053..5581238668ac 100644 --- a/src/Network/Network/help/Get-AzApplicationSecurityGroup.md +++ b/src/Network/Network/help/Get-AzApplicationSecurityGroup.md @@ -14,7 +14,7 @@ Gets an application security group. ``` Get-AzApplicationSecurityGroup [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -174,6 +174,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzAutoApprovedPrivateLinkService.md b/src/Network/Network/help/Get-AzAutoApprovedPrivateLinkService.md index abfe77a28c40..b72f17d8e027 100644 --- a/src/Network/Network/help/Get-AzAutoApprovedPrivateLinkService.md +++ b/src/Network/Network/help/Get-AzAutoApprovedPrivateLinkService.md @@ -14,7 +14,7 @@ Gets an array of private link service id that can be linked to a private end poi ``` Get-AzAutoApprovedPrivateLinkService -Location [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -59,6 +59,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group. diff --git a/src/Network/Network/help/Get-AzAvailablePrivateEndpointType.md b/src/Network/Network/help/Get-AzAvailablePrivateEndpointType.md index 1056b5822380..3397afbf483b 100644 --- a/src/Network/Network/help/Get-AzAvailablePrivateEndpointType.md +++ b/src/Network/Network/help/Get-AzAvailablePrivateEndpointType.md @@ -14,7 +14,7 @@ Return available private end point types in the location. ``` Get-AzAvailablePrivateEndpointType -Location [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzAvailableServiceAlias.md b/src/Network/Network/help/Get-AzAvailableServiceAlias.md index 81c78c72c958..92400c22ce63 100644 --- a/src/Network/Network/help/Get-AzAvailableServiceAlias.md +++ b/src/Network/Network/help/Get-AzAvailableServiceAlias.md @@ -13,7 +13,8 @@ Get available service aliases in the region. ## SYNTAX ``` -Get-AzAvailableServiceAlias -Location [-DefaultProfile ] [] +Get-AzAvailableServiceAlias -Location [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -65,6 +66,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzAvailableServiceDelegation.md b/src/Network/Network/help/Get-AzAvailableServiceDelegation.md index 7e75fbcfe073..950b5936b8e9 100644 --- a/src/Network/Network/help/Get-AzAvailableServiceDelegation.md +++ b/src/Network/Network/help/Get-AzAvailableServiceDelegation.md @@ -14,7 +14,7 @@ Get available service delegations in the region. ``` Get-AzAvailableServiceDelegation -Location [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -73,6 +73,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzBastion.md b/src/Network/Network/help/Get-AzBastion.md index c0ef3852a6ca..ace04998d8f0 100644 --- a/src/Network/Network/help/Get-AzBastion.md +++ b/src/Network/Network/help/Get-AzBastion.md @@ -14,25 +14,26 @@ Gets a Bastion resource or Bastion resources. ### ListBySubscriptionId (Default) ``` -Get-AzBastion [-DefaultProfile ] [-WhatIf] [-Confirm] [] +Get-AzBastion [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ListByResourceGroupName ``` -Get-AzBastion [-ResourceGroupName ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] +Get-AzBastion [-ResourceGroupName ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByResourceGroupNameByName ``` -Get-AzBastion -ResourceGroupName -Name [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Get-AzBastion -ResourceGroupName -Name [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` -Get-AzBastion -ResourceId [-DefaultProfile ] [-WhatIf] [-Confirm] - [] +Get-AzBastion -ResourceId [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -271,6 +272,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzBgpServiceCommunity.md b/src/Network/Network/help/Get-AzBgpServiceCommunity.md index 6ea661c7ce3e..a6a3473ee7a5 100644 --- a/src/Network/Network/help/Get-AzBgpServiceCommunity.md +++ b/src/Network/Network/help/Get-AzBgpServiceCommunity.md @@ -13,7 +13,8 @@ Provides a list of all services / regions, BGP communities, and associated prefi ## SYNTAX ``` -Get-AzBgpServiceCommunity [-DefaultProfile ] [] +Get-AzBgpServiceCommunity [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -88,6 +89,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzCustomIpPrefix.md b/src/Network/Network/help/Get-AzCustomIpPrefix.md index 6e78a10c7ba1..83ecb1f0ab78 100644 --- a/src/Network/Network/help/Get-AzCustomIpPrefix.md +++ b/src/Network/Network/help/Get-AzCustomIpPrefix.md @@ -15,12 +15,13 @@ Gets a CustomIpPrefix resource ### GetByNameParameterSet (Default) ``` Get-AzCustomIpPrefix [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` -Get-AzCustomIpPrefix -ResourceId [-DefaultProfile ] [] +Get-AzCustomIpPrefix -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -87,6 +88,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzDdosProtectionPlan.md b/src/Network/Network/help/Get-AzDdosProtectionPlan.md index 959535f03a2a..0509a3d15c00 100644 --- a/src/Network/Network/help/Get-AzDdosProtectionPlan.md +++ b/src/Network/Network/help/Get-AzDdosProtectionPlan.md @@ -14,7 +14,7 @@ Gets a DDoS protection plan. ``` Get-AzDdosProtectionPlan [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -140,6 +140,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the DDoS protection plan resource group. diff --git a/src/Network/Network/help/Get-AzDelegation.md b/src/Network/Network/help/Get-AzDelegation.md index 7cbb354bf27c..4060ea567ba4 100644 --- a/src/Network/Network/help/Get-AzDelegation.md +++ b/src/Network/Network/help/Get-AzDelegation.md @@ -14,7 +14,7 @@ Get a delegation (or all of the delegations) on a given subnet. ``` Get-AzDelegation [-Name ] -Subnet [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet The subnet diff --git a/src/Network/Network/help/Get-AzEffectiveNetworkSecurityGroup.md b/src/Network/Network/help/Get-AzEffectiveNetworkSecurityGroup.md index 66dade8e935a..8d75965a3d96 100644 --- a/src/Network/Network/help/Get-AzEffectiveNetworkSecurityGroup.md +++ b/src/Network/Network/help/Get-AzEffectiveNetworkSecurityGroup.md @@ -15,7 +15,7 @@ Gets the effective network security group of a network interface. ``` Get-AzEffectiveNetworkSecurityGroup -NetworkInterfaceName [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the resource group of a network interface. diff --git a/src/Network/Network/help/Get-AzEffectiveRouteTable.md b/src/Network/Network/help/Get-AzEffectiveRouteTable.md index cdfdd076d3e5..6b9a2c6797d5 100644 --- a/src/Network/Network/help/Get-AzEffectiveRouteTable.md +++ b/src/Network/Network/help/Get-AzEffectiveRouteTable.md @@ -15,7 +15,7 @@ Gets the effective route table of a network interface. ``` Get-AzEffectiveRouteTable -NetworkInterfaceName [-ResourceGroupName ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the resource group of a network interface. diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuit.md b/src/Network/Network/help/Get-AzExpressRouteCircuit.md index 14c818994ce2..c6a355fafc27 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuit.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuit.md @@ -15,7 +15,7 @@ Gets an Azure ExpressRoute circuit from Azure. ``` Get-AzExpressRouteCircuit [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -162,6 +162,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group that contains the ExpressRoute circuit. diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitARPTable.md b/src/Network/Network/help/Get-AzExpressRouteCircuitARPTable.md index 70b0c4d37efe..b309fee6845e 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitARPTable.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitARPTable.md @@ -16,7 +16,7 @@ Gets the ARP table from an ExpressRoute circuit. ``` Get-AzExpressRouteCircuitARPTable -ResourceGroupName -ExpressRouteCircuitName -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -96,6 +96,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute circuit. diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitAuthorization.md b/src/Network/Network/help/Get-AzExpressRouteCircuitAuthorization.md index e427ae84ad34..57e1a4244ce5 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitAuthorization.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitAuthorization.md @@ -15,7 +15,7 @@ Gets information about ExpressRoute circuit authorizations. ``` Get-AzExpressRouteCircuitAuthorization [-Name ] -ExpressRouteCircuit - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -106,6 +106,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitConnectionConfig.md b/src/Network/Network/help/Get-AzExpressRouteCircuitConnectionConfig.md index 2d7ea2ddc55d..9659f0de0b29 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitConnectionConfig.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitConnectionConfig.md @@ -15,7 +15,7 @@ Gets an ExpressRoute circuit connection configuration associated with Private Pe ``` Get-AzExpressRouteCircuitConnectionConfig [[-Name] ] [-ExpressRouteCircuit] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -82,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitPeeringConfig.md b/src/Network/Network/help/Get-AzExpressRouteCircuitPeeringConfig.md index 543f9eeb7edd..6a6db6191fa9 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitPeeringConfig.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitPeeringConfig.md @@ -15,7 +15,7 @@ Gets an ExpressRoute circuit peering configuration. ``` Get-AzExpressRouteCircuitPeeringConfig [-Name ] -ExpressRouteCircuit - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTable.md b/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTable.md index b6d27ac3e228..243105d7aea1 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTable.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTable.md @@ -16,7 +16,7 @@ Gets a route table from an ExpressRoute circuit. ``` Get-AzExpressRouteCircuitRouteTable -ResourceGroupName -ExpressRouteCircuitName -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -97,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute circuit. diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTableSummary.md b/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTableSummary.md index 3c4ebabe015a..e172e26d4983 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTableSummary.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitRouteTableSummary.md @@ -16,7 +16,7 @@ Gets a route table summary of an ExpressRoute circuit. ``` Get-AzExpressRouteCircuitRouteTableSummary -ResourceGroupName -ExpressRouteCircuitName -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -97,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute circuit. diff --git a/src/Network/Network/help/Get-AzExpressRouteCircuitStat.md b/src/Network/Network/help/Get-AzExpressRouteCircuitStat.md index 832d3d2b7d11..5296166a2140 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCircuitStat.md +++ b/src/Network/Network/help/Get-AzExpressRouteCircuitStat.md @@ -15,7 +15,8 @@ Gets usage statistics of an ExpressRoute circuit. ``` Get-AzExpressRouteCircuitStat -ResourceGroupName -ExpressRouteCircuitName - [-PeeringType ] [-DefaultProfile ] [] + [-PeeringType ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -79,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute circuit. diff --git a/src/Network/Network/help/Get-AzExpressRouteConnection.md b/src/Network/Network/help/Get-AzExpressRouteConnection.md index 05da9dceef4d..1e60f81f6c79 100644 --- a/src/Network/Network/help/Get-AzExpressRouteConnection.md +++ b/src/Network/Network/help/Get-AzExpressRouteConnection.md @@ -15,19 +15,19 @@ Gets a ExpressRoute connection by name or lists all ExpressRoute connections con ### ByExpressRouteGatewayName (Default) ``` Get-AzExpressRouteConnection -ResourceGroupName -ExpressRouteGatewayName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByExpressRouteGatewayObject ``` Get-AzExpressRouteConnection -ExpressRouteGatewayObject [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByExpressRouteGatewayResourceId ``` Get-AzExpressRouteConnection -ParentResourceId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -222,6 +222,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzExpressRouteCrossConnection.md b/src/Network/Network/help/Get-AzExpressRouteCrossConnection.md index a379b59dc47b..ac853dd525f1 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCrossConnection.md +++ b/src/Network/Network/help/Get-AzExpressRouteCrossConnection.md @@ -15,7 +15,7 @@ Gets an Azure ExpressRoute cross connection from Azure. ``` Get-AzExpressRouteCrossConnection [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group that contains the ExpressRoute cross connection. diff --git a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionArpTable.md b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionArpTable.md index 56a2e05c029a..68bc059c9630 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionArpTable.md +++ b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionArpTable.md @@ -17,14 +17,14 @@ Gets the ARP table from an ExpressRoute cross connection. ``` Get-AzExpressRouteCrossConnectionArpTable -ResourceGroupName -CrossConnectionName -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SpecifyByReference ``` Get-AzExpressRouteCrossConnectionArpTable -ExpressRouteCrossConnection -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -119,6 +119,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute cross connection. diff --git a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionPeering.md b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionPeering.md index 53ebd11cedd2..fba7527008b3 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionPeering.md +++ b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionPeering.md @@ -16,7 +16,7 @@ Gets an ExpressRoute cross connection peering configuration. ``` Get-AzExpressRouteCrossConnectionPeering [-Name ] -ExpressRouteCrossConnection [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTable.md b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTable.md index a9bace7e5045..c6f9ac81df53 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTable.md +++ b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTable.md @@ -17,14 +17,14 @@ Gets a route table from an ExpressRoute cross connection. ``` Get-AzExpressRouteCrossConnectionRouteTable -ResourceGroupName -CrossConnectionName -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SpecifyByReference ``` Get-AzExpressRouteCrossConnectionRouteTable -ExpressRouteCrossConnection -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute cross connection. diff --git a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTableSummary.md b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTableSummary.md index 43d1a118d241..a9bee3f7dc9d 100644 --- a/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTableSummary.md +++ b/src/Network/Network/help/Get-AzExpressRouteCrossConnectionRouteTableSummary.md @@ -17,14 +17,14 @@ Gets a route table summary of an ExpressRoute cross connection. ``` Get-AzExpressRouteCrossConnectionRouteTableSummary -ResourceGroupName -CrossConnectionName -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SpecifyByReference ``` Get-AzExpressRouteCrossConnectionRouteTableSummary -ExpressRouteCrossConnection -PeeringType -DevicePath [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group containing the ExpressRoute cross connection. diff --git a/src/Network/Network/help/Get-AzExpressRouteGateway.md b/src/Network/Network/help/Get-AzExpressRouteGateway.md index 0654514611de..e9b728757797 100644 --- a/src/Network/Network/help/Get-AzExpressRouteGateway.md +++ b/src/Network/Network/help/Get-AzExpressRouteGateway.md @@ -14,18 +14,20 @@ Gets a ExpressRouteGateway resource using ResourceGroupName and GatewayName OR l ### ListBySubscriptionId (Default) ``` -Get-AzExpressRouteGateway [-DefaultProfile ] [] +Get-AzExpressRouteGateway [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzExpressRouteGateway [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByExpressRouteGatewayResourceId ``` -Get-AzExpressRouteGateway -ResourceId [-DefaultProfile ] [] +Get-AzExpressRouteGateway -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -122,6 +124,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzExpressRoutePort.md b/src/Network/Network/help/Get-AzExpressRoutePort.md index 4c91dde64899..c478739a4c79 100644 --- a/src/Network/Network/help/Get-AzExpressRoutePort.md +++ b/src/Network/Network/help/Get-AzExpressRoutePort.md @@ -15,12 +15,13 @@ Gets an Azure ExpressRoutePort resource. ### ResourceNameParameterSet (Default) ``` Get-AzExpressRoutePort [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdParameterSet ``` -Get-AzExpressRoutePort -ResourceId [-DefaultProfile ] [] +Get-AzExpressRoutePort -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -83,6 +84,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ExpressRoutePort. diff --git a/src/Network/Network/help/Get-AzExpressRoutePortAuthorization.md b/src/Network/Network/help/Get-AzExpressRoutePortAuthorization.md index 4917405522f7..80579217fee1 100644 --- a/src/Network/Network/help/Get-AzExpressRoutePortAuthorization.md +++ b/src/Network/Network/help/Get-AzExpressRoutePortAuthorization.md @@ -14,7 +14,7 @@ Gets information about ExpressRoutePort authorizations. ``` Get-AzExpressRoutePortAuthorization [-Name ] -ExpressRoutePortObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -160,6 +160,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRoutePortIdentity.md b/src/Network/Network/help/Get-AzExpressRoutePortIdentity.md index eb270249dc0c..c6cb1516bceb 100644 --- a/src/Network/Network/help/Get-AzExpressRoutePortIdentity.md +++ b/src/Network/Network/help/Get-AzExpressRoutePortIdentity.md @@ -14,7 +14,7 @@ Get identity assigned to an ExpressRoutePort. ``` Get-AzExpressRoutePortIdentity -ExpressRoutePort - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -60,6 +60,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRoutePortLinkConfig.md b/src/Network/Network/help/Get-AzExpressRoutePortLinkConfig.md index abd05534af16..9dfc129c4087 100644 --- a/src/Network/Network/help/Get-AzExpressRoutePortLinkConfig.md +++ b/src/Network/Network/help/Get-AzExpressRoutePortLinkConfig.md @@ -15,13 +15,13 @@ Gets an ExpressRoutePort link configuration. ### ResourceNameParameterSet (Default) ``` Get-AzExpressRoutePortLinkConfig -ExpressRoutePort [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdParameterSet ``` Get-AzExpressRoutePortLinkConfig -ResourceId -ExpressRoutePort - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -91,6 +91,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId ResourceId of the link. diff --git a/src/Network/Network/help/Get-AzExpressRoutePortsLocation.md b/src/Network/Network/help/Get-AzExpressRoutePortsLocation.md index 5a4844fcd98e..197e6b781322 100644 --- a/src/Network/Network/help/Get-AzExpressRoutePortsLocation.md +++ b/src/Network/Network/help/Get-AzExpressRoutePortsLocation.md @@ -14,7 +14,7 @@ Gets the locations at which ExpressRoutePort resources are available. ``` Get-AzExpressRoutePortsLocation [-LocationName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -70,6 +70,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzExpressRouteServiceProvider.md b/src/Network/Network/help/Get-AzExpressRouteServiceProvider.md index c609cd590e09..58fa787c25f0 100644 --- a/src/Network/Network/help/Get-AzExpressRouteServiceProvider.md +++ b/src/Network/Network/help/Get-AzExpressRouteServiceProvider.md @@ -14,7 +14,8 @@ Gets a list ExpressRoute service providers and their attributes. ## SYNTAX ``` -Get-AzExpressRouteServiceProvider [-DefaultProfile ] [] +Get-AzExpressRouteServiceProvider [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -47,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzFirewall.md b/src/Network/Network/help/Get-AzFirewall.md index ba04b03a16bb..bfaf8e58f881 100644 --- a/src/Network/Network/help/Get-AzFirewall.md +++ b/src/Network/Network/help/Get-AzFirewall.md @@ -15,7 +15,7 @@ Gets a Azure Firewall. ``` Get-AzFirewall [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -309,6 +309,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that Firewall belongs to. diff --git a/src/Network/Network/help/Get-AzFirewallFqdnTag.md b/src/Network/Network/help/Get-AzFirewallFqdnTag.md index 411a4f3baf2f..cf6bdf1e021f 100644 --- a/src/Network/Network/help/Get-AzFirewallFqdnTag.md +++ b/src/Network/Network/help/Get-AzFirewallFqdnTag.md @@ -14,7 +14,8 @@ Gets the available Azure Firewall Fqdn Tags. ## SYNTAX ``` -Get-AzFirewallFqdnTag [-DefaultProfile ] [] +Get-AzFirewallFqdnTag [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -54,6 +55,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzFirewallLearnedIpPrefix.md b/src/Network/Network/help/Get-AzFirewallLearnedIpPrefix.md index 31d69abb23dc..4039dd5fdbc4 100644 --- a/src/Network/Network/help/Get-AzFirewallLearnedIpPrefix.md +++ b/src/Network/Network/help/Get-AzFirewallLearnedIpPrefix.md @@ -14,7 +14,7 @@ Gets firewall auto learned ip prefixes. ``` Get-AzFirewallLearnedIpPrefix [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -64,6 +64,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that Firewall belongs to. diff --git a/src/Network/Network/help/Get-AzFirewallPolicy.md b/src/Network/Network/help/Get-AzFirewallPolicy.md index ff1410acab73..94885cf8baa8 100644 --- a/src/Network/Network/help/Get-AzFirewallPolicy.md +++ b/src/Network/Network/help/Get-AzFirewallPolicy.md @@ -15,12 +15,13 @@ Gets a Azure Firewall Policy ### GetByNameParameterSet (Default) ``` Get-AzFirewallPolicy -Name -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` -Get-AzFirewallPolicy -ResourceId [-DefaultProfile ] [] +Get-AzFirewallPolicy -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -67,6 +68,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzFirewallPolicyRuleCollectionGroup.md b/src/Network/Network/help/Get-AzFirewallPolicyRuleCollectionGroup.md index c8593ba11f90..d74ed07e5054 100644 --- a/src/Network/Network/help/Get-AzFirewallPolicyRuleCollectionGroup.md +++ b/src/Network/Network/help/Get-AzFirewallPolicyRuleCollectionGroup.md @@ -15,19 +15,20 @@ Gets a Azure Firewall Policy Rule Collection Group ### GetByNameParameterSet (Default) ``` Get-AzFirewallPolicyRuleCollectionGroup -Name -ResourceGroupName - -AzureFirewallPolicyName [-DefaultProfile ] [] + -AzureFirewallPolicyName [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetByInputObjectParameterSet ``` Get-AzFirewallPolicyRuleCollectionGroup -Name -AzureFirewallPolicy - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` Get-AzFirewallPolicyRuleCollectionGroup -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -127,6 +128,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzIpAllocation.md b/src/Network/Network/help/Get-AzIpAllocation.md index 77f8ea47ea1b..d7fbbd51851a 100644 --- a/src/Network/Network/help/Get-AzIpAllocation.md +++ b/src/Network/Network/help/Get-AzIpAllocation.md @@ -15,18 +15,19 @@ Gets a Azure IpAllocation. ### GetByNameParameterSet ``` Get-AzIpAllocation -ResourceGroupName -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ListParameterSet ``` Get-AzIpAllocation [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` -Get-AzIpAllocation -ResourceId [-DefaultProfile ] [] +Get-AzIpAllocation -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +72,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzIpGroup.md b/src/Network/Network/help/Get-AzIpGroup.md index d062d4dc4046..b84554aa20fd 100644 --- a/src/Network/Network/help/Get-AzIpGroup.md +++ b/src/Network/Network/help/Get-AzIpGroup.md @@ -15,12 +15,13 @@ Get an Azure IpGroup ### IpGroupNameParameterSet (Default) ``` Get-AzIpGroup [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### IpGroupResourceIdParameterSet ``` -Get-AzIpGroup -ResourceId [-DefaultProfile ] [] +Get-AzIpGroup -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +72,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ipgroup. diff --git a/src/Network/Network/help/Get-AzLoadBalancer.md b/src/Network/Network/help/Get-AzLoadBalancer.md index 08fd963645f6..197f5f8a6a7b 100644 --- a/src/Network/Network/help/Get-AzLoadBalancer.md +++ b/src/Network/Network/help/Get-AzLoadBalancer.md @@ -16,13 +16,13 @@ Gets a load balancer. ### NoExpand (Default) ``` Get-AzLoadBalancer [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzLoadBalancer -ResourceGroupName -Name -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -164,6 +164,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName ```yaml Type: System.String diff --git a/src/Network/Network/help/Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping.md b/src/Network/Network/help/Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping.md index d62ab76c7248..ce5a8323de0c 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping.md +++ b/src/Network/Network/help/Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping.md @@ -16,20 +16,22 @@ Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping retrieves inbound nat ``` Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping -ResourceGroupName -LoadBalancerName [-Name ] [-IpAddress ] - [-NetworkInterfaceIpConfigurationId ] [-DefaultProfile ] [] + [-NetworkInterfaceIpConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetByParentObjectParameterSet ``` Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping [-Name ] -LoadBalancer [-IpAddress ] [-NetworkInterfaceIpConfigurationId ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` Get-AzLoadBalancerBackendAddressInboundNatRulePortMapping -ResourceId [-IpAddress ] - [-NetworkInterfaceIpConfigurationId ] [-DefaultProfile ] [] + [-NetworkInterfaceIpConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -153,6 +155,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the load balancer. diff --git a/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPool.md b/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPool.md index be335d309aa7..ba0d0dd09011 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPool.md +++ b/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPool.md @@ -15,19 +15,19 @@ Get-AzLoadBalancerBackendAddressPool retrieves one or more backend address pools ### GetByNameParameterSet (Default) ``` Get-AzLoadBalancerBackendAddressPool -ResourceGroupName -LoadBalancerName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetByParentObjectParameterSet ``` Get-AzLoadBalancerBackendAddressPool [-Name ] -LoadBalancer - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` Get-AzLoadBalancerBackendAddressPool -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the load balancer. diff --git a/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPoolConfig.md b/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPoolConfig.md index 14504f312314..95cd781cb60f 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPoolConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerBackendAddressPoolConfig.md @@ -15,7 +15,7 @@ Gets a backend address pool configuration for a load balancer. ``` Get-AzLoadBalancerBackendAddressPoolConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLoadBalancerFrontendIpConfig.md b/src/Network/Network/help/Get-AzLoadBalancerFrontendIpConfig.md index 37cfeb2b51d9..a47c206735e8 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerFrontendIpConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerFrontendIpConfig.md @@ -15,7 +15,7 @@ Gets a front-end IP configuration in a load balancer. ``` Get-AzLoadBalancerFrontendIpConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLoadBalancerInboundNatPoolConfig.md b/src/Network/Network/help/Get-AzLoadBalancerInboundNatPoolConfig.md index 169f78df327d..c0fd100ddec9 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerInboundNatPoolConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerInboundNatPoolConfig.md @@ -15,7 +15,7 @@ Gets one or more inbound NAT pool configurations from a load balancer. ``` Get-AzLoadBalancerInboundNatPoolConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -72,6 +72,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLoadBalancerInboundNatRuleConfig.md b/src/Network/Network/help/Get-AzLoadBalancerInboundNatRuleConfig.md index 82fb5059aef0..d939bdbbf32f 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerInboundNatRuleConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerInboundNatRuleConfig.md @@ -15,7 +15,7 @@ Gets an inbound NAT rule configuration for a load balancer. ``` Get-AzLoadBalancerInboundNatRuleConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLoadBalancerOutboundRuleConfig.md b/src/Network/Network/help/Get-AzLoadBalancerOutboundRuleConfig.md index 91911767595c..98c58ff6f40d 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerOutboundRuleConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerOutboundRuleConfig.md @@ -14,7 +14,7 @@ Gets an outbound rule configuration in a load balancer. ``` Get-AzLoadBalancerOutboundRuleConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLoadBalancerProbeConfig.md b/src/Network/Network/help/Get-AzLoadBalancerProbeConfig.md index f0a7d2632f8a..0b53bc47573a 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerProbeConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerProbeConfig.md @@ -15,7 +15,7 @@ Gets a probe configuration for a load balancer. ``` Get-AzLoadBalancerProbeConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLoadBalancerRuleConfig.md b/src/Network/Network/help/Get-AzLoadBalancerRuleConfig.md index b80c68a97799..2694c25cd967 100644 --- a/src/Network/Network/help/Get-AzLoadBalancerRuleConfig.md +++ b/src/Network/Network/help/Get-AzLoadBalancerRuleConfig.md @@ -15,7 +15,7 @@ Gets the rule configuration for a load balancer. ``` Get-AzLoadBalancerRuleConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzLocalNetworkGateway.md b/src/Network/Network/help/Get-AzLocalNetworkGateway.md index 7fe34665c3fc..2133fd7568fd 100644 --- a/src/Network/Network/help/Get-AzLocalNetworkGateway.md +++ b/src/Network/Network/help/Get-AzLocalNetworkGateway.md @@ -15,7 +15,7 @@ Gets a Local Network Gateway ``` Get-AzLocalNetworkGateway [-Name ] -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -117,6 +117,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName ```yaml Type: System.String diff --git a/src/Network/Network/help/Get-AzNatGateway.md b/src/Network/Network/help/Get-AzNatGateway.md index aba2e6f98687..8bc57d03ad4a 100644 --- a/src/Network/Network/help/Get-AzNatGateway.md +++ b/src/Network/Network/help/Get-AzNatGateway.md @@ -14,18 +14,20 @@ Gets a Nat Gateway resource in a resource group by name or NatGateway Id or all ### ListParameterSet (Default) ``` -Get-AzNatGateway [-ResourceGroupName ] [-DefaultProfile ] [] +Get-AzNatGateway [-ResourceGroupName ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetByNameParameterSet ``` Get-AzNatGateway -ResourceGroupName -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` -Get-AzNatGateway -ResourceId [-DefaultProfile ] [] +Get-AzNatGateway -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -173,6 +175,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the nat gateway. diff --git a/src/Network/Network/help/Get-AzNetworkInterface.md b/src/Network/Network/help/Get-AzNetworkInterface.md index 9dd74b73fa82..9195ea4b111e 100644 --- a/src/Network/Network/help/Get-AzNetworkInterface.md +++ b/src/Network/Network/help/Get-AzNetworkInterface.md @@ -16,37 +16,39 @@ Gets a network interface. ### NoExpandStandAloneNic (Default) ``` Get-AzNetworkInterface [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ExpandStandAloneNic ``` Get-AzNetworkInterface -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### NoExpandScaleSetNic ``` Get-AzNetworkInterface [-Name ] -ResourceGroupName [-VirtualMachineScaleSetName ] - [-VirtualMachineIndex ] [-DefaultProfile ] [] + [-VirtualMachineIndex ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ExpandScaleSetNic ``` Get-AzNetworkInterface -Name -ResourceGroupName -VirtualMachineScaleSetName -VirtualMachineIndex -ExpandResource [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdExpandParameterSet ``` Get-AzNetworkInterface -ResourceId -ExpandResource [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdNoExpandParameterSet ``` -Get-AzNetworkInterface -ResourceId [-DefaultProfile ] [] +Get-AzNetworkInterface -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -303,6 +305,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group from which this cmdlet gets network interfaces. diff --git a/src/Network/Network/help/Get-AzNetworkInterfaceIpConfig.md b/src/Network/Network/help/Get-AzNetworkInterfaceIpConfig.md index e3db50f43dd9..9a32312ce119 100644 --- a/src/Network/Network/help/Get-AzNetworkInterfaceIpConfig.md +++ b/src/Network/Network/help/Get-AzNetworkInterfaceIpConfig.md @@ -15,7 +15,7 @@ Gets a network interface IP configuration for a network interface. ``` Get-AzNetworkInterfaceIpConfig [-Name ] -NetworkInterface - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzNetworkInterfaceTapConfig.md b/src/Network/Network/help/Get-AzNetworkInterfaceTapConfig.md index 6a2c1e401ed6..b854c136c522 100644 --- a/src/Network/Network/help/Get-AzNetworkInterfaceTapConfig.md +++ b/src/Network/Network/help/Get-AzNetworkInterfaceTapConfig.md @@ -15,13 +15,14 @@ Gets a Tap configuration resource. ### GetByNameParameterSet (Default) ``` Get-AzNetworkInterfaceTapConfig -ResourceGroupName -NetworkInterfaceName [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### GetByResourceIdParameterSet ``` -Get-AzNetworkInterfaceTapConfig -ResourceId [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Get-AzNetworkInterfaceTapConfig -ResourceId [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -97,6 +98,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManager.md b/src/Network/Network/help/Get-AzNetworkManager.md index 1aa7b7a64bff..fe4dea77777d 100644 --- a/src/Network/Network/help/Get-AzNetworkManager.md +++ b/src/Network/Network/help/Get-AzNetworkManager.md @@ -15,13 +15,13 @@ Gets a network manager in a resource group. ### NoExpand (Default) ``` Get-AzNetworkManager [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManager -Name -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -149,6 +149,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerActiveConnectivityConfiguration.md b/src/Network/Network/help/Get-AzNetworkManagerActiveConnectivityConfiguration.md index d162d04020da..835dc1fa523e 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerActiveConnectivityConfiguration.md +++ b/src/Network/Network/help/Get-AzNetworkManagerActiveConnectivityConfiguration.md @@ -14,7 +14,8 @@ Lists NetworkManager Active Connectivity Configurations in network manager. ``` Get-AzNetworkManagerActiveConnectivityConfiguration -NetworkManagerName -ResourceGroupName - [-Region ] [-SkipToken ] [-DefaultProfile ] [] + [-Region ] [-SkipToken ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Region List of regions. diff --git a/src/Network/Network/help/Get-AzNetworkManagerActiveSecurityAdminRule.md b/src/Network/Network/help/Get-AzNetworkManagerActiveSecurityAdminRule.md index 11d7ac84f368..3b6cbc1c545a 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerActiveSecurityAdminRule.md +++ b/src/Network/Network/help/Get-AzNetworkManagerActiveSecurityAdminRule.md @@ -14,7 +14,8 @@ Lists NetworkManager Active Security Admin Rules in network manager. ``` Get-AzNetworkManagerActiveSecurityAdminRule -NetworkManagerName -ResourceGroupName - [-Region ] [-SkipToken ] [-DefaultProfile ] [] + [-Region ] [-SkipToken ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +121,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Region List of regions. diff --git a/src/Network/Network/help/Get-AzNetworkManagerConnectivityConfiguration.md b/src/Network/Network/help/Get-AzNetworkManagerConnectivityConfiguration.md index ae159ff93076..65f39a407b13 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerConnectivityConfiguration.md +++ b/src/Network/Network/help/Get-AzNetworkManagerConnectivityConfiguration.md @@ -15,13 +15,15 @@ Gets a connectivity configuration in a network manager. ### NoExpand (Default) ``` Get-AzNetworkManagerConnectivityConfiguration [-Name ] -NetworkManagerName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ### Expand ``` Get-AzNetworkManagerConnectivityConfiguration -Name -NetworkManagerName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -228,6 +230,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerDeploymentStatus.md b/src/Network/Network/help/Get-AzNetworkManagerDeploymentStatus.md index 5dad3171e4bd..15389fb7cd43 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerDeploymentStatus.md +++ b/src/Network/Network/help/Get-AzNetworkManagerDeploymentStatus.md @@ -15,7 +15,7 @@ Lists Deployment Status in a network manager. ``` Get-AzNetworkManagerDeploymentStatus -NetworkManagerName -ResourceGroupName [-Region ] [-DeploymentType ] [-SkipToken ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -95,6 +95,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Region List of regions. diff --git a/src/Network/Network/help/Get-AzNetworkManagerEffectiveConnectivityConfiguration.md b/src/Network/Network/help/Get-AzNetworkManagerEffectiveConnectivityConfiguration.md index dab2144ea06c..5bcf7aa154c8 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerEffectiveConnectivityConfiguration.md +++ b/src/Network/Network/help/Get-AzNetworkManagerEffectiveConnectivityConfiguration.md @@ -15,7 +15,7 @@ Lists NetworkManager Effective Connectivity Configurations applied on a virtual ``` Get-AzNetworkManagerEffectiveConnectivityConfiguration -VirtualNetworkName -VirtualNetworkResourceGroupName [-SkipToken ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -90,6 +90,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SkipToken SkipToken. diff --git a/src/Network/Network/help/Get-AzNetworkManagerEffectiveSecurityAdminRule.md b/src/Network/Network/help/Get-AzNetworkManagerEffectiveSecurityAdminRule.md index da49793f17f7..731e178c1cc2 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerEffectiveSecurityAdminRule.md +++ b/src/Network/Network/help/Get-AzNetworkManagerEffectiveSecurityAdminRule.md @@ -15,7 +15,7 @@ Lists NetworkManager Effective Security Admin Rules applied on a virtual network ``` Get-AzNetworkManagerEffectiveSecurityAdminRule -VirtualNetworkName -VirtualNetworkResourceGroupName [-SkipToken ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -104,6 +104,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SkipToken SkipToken. diff --git a/src/Network/Network/help/Get-AzNetworkManagerGroup.md b/src/Network/Network/help/Get-AzNetworkManagerGroup.md index 74f3103774b7..b4ac05723ed7 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerGroup.md +++ b/src/Network/Network/help/Get-AzNetworkManagerGroup.md @@ -15,13 +15,13 @@ Gets network group(s) in a network manager. ### NoExpand (Default) ``` Get-AzNetworkManagerGroup [-Name ] -NetworkManagerName -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManagerGroup -Name -NetworkManagerName -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -154,6 +154,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerManagementGroupConnection.md b/src/Network/Network/help/Get-AzNetworkManagerManagementGroupConnection.md index 498a44fa3f95..ff183a5602b8 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerManagementGroupConnection.md +++ b/src/Network/Network/help/Get-AzNetworkManagerManagementGroupConnection.md @@ -15,13 +15,13 @@ Gets a network manager management group connection. ### NoExpand (Default) ``` Get-AzNetworkManagerManagementGroupConnection -ManagementGroupId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManagerManagementGroupConnection -ManagementGroupId -Name - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -142,6 +142,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md index fec5e46d9709..253a3edec453 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/Get-AzNetworkManagerScopeConnection.md @@ -15,13 +15,13 @@ Gets a scope connection in a network manager. ### NoExpand (Default) ``` Get-AzNetworkManagerScopeConnection [-Name ] -NetworkManagerName -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManagerScopeConnection -Name -NetworkManagerName -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -164,6 +164,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminConfiguration.md b/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminConfiguration.md index 72c9c9262331..901ee6322c33 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminConfiguration.md +++ b/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminConfiguration.md @@ -15,13 +15,15 @@ Gets a network security admin configuration in a network manager. ### NoExpand (Default) ``` Get-AzNetworkManagerSecurityAdminConfiguration [-Name ] -NetworkManagerName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ### Expand ``` Get-AzNetworkManagerSecurityAdminConfiguration -Name -NetworkManagerName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -160,6 +162,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRule.md b/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRule.md index 315e8da61c30..a891a8a97ba1 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRule.md +++ b/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRule.md @@ -16,14 +16,14 @@ Gets a security admin rule in a network manager. ``` Get-AzNetworkManagerSecurityAdminRule [-Name ] -RuleCollectionName -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManagerSecurityAdminRule -Name -RuleCollectionName -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -219,6 +219,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRuleCollection.md b/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRuleCollection.md index 9a040153b4b1..09a9ae1485ad 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRuleCollection.md +++ b/src/Network/Network/help/Get-AzNetworkManagerSecurityAdminRuleCollection.md @@ -16,14 +16,14 @@ Gets a security admin rule collection in a network manager. ``` Get-AzNetworkManagerSecurityAdminRuleCollection [-Name ] -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManagerSecurityAdminRuleCollection -Name -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -168,6 +168,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerStaticMember.md b/src/Network/Network/help/Get-AzNetworkManagerStaticMember.md index 362f9d4b75ed..b0179df0231c 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerStaticMember.md +++ b/src/Network/Network/help/Get-AzNetworkManagerStaticMember.md @@ -15,13 +15,15 @@ Gets network manager static members. ### NoExpand (Default) ``` Get-AzNetworkManagerStaticMember [-Name ] -NetworkGroupName -NetworkManagerName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ### Expand ``` Get-AzNetworkManagerStaticMember -Name -NetworkGroupName -NetworkManagerName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -143,6 +145,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkManagerSubscriptionConnection.md b/src/Network/Network/help/Get-AzNetworkManagerSubscriptionConnection.md index dc17ed3aadfb..6d9f04115990 100644 --- a/src/Network/Network/help/Get-AzNetworkManagerSubscriptionConnection.md +++ b/src/Network/Network/help/Get-AzNetworkManagerSubscriptionConnection.md @@ -15,13 +15,13 @@ Gets a network manager subscription connection. ### NoExpand (Default) ``` Get-AzNetworkManagerSubscriptionConnection [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkManagerSubscriptionConnection -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -127,6 +127,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzNetworkProfile.md b/src/Network/Network/help/Get-AzNetworkProfile.md index 66649c1f7f58..675fa1bfdc21 100644 --- a/src/Network/Network/help/Get-AzNetworkProfile.md +++ b/src/Network/Network/help/Get-AzNetworkProfile.md @@ -15,24 +15,25 @@ Gets an existing network profile top level resource ### GetByResourceNameNoExpandParameterSet (Default) ``` Get-AzNetworkProfile [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceNameExpandParameterSet ``` Get-AzNetworkProfile -ResourceGroupName -Name -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetByResourceIdExpandParameterSet ``` Get-AzNetworkProfile -ResourceId -ExpandResource [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdNoExpandParameterSet ``` -Get-AzNetworkProfile -ResourceId [-DefaultProfile ] [] +Get-AzNetworkProfile -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -165,6 +166,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the network profile. diff --git a/src/Network/Network/help/Get-AzNetworkSecurityGroup.md b/src/Network/Network/help/Get-AzNetworkSecurityGroup.md index e7beca41b02e..bce59099643e 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityGroup.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityGroup.md @@ -16,13 +16,13 @@ Gets a network security group. ### NoExpand ``` Get-AzNetworkSecurityGroup [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Expand ``` Get-AzNetworkSecurityGroup -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -696,3 +696,116 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## NOTES ## RELATED LINKS + + +## PARAMETERS + +### -DefaultProfile +The credentials, account, tenant, and subscription used for communication with Azure. + +```yaml +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer +Parameter Sets: (All) +Aliases: AzContext, AzureRmContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ExpandResource +The resource reference to be expanded. + +```yaml +Type: System.String +Parameter Sets: Expand +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByPropertyName) +Accept wildcard characters: False +``` + +### -Name +The resource name. + +```yaml +Type: System.String +Parameter Sets: NoExpand +Aliases: ResourceName + +Required: False +Position: Named +Default value: None +Accept pipeline input: True (ByPropertyName) +Accept wildcard characters: True +``` + +```yaml +Type: System.String +Parameter Sets: Expand +Aliases: ResourceName + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByPropertyName) +Accept wildcard characters: True +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ResourceGroupName +The resource group name. + +```yaml +Type: System.String +Parameter Sets: NoExpand +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: True (ByPropertyName) +Accept wildcard characters: True +``` + +```yaml +Type: System.String +Parameter Sets: Expand +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByPropertyName) +Accept wildcard characters: True +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +## OUTPUTS + +## NOTES + +## RELATED LINKS diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeter.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeter.md index aef01a931297..3489b02c6183 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeter.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeter.md @@ -15,25 +15,25 @@ Gets the specified network security perimeter by the name. ### List (Default) ``` Get-AzNetworkSecurityPerimeter [-SubscriptionId ] [-SkipToken ] [-Top ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Get ``` Get-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### List1 ``` Get-AzNetworkSecurityPerimeter -ResourceGroupName [-SubscriptionId ] [-SkipToken ] - [-Top ] [-DefaultProfile ] [] + [-Top ] [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzNetworkSecurityPerimeter -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -41,27 +41,67 @@ Gets the specified network security perimeter by the name. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: List NetworkSecurityPerimeter +```powershell Get-AzNetworkSecurityPerimeter -ResourceGroupName ResourceGroup-1 ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- +eastus2euap nsp4 +eastus2euap nsp3 +eastus2euap nsp1 +eastus2euap nsp6 +eastus2euap nsp5 ``` + +List NetworkSecurityPerimeter + +### Example 2: List NetworkSecurityPerimeter in a subscription +```powershell Get-AzNetworkSecurityPerimeter ``` -### EXAMPLE 3 +```output +Location Name +-------- ---- +eastus2euap nsp4 +eastus2euap nsp3 +eastus2euap nsp1 +eastus2euap nsp6 +eastus2euap nsp5 ``` + +List NetworkSecurityPerimeter in a subscription + +### Example 3: Gets a NetworkSecurityPerimeter by Name +```powershell Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 ``` -### EXAMPLE 4 +```output +Location Name +-------- ---- +eastus2euap nsp3 ``` + +Gets a NetworkSecurityPerimeter by Name + +### Example 4: Gets a NetworkSecurityPerimeter by identity (using pipe) +```powershell $GETObj = Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 -Get-AzNetworkSecurityPerimeter -InputObject $GETObj + Get-AzNetworkSecurityPerimeter -InputObject $GETObj ``` +```output +Location Name +-------- ---- +eastus2euap nsp3 +``` + +Gets a NetworkSecurityPerimeter by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -69,7 +109,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -82,10 +122,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentity Aliases: @@ -100,7 +139,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Get Aliases: NetworkSecurityPerimeterName, SecurityPerimeterName, NSPName @@ -111,11 +150,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Get, List1 Aliases: @@ -131,7 +185,7 @@ SkipToken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting point to use for subsequent calls. ```yaml -Type: String +Type: System.String Parameter Sets: List, List1 Aliases: @@ -147,13 +201,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get, List1 Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -162,13 +216,13 @@ Accept wildcard characters: False An optional query parameter which specifies the maximum number of records to be returned by the server. ```yaml -Type: Int32 +Type: System.Int32 Parameter Sets: List, List1 Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -179,29 +233,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeter](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeter) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAccessRule.md index e21728dd3360..b728d414f9d1 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAccessRule.md @@ -16,32 +16,33 @@ Gets the specified NSP access rule by name. ``` Get-AzNetworkSecurityPerimeterAccessRule -ProfileName -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-SkipToken ] [-Top ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetViaIdentityProfile ``` Get-AzNetworkSecurityPerimeterAccessRule -Name -ProfileInputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetViaIdentityNetworkSecurityPerimeter ``` Get-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName - -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [] + -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzNetworkSecurityPerimeterAccessRule -InputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -49,22 +50,47 @@ Gets the specified NSP access rule by name. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: List NetworkSecurityPerimeterAccessRule +```powershell Get-AzNetworkSecurityPerimeterAccessRule -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- + ar4 + ar3 ``` + +List NetworkSecurityPerimeterAccessRule + +### Example 2: Gets a NetworkSecurityPerimeterAccessRule by Name +```powershell Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 3 +```output +Location Name +-------- ---- + ar3 ``` + +Gets a NetworkSecurityPerimeterAccessRule by Name + +### Example 3: Gets a NetworkSecurityPerimeterAccessRule by identity (using pipe) +```powershell $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -Get-AzNetworkSecurityPerimeterAccessRule -InputObject $GETObj + Get-AzNetworkSecurityPerimeterAccessRule -InputObject $GETObj +``` + +```output +Location Name +-------- ---- + ar3 ``` +Gets a NetworkSecurityPerimeterAccessRule by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -72,7 +98,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -85,10 +111,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentity Aliases: @@ -103,7 +128,7 @@ Accept wildcard characters: False The name of the NSP access rule. ```yaml -Type: String +Type: System.String Parameter Sets: GetViaIdentityProfile, GetViaIdentityNetworkSecurityPerimeter, Get Aliases: AccessRuleName @@ -116,10 +141,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentityNetworkSecurityPerimeter Aliases: @@ -132,10 +156,9 @@ Accept wildcard characters: False ### -ProfileInputObject Identity Parameter -To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentityProfile Aliases: @@ -150,7 +173,7 @@ Accept wildcard characters: False The name of the NSP profile. ```yaml -Type: String +Type: System.String Parameter Sets: List, GetViaIdentityNetworkSecurityPerimeter, Get Aliases: SecurityPerimeterProfileName, NSPProfileName @@ -161,11 +184,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -180,7 +218,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: NetworkSecurityPerimeterName, NSPName @@ -196,7 +234,7 @@ SkipToken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting point to use for subsequent calls. ```yaml -Type: String +Type: System.String Parameter Sets: List Aliases: @@ -212,13 +250,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -227,13 +265,13 @@ Accept wildcard characters: False An optional query parameter which specifies the maximum number of records to be returned by the server. ```yaml -Type: Int32 +Type: System.Int32 Parameter Sets: List Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -244,55 +282,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. - -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -PROFILEINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeteraccessrule](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeteraccessrule) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociableResourceType.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociableResourceType.md index f17fb57b11a8..c2d91279ea3d 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociableResourceType.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociableResourceType.md @@ -15,7 +15,7 @@ These resources can be associated with a network security perimeter ``` Get-AzNetworkSecurityPerimeterAssociableResourceType -Location [-SubscriptionId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -24,11 +24,29 @@ These resources can be associated with a network security perimeter ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: List Perimeter Associable Resource Types +```powershell Get-AzNetworkSecurityPerimeterAssociableResourceType -Location eastus2euap ``` +```output +Location Name +-------- ---- + Microsoft.Sql.servers + Microsoft.Storage.storageAccounts + Microsoft.EventHub.namespaces + Microsoft.CognitiveServices.accounts + Microsoft.Search.searchServices + Microsoft.Purview.accounts + Microsoft.ContainerService.managedClusters + Microsoft.KeyVault.vaults + Microsoft.OperationalInsights.workspaces + Microsoft.Insights.dataCollectionEndpoints + Microsoft.ServiceBus.namespaces +``` + +List Perimeter Associable Resource Types + ## PARAMETERS ### -DefaultProfile @@ -36,7 +54,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -51,7 +69,7 @@ Accept wildcard characters: False The location of network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -62,18 +80,33 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SubscriptionId The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -86,9 +119,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IPerimeterAssociableResource + ## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterassociableresourcetype](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterassociableresourcetype) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociation.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociation.md index 5c0f456d5bc7..35d6f2c38d06 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterAssociation.md @@ -16,26 +16,27 @@ Gets the specified NSP association by name. ``` Get-AzNetworkSecurityPerimeterAssociation -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-SkipToken ] [-Top ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentityNetworkSecurityPerimeter ``` Get-AzNetworkSecurityPerimeterAssociation -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName - -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [] + -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzNetworkSecurityPerimeterAssociation -InputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -43,22 +44,47 @@ Gets the specified NSP association by name. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: List NetworkSecurityPerimeterAccessAssociation +```powershell Get-AzNetworkSecurityPerimeterAssociation -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- + association1 + association3 ``` + +List NetworkSecurityPerimeterAccessAssociation + +### Example 2: Gets a NetworkSecurityPerimeterAccessAssociation by Name +```powershell Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 3 +```output +Location Name +-------- ---- + association3 ``` + +Gets a NetworkSecurityPerimeterAccessAssociation by Name + +### Example 3: Gets a NetworkSecurityPerimeterAccessAssociation by identity (using pipe) +```powershell $GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -Get-AzNetworkSecurityPerimeterAssociation -InputObject $GETObj + Get-AzNetworkSecurityPerimeterAssociation -InputObject $GETObj +``` + +```output +Location Name +-------- ---- + association3 ``` +Gets a NetworkSecurityPerimeterAccessAssociation by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -66,7 +92,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -79,10 +105,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentity Aliases: @@ -97,7 +122,7 @@ Accept wildcard characters: False The name of the NSP association. ```yaml -Type: String +Type: System.String Parameter Sets: GetViaIdentityNetworkSecurityPerimeter, Get Aliases: AssociationName @@ -110,10 +135,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentityNetworkSecurityPerimeter Aliases: @@ -124,11 +148,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -143,7 +182,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: NetworkSecurityPerimeterName, NSPName @@ -159,7 +198,7 @@ SkipToken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting point to use for subsequent calls. ```yaml -Type: String +Type: System.String Parameter Sets: List Aliases: @@ -175,13 +214,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -190,13 +229,13 @@ Accept wildcard characters: False An optional query parameter which specifies the maximum number of records to be returned by the server. ```yaml -Type: Int32 +Type: System.Int32 Parameter Sets: List Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -207,42 +246,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterassociation](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterassociation) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLink.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLink.md index 60aa15f93085..376279d18d4b 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLink.md @@ -16,26 +16,27 @@ Gets the specified NSP link resource. ``` Get-AzNetworkSecurityPerimeterLink -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-SkipToken ] [-Top ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentityNetworkSecurityPerimeter ``` Get-AzNetworkSecurityPerimeterLink -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -SecurityPerimeterName - [-SubscriptionId ] [-DefaultProfile ] [] + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### GetViaIdentity ``` Get-AzNetworkSecurityPerimeterLink -InputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -43,16 +44,32 @@ Gets the specified NSP link resource. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Lists Network security perimeter links +```powershell Get-AzNetworkSecurityPerimeterLink -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp2 ``` -### EXAMPLE 2 +```output +Etag Name +---- ---- + t-link1 ``` + +Lists Network security perimeter links + +### Example 2: Get a Network security perimeter link +```powershell Get-AzNetworkSecurityPerimeterLink -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp2 -Name t-link1 ``` +```output +Etag Name +---- ---- + t-link1 +``` + +Get a Network security perimeter link + ## PARAMETERS ### -DefaultProfile @@ -60,7 +77,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -73,10 +90,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentity Aliases: @@ -91,7 +107,7 @@ Accept wildcard characters: False The name of the NSP link. ```yaml -Type: String +Type: System.String Parameter Sets: GetViaIdentityNetworkSecurityPerimeter, Get Aliases: LinkName @@ -104,10 +120,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentityNetworkSecurityPerimeter Aliases: @@ -118,11 +133,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -137,7 +167,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: NetworkSecurityPerimeterName, NSPName @@ -153,7 +183,7 @@ SkipToken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting point to use for subsequent calls. ```yaml -Type: String +Type: System.String Parameter Sets: List Aliases: @@ -169,13 +199,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -184,13 +214,13 @@ Accept wildcard characters: False An optional query parameter which specifies the maximum number of records to be returned by the server. ```yaml -Type: Int32 +Type: System.Int32 Parameter Sets: List Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -201,42 +231,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterlink](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterlink) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLinkReference.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLinkReference.md index a8acf597d681..c7145436af29 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLinkReference.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterLinkReference.md @@ -16,26 +16,27 @@ Gets the specified NSP linkReference resource. ``` Get-AzNetworkSecurityPerimeterLinkReference -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-SkipToken ] [-Top ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentityNetworkSecurityPerimeter ``` Get-AzNetworkSecurityPerimeterLinkReference -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzNetworkSecurityPerimeterLinkReference -Name -ResourceGroupName - -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [] + -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzNetworkSecurityPerimeterLinkReference -InputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -43,16 +44,32 @@ Gets the specified NSP linkReference resource. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Lists network security link references +```powershell Get-AzNetworkSecurityPerimeterLinkReference -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp3 ``` -### EXAMPLE 2 +```output +Etag Name +---- ---- + Ref-from-t-link1-1738a5f3-78f8-4f1b-8f30-ffe0eaa74495 ``` + +Lists network security link references + +### Example 2: Gets a network security link reference by name +```powershell Get-AzNetworkSecurityPerimeterLinkReference -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp3 -Name Ref-from-t-link1-1738a5f3-78f8-4f1b-8f30-ffe0eaa74495 ``` +```output +Etag Name +---- ---- + Ref-from-t-link1-1738a5f3-78f8-4f1b-8f30-ffe0eaa74495 +``` + +Gets a network security link reference by name + ## PARAMETERS ### -DefaultProfile @@ -60,7 +77,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -73,10 +90,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentity Aliases: @@ -91,7 +107,7 @@ Accept wildcard characters: False The name of the NSP linkReference. ```yaml -Type: String +Type: System.String Parameter Sets: GetViaIdentityNetworkSecurityPerimeter, Get Aliases: LinkReferenceName @@ -104,10 +120,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentityNetworkSecurityPerimeter Aliases: @@ -118,11 +133,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -137,7 +167,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: NetworkSecurityPerimeterName, NSPName @@ -153,7 +183,7 @@ SkipToken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting point to use for subsequent calls. ```yaml -Type: String +Type: System.String Parameter Sets: List Aliases: @@ -169,13 +199,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -184,13 +214,13 @@ Accept wildcard characters: False An optional query parameter which specifies the maximum number of records to be returned by the server. ```yaml -Type: Int32 +Type: System.Int32 Parameter Sets: List Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -201,42 +231,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReference -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterlinkreference](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterlinkreference) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterProfile.md b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterProfile.md index a86e78136814..0a9ae50f7154 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityPerimeterProfile.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityPerimeterProfile.md @@ -16,26 +16,27 @@ Gets the specified NSP profile. ``` Get-AzNetworkSecurityPerimeterProfile -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-SkipToken ] [-Top ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetViaIdentityNetworkSecurityPerimeter ``` Get-AzNetworkSecurityPerimeterProfile -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Get ``` Get-AzNetworkSecurityPerimeterProfile -Name -ResourceGroupName - -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [] + -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### GetViaIdentity ``` Get-AzNetworkSecurityPerimeterProfile -InputObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -43,22 +44,47 @@ Gets the specified NSP profile. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Gets a NetworkSecurityPerimeterProfile by Name +```powershell Get-AzNetworkSecurityPerimeterProfile -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- +eastus2euap profile1 +eastus2euap profile2 ``` + +Lists NetworkSecurityPerimeterProfile + +### Example 2: Gets a NetworkSecurityPerimeterProfile by Name +```powershell Get-AzNetworkSecurityPerimeterProfile -Name profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 3 +```output +Location Name +-------- ---- +eastus2euap profile1 ``` + +Gets a NetworkSecurityPerimeterProfile by Name + +### Example 3: Gets a NetworkSecurityPerimeterProfile by identity (using pipe) +```powershell $GETObj = Get-AzNetworkSecurityPerimeterProfile -Name profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -Get-AzNetworkSecurityPerimeterProfile -InputObject $GETObj + Get-AzNetworkSecurityPerimeterProfile -InputObject $GETObj +``` + +```output +Location Name +-------- ---- +eastus2euap profile1 ``` +Gets a NetworkSecurityPerimeterProfile by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -66,7 +92,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -79,10 +105,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentity Aliases: @@ -97,7 +122,7 @@ Accept wildcard characters: False The name of the NSP profile. ```yaml -Type: String +Type: System.String Parameter Sets: GetViaIdentityNetworkSecurityPerimeter, Get Aliases: ProfileName @@ -110,10 +135,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: GetViaIdentityNetworkSecurityPerimeter Aliases: @@ -124,11 +148,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: @@ -143,7 +182,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: List, Get Aliases: NetworkSecurityPerimeterName, NSPName @@ -159,7 +198,7 @@ SkipToken is only used if a previous operation returned a partial result. If a previous response contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting point to use for subsequent calls. ```yaml -Type: String +Type: System.String Parameter Sets: List Aliases: @@ -175,13 +214,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: List, Get Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -190,13 +229,13 @@ Accept wildcard characters: False An optional query parameter which specifies the maximum number of records to be returned by the server. ```yaml -Type: Int32 +Type: System.Int32 Parameter Sets: List Aliases: Required: False Position: Named -Default value: 0 +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -207,42 +246,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterprofile](https://learn.microsoft.com/powershell/module/az.network/get-aznetworksecurityperimeterprofile) - diff --git a/src/Network/Network/help/Get-AzNetworkSecurityRuleConfig.md b/src/Network/Network/help/Get-AzNetworkSecurityRuleConfig.md index 3be385827c6b..690e9de56099 100644 --- a/src/Network/Network/help/Get-AzNetworkSecurityRuleConfig.md +++ b/src/Network/Network/help/Get-AzNetworkSecurityRuleConfig.md @@ -15,7 +15,7 @@ Get a network security rule configuration for a network security group. ``` Get-AzNetworkSecurityRuleConfig [-Name ] -NetworkSecurityGroup [-DefaultRules] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -101,6 +101,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzNetworkServiceTag.md b/src/Network/Network/help/Get-AzNetworkServiceTag.md index b0391fe30bc6..d0637972111b 100644 --- a/src/Network/Network/help/Get-AzNetworkServiceTag.md +++ b/src/Network/Network/help/Get-AzNetworkServiceTag.md @@ -13,7 +13,8 @@ Gets the list of service tag information resources. ## SYNTAX ``` -Get-AzNetworkServiceTag -Location [-DefaultProfile ] [] +Get-AzNetworkServiceTag -Location [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -207,6 +208,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzNetworkUsage.md b/src/Network/Network/help/Get-AzNetworkUsage.md index 60fd8ae70420..1862aa532998 100644 --- a/src/Network/Network/help/Get-AzNetworkUsage.md +++ b/src/Network/Network/help/Get-AzNetworkUsage.md @@ -13,7 +13,8 @@ Lists network usages for a subscription ## SYNTAX ``` -Get-AzNetworkUsage -Location [-DefaultProfile ] [] +Get-AzNetworkUsage -Location [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzNetworkVirtualAppliance.md b/src/Network/Network/help/Get-AzNetworkVirtualAppliance.md index af12586426b2..03467d265504 100644 --- a/src/Network/Network/help/Get-AzNetworkVirtualAppliance.md +++ b/src/Network/Network/help/Get-AzNetworkVirtualAppliance.md @@ -15,13 +15,13 @@ Get or List Network Virtual Appliances. ### ResourceNameParameterSet (Default) ``` Get-AzNetworkVirtualAppliance [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdParameterSet ``` Get-AzNetworkVirtualAppliance -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -90,6 +90,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkVirtualApplianceConnection.md b/src/Network/Network/help/Get-AzNetworkVirtualApplianceConnection.md index e03919913197..c6156e8959b5 100644 --- a/src/Network/Network/help/Get-AzNetworkVirtualApplianceConnection.md +++ b/src/Network/Network/help/Get-AzNetworkVirtualApplianceConnection.md @@ -15,19 +15,20 @@ Get or List Network Virtual Appliances connections connected to a Network Virtua ### ResourceNameParameterSet (Default) ``` Get-AzNetworkVirtualApplianceConnection -ResourceGroupName -VirtualApplianceName - [-Name ] [-DefaultProfile ] [] + [-Name ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ResourceObjectParameterSet ``` Get-AzNetworkVirtualApplianceConnection -VirtualAppliance [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdParameterSet ``` Get-AzNetworkVirtualApplianceConnection -VirtualApplianceResourceId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -134,6 +135,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkVirtualApplianceSku.md b/src/Network/Network/help/Get-AzNetworkVirtualApplianceSku.md index af504e91500f..f46da2cfef69 100644 --- a/src/Network/Network/help/Get-AzNetworkVirtualApplianceSku.md +++ b/src/Network/Network/help/Get-AzNetworkVirtualApplianceSku.md @@ -14,7 +14,7 @@ Get or List available Network Virtual Appliance Skus in the inventory. ``` Get-AzNetworkVirtualApplianceSku [-SkuName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SkuName The Sku name. diff --git a/src/Network/Network/help/Get-AzNetworkWatcher.md b/src/Network/Network/help/Get-AzNetworkWatcher.md index 155c669c946c..2bdc6adf110b 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcher.md +++ b/src/Network/Network/help/Get-AzNetworkWatcher.md @@ -15,12 +15,13 @@ Gets the properties of a Network Watcher ### List ``` Get-AzNetworkWatcher [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByLocation ``` -Get-AzNetworkWatcher -Location [-DefaultProfile ] [] +Get-AzNetworkWatcher -Location [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -114,6 +115,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitor.md b/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitor.md index b0e237216334..4a00dfb0d847 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitor.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitor.md @@ -15,25 +15,25 @@ Returns connection monitor with specified name or the list of connection monitor ### SetByName (Default) ``` Get-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` Get-AzNetworkWatcherConnectionMonitor -NetworkWatcher [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherConnectionMonitor -Location [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId ``` Get-AzNetworkWatcherConnectionMonitor -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -149,6 +149,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitorReport.md b/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitorReport.md index 0bc8e09b016b..1ce693b22e6b 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitorReport.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherConnectionMonitorReport.md @@ -15,31 +15,32 @@ Query a snapshot of the most recent connection states. ### SetByName (Default) ``` Get-AzNetworkWatcherConnectionMonitorReport -NetworkWatcherName -ResourceGroupName - -Name [-AsJob] [-DefaultProfile ] [] + -Name [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResource ``` Get-AzNetworkWatcherConnectionMonitorReport -NetworkWatcher -Name [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherConnectionMonitorReport -Location -Name [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId ``` Get-AzNetworkWatcherConnectionMonitorReport -ResourceId [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByInputObject ``` Get-AzNetworkWatcherConnectionMonitorReport -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -320,6 +321,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherFlowLog.md b/src/Network/Network/help/Get-AzNetworkWatcherFlowLog.md index 4ca9fe771c18..ae48c90330e5 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherFlowLog.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherFlowLog.md @@ -15,25 +15,25 @@ Gets a flow log resource or a list of flow log resources in the specified subscr ### SetByName (Default) ``` Get-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` Get-AzNetworkWatcherFlowLog -NetworkWatcher [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherFlowLog -Location [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResourceId ``` Get-AzNetworkWatcherFlowLog -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -163,6 +163,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherFlowLogStatus.md b/src/Network/Network/help/Get-AzNetworkWatcherFlowLogStatus.md index 46d4aa8f279a..159c501e139c 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherFlowLogStatus.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherFlowLogStatus.md @@ -15,19 +15,20 @@ Gets the status of flow logging on a resource. ### SetByResource (Default) ``` Get-AzNetworkWatcherFlowLogStatus -NetworkWatcher -TargetResourceId [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName ``` Get-AzNetworkWatcherFlowLogStatus -NetworkWatcherName -ResourceGroupName - -TargetResourceId [-AsJob] [-DefaultProfile ] [] + -TargetResourceId [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherFlowLogStatus -Location -TargetResourceId [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -173,6 +174,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherNextHop.md b/src/Network/Network/help/Get-AzNetworkWatcherNextHop.md index 47aca4e5707a..5aae24e8ea7d 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherNextHop.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherNextHop.md @@ -16,21 +16,22 @@ Gets the next hop from a VM. ``` Get-AzNetworkWatcherNextHop -NetworkWatcher -TargetVirtualMachineId -DestinationIPAddress -SourceIPAddress [-TargetNetworkInterfaceId ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName ``` Get-AzNetworkWatcherNextHop -NetworkWatcherName -ResourceGroupName -TargetVirtualMachineId -DestinationIPAddress -SourceIPAddress - [-TargetNetworkInterfaceId ] [-AsJob] [-DefaultProfile ] [] + [-TargetNetworkInterfaceId ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherNextHop -Location -TargetVirtualMachineId -DestinationIPAddress -SourceIPAddress [-TargetNetworkInterfaceId ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -148,6 +149,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherPacketCapture.md b/src/Network/Network/help/Get-AzNetworkWatcherPacketCapture.md index 604b77705748..d0ee812d191f 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherPacketCapture.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherPacketCapture.md @@ -15,19 +15,20 @@ Gets information and properties and status of a packet capture resource. ### SetByResource (Default) ``` Get-AzNetworkWatcherPacketCapture -NetworkWatcher [-PacketCaptureName ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName ``` Get-AzNetworkWatcherPacketCapture -NetworkWatcherName -ResourceGroupName - [-PacketCaptureName ] [-AsJob] [-DefaultProfile ] [] + [-PacketCaptureName ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherPacketCapture -Location [-PacketCaptureName ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -155,6 +156,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherReachabilityProvidersList.md b/src/Network/Network/help/Get-AzNetworkWatcherReachabilityProvidersList.md index fb21799acf3f..44ecd38e85b6 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherReachabilityProvidersList.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherReachabilityProvidersList.md @@ -16,27 +16,28 @@ Lists all available internet service providers for a specified Azure region. ``` Get-AzNetworkWatcherReachabilityProvidersList -NetworkWatcherName -ResourceGroupName [-Location ] [-Country ] [-State ] [-City ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` Get-AzNetworkWatcherReachabilityProvidersList -NetworkWatcher [-Location ] [-Country ] [-State ] [-City ] [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherReachabilityProvidersList -NetworkWatcherLocation [-Location ] [-Country ] [-State ] [-City ] [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResourceId ``` Get-AzNetworkWatcherReachabilityProvidersList -ResourceId [-Location ] [-Country ] - [-State ] [-City ] [-AsJob] [-DefaultProfile ] [] + [-State ] [-City ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -209,6 +210,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherReachabilityReport.md b/src/Network/Network/help/Get-AzNetworkWatcherReachabilityReport.md index 8996a8a3a181..3f3c1a1df019 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherReachabilityReport.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherReachabilityReport.md @@ -16,28 +16,31 @@ Gets the relative latency score for internet service providers from a specified ``` Get-AzNetworkWatcherReachabilityReport -NetworkWatcherName -ResourceGroupName [-Provider ] [-Location ] -StartTime -EndTime [-Country ] - [-State ] [-City ] [-AsJob] [-DefaultProfile ] [] + [-State ] [-City ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResource ``` Get-AzNetworkWatcherReachabilityReport -NetworkWatcher [-Provider ] [-Location ] -StartTime -EndTime [-Country ] [-State ] - [-City ] [-AsJob] [-DefaultProfile ] [] + [-City ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResourceId ``` Get-AzNetworkWatcherReachabilityReport -ResourceId [-Provider ] [-Location ] -StartTime -EndTime [-Country ] [-State ] [-City ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherReachabilityReport -NetworkWatcherLocation [-Provider ] [-Location ] -StartTime -EndTime [-Country ] [-State ] - [-City ] [-AsJob] [-DefaultProfile ] [] + [-City ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -228,6 +231,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Provider List of Internet service providers. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherSecurityGroupView.md b/src/Network/Network/help/Get-AzNetworkWatcherSecurityGroupView.md index c0594145ee09..77bce8355db1 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherSecurityGroupView.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherSecurityGroupView.md @@ -15,19 +15,20 @@ View the configured and effective network security group rules applied on a VM. ### SetByResource (Default) ``` Get-AzNetworkWatcherSecurityGroupView -NetworkWatcher -TargetVirtualMachineId - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName ``` Get-AzNetworkWatcherSecurityGroupView -NetworkWatcherName -ResourceGroupName - -TargetVirtualMachineId [-AsJob] [-DefaultProfile ] [] + -TargetVirtualMachineId [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherSecurityGroupView -Location -TargetVirtualMachineId [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -123,6 +124,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherTopology.md b/src/Network/Network/help/Get-AzNetworkWatcherTopology.md index d721432775ee..89d1733ac734 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherTopology.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherTopology.md @@ -15,19 +15,20 @@ Gets a network level view of resources and their relationships in a resource gro ### SetByResource (Default) ``` Get-AzNetworkWatcherTopology -NetworkWatcher -TargetResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName ``` Get-AzNetworkWatcherTopology -NetworkWatcherName -ResourceGroupName - -TargetResourceGroupName [-DefaultProfile ] [] + -TargetResourceGroupName [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByLocation ``` Get-AzNetworkWatcherTopology -Location -TargetResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -200,6 +201,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzNetworkWatcherTroubleshootingResult.md b/src/Network/Network/help/Get-AzNetworkWatcherTroubleshootingResult.md index c32a046b62e3..6b9e5d7334c9 100644 --- a/src/Network/Network/help/Get-AzNetworkWatcherTroubleshootingResult.md +++ b/src/Network/Network/help/Get-AzNetworkWatcherTroubleshootingResult.md @@ -15,19 +15,20 @@ Gets the troubleshooting result from the previously run or currently running tro ### SetByResource (Default) ``` Get-AzNetworkWatcherTroubleshootingResult -NetworkWatcher -TargetResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName ``` Get-AzNetworkWatcherTroubleshootingResult -NetworkWatcherName -ResourceGroupName - -TargetResourceId [-DefaultProfile ] [] + -TargetResourceId [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByLocation ``` Get-AzNetworkWatcherTroubleshootingResult -Location -TargetResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -115,6 +116,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Get-AzP2sVpnGateway.md b/src/Network/Network/help/Get-AzP2sVpnGateway.md index 6d6635fc9f0f..f0d74d597344 100644 --- a/src/Network/Network/help/Get-AzP2sVpnGateway.md +++ b/src/Network/Network/help/Get-AzP2sVpnGateway.md @@ -14,13 +14,14 @@ Gets an existing P2SVpnGateway under VirtualHub. ### ListBySubscriptionId (Default) ``` -Get-AzP2sVpnGateway [-DefaultProfile ] [] +Get-AzP2sVpnGateway [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzP2sVpnGateway [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -112,6 +113,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzP2sVpnGatewayConnectionHealth.md b/src/Network/Network/help/Get-AzP2sVpnGatewayConnectionHealth.md index 11ae72c06736..475f09a81fdc 100644 --- a/src/Network/Network/help/Get-AzP2sVpnGatewayConnectionHealth.md +++ b/src/Network/Network/help/Get-AzP2sVpnGatewayConnectionHealth.md @@ -15,19 +15,19 @@ Gets the current aggregared point to site connections health information from P2 ### ByP2SVpnGatewayName (Default) ``` Get-AzP2sVpnGatewayConnectionHealth [-Name ] -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByP2SVpnGatewayObject ``` Get-AzP2sVpnGatewayConnectionHealth -InputObject [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByP2SVpnGatewayResourceId ``` Get-AzP2sVpnGatewayConnectionHealth -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -123,6 +123,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzP2sVpnGatewayDetailedConnectionHealth.md b/src/Network/Network/help/Get-AzP2sVpnGatewayDetailedConnectionHealth.md index bacd61eec4c1..ca61fa26a5c9 100644 --- a/src/Network/Network/help/Get-AzP2sVpnGatewayDetailedConnectionHealth.md +++ b/src/Network/Network/help/Get-AzP2sVpnGatewayDetailedConnectionHealth.md @@ -16,19 +16,21 @@ Gets the detailed information of current point to site connections from P2SVpnGa ``` Get-AzP2sVpnGatewayDetailedConnectionHealth [-Name ] -ResourceGroupName -OutputBlobSasUrl [-VpnUserNamesFilter ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByP2SVpnGatewayObject ``` Get-AzP2sVpnGatewayDetailedConnectionHealth -InputObject -OutputBlobSasUrl - [-VpnUserNamesFilter ] [-DefaultProfile ] [] + [-VpnUserNamesFilter ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByP2SVpnGatewayResourceId ``` Get-AzP2sVpnGatewayDetailedConnectionHealth -ResourceId -OutputBlobSasUrl - [-VpnUserNamesFilter ] [-DefaultProfile ] [] + [-VpnUserNamesFilter ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -114,6 +116,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzP2sVpnGatewayVpnProfile.md b/src/Network/Network/help/Get-AzP2sVpnGatewayVpnProfile.md index 3666ad19114d..d9ddce8c29ce 100644 --- a/src/Network/Network/help/Get-AzP2sVpnGatewayVpnProfile.md +++ b/src/Network/Network/help/Get-AzP2sVpnGatewayVpnProfile.md @@ -15,19 +15,19 @@ Generates and returns a SAS url for customer to download Vpn profile for point t ### ByP2SVpnGatewayName (Default) ``` Get-AzP2sVpnGatewayVpnProfile [-Name ] -ResourceGroupName [-AuthenticationMethod ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByP2SVpnGatewayObject ``` Get-AzP2sVpnGatewayVpnProfile -InputObject [-AuthenticationMethod ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByP2SVpnGatewayResourceId ``` Get-AzP2sVpnGatewayVpnProfile -ResourceId [-AuthenticationMethod ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzPrivateDnsZoneGroup.md b/src/Network/Network/help/Get-AzPrivateDnsZoneGroup.md index b8b3a08b3447..e622a94750ff 100644 --- a/src/Network/Network/help/Get-AzPrivateDnsZoneGroup.md +++ b/src/Network/Network/help/Get-AzPrivateDnsZoneGroup.md @@ -15,13 +15,13 @@ Gets private DNS zone group ### List (Default) ``` Get-AzPrivateDnsZoneGroup -ResourceGroupName -PrivateEndpointName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetByName ``` Get-AzPrivateDnsZoneGroup -ResourceGroupName -PrivateEndpointName -Name - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -96,6 +96,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. diff --git a/src/Network/Network/help/Get-AzPrivateEndpoint.md b/src/Network/Network/help/Get-AzPrivateEndpoint.md index 62ede7db14bc..83474ead66b2 100644 --- a/src/Network/Network/help/Get-AzPrivateEndpoint.md +++ b/src/Network/Network/help/Get-AzPrivateEndpoint.md @@ -15,13 +15,13 @@ Get a private endpoint ### NoExpand (Default) ``` Get-AzPrivateEndpoint [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzPrivateEndpoint -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -170,6 +170,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzPrivateEndpointConnection.md b/src/Network/Network/help/Get-AzPrivateEndpointConnection.md index d1fd8b5a9e2c..eef28a82fe1d 100644 --- a/src/Network/Network/help/Get-AzPrivateEndpointConnection.md +++ b/src/Network/Network/help/Get-AzPrivateEndpointConnection.md @@ -15,20 +15,20 @@ Gets a private endpoint connection resource. ### ByResourceId (Default) ``` Get-AzPrivateEndpointConnection [-Description ] -ResourceId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByPrivateLinkResourceId ``` Get-AzPrivateEndpointConnection -PrivateLinkResourceId [-Description ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByResource ``` Get-AzPrivateEndpointConnection [-Description ] [-Name ] -ResourceGroupName - -ServiceName [-DefaultProfile ] -PrivateLinkResourceType - [] + -ServiceName [-DefaultProfile ] [-ProgressAction ] + -PrivateLinkResourceType [] ``` ## DESCRIPTION @@ -128,6 +128,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the private endpoint connection. diff --git a/src/Network/Network/help/Get-AzPrivateLinkResource.md b/src/Network/Network/help/Get-AzPrivateLinkResource.md index ddc4cd515b0e..dc19983eee4e 100644 --- a/src/Network/Network/help/Get-AzPrivateLinkResource.md +++ b/src/Network/Network/help/Get-AzPrivateLinkResource.md @@ -15,13 +15,14 @@ Gets a private link resource. ### ByPrivateLinkResourceId (Default) ``` Get-AzPrivateLinkResource -PrivateLinkResourceId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByResource ``` Get-AzPrivateLinkResource -ResourceGroupName -ServiceName [-Name ] - [-DefaultProfile ] [-PrivateLinkResourceType ] [] + [-DefaultProfile ] [-ProgressAction ] + [-PrivateLinkResourceType ] [] ``` ## DESCRIPTION @@ -99,6 +100,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzPrivateLinkService.md b/src/Network/Network/help/Get-AzPrivateLinkService.md index 116ecc4c444c..fa91456f5678 100644 --- a/src/Network/Network/help/Get-AzPrivateLinkService.md +++ b/src/Network/Network/help/Get-AzPrivateLinkService.md @@ -15,13 +15,13 @@ Gets private link service ### NoExpand (Default) ``` Get-AzPrivateLinkService [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### Expand ``` Get-AzPrivateLinkService -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -135,6 +135,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzPublicIpAddress.md b/src/Network/Network/help/Get-AzPublicIpAddress.md index 7c1ffec7adb0..032908023b91 100644 --- a/src/Network/Network/help/Get-AzPublicIpAddress.md +++ b/src/Network/Network/help/Get-AzPublicIpAddress.md @@ -16,27 +16,28 @@ Gets a public IP address. ### NoExpandStandAloneIp (Default) ``` Get-AzPublicIpAddress [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ExpandStandAloneIp ``` Get-AzPublicIpAddress -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### NoExpandScaleSetIp ``` Get-AzPublicIpAddress [-Name ] -ResourceGroupName [-VirtualMachineScaleSetName ] [-VirtualMachineIndex ] [-NetworkInterfaceName ] [-IpConfigurationName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ExpandScaleSetIp ``` Get-AzPublicIpAddress -Name -ResourceGroupName -VirtualMachineScaleSetName -VirtualMachineIndex -NetworkInterfaceName -IpConfigurationName - -ExpandResource [-DefaultProfile ] [] + -ExpandResource [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -223,6 +224,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the public IP address that this cmdlet gets. diff --git a/src/Network/Network/help/Get-AzPublicIpPrefix.md b/src/Network/Network/help/Get-AzPublicIpPrefix.md index ba4cbf7b36f1..8e5f21b97b53 100644 --- a/src/Network/Network/help/Get-AzPublicIpPrefix.md +++ b/src/Network/Network/help/Get-AzPublicIpPrefix.md @@ -15,12 +15,13 @@ Gets a public IP prefix ### ListParameterSet (Default) ``` Get-AzPublicIpPrefix [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### GetByResourceIdParameterSet ``` -Get-AzPublicIpPrefix -ResourceId [-DefaultProfile ] [] +Get-AzPublicIpPrefix -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +121,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzRouteConfig.md b/src/Network/Network/help/Get-AzRouteConfig.md index d99dcbd2948f..822c1ecdbda2 100644 --- a/src/Network/Network/help/Get-AzRouteConfig.md +++ b/src/Network/Network/help/Get-AzRouteConfig.md @@ -15,7 +15,7 @@ Gets routes from a route table. ``` Get-AzRouteConfig -RouteTable [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -75,6 +75,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteTable Specifies the route table from which this cmdlet gets routes. diff --git a/src/Network/Network/help/Get-AzRouteFilter.md b/src/Network/Network/help/Get-AzRouteFilter.md index e24c3319ed0e..40d85e164963 100644 --- a/src/Network/Network/help/Get-AzRouteFilter.md +++ b/src/Network/Network/help/Get-AzRouteFilter.md @@ -15,13 +15,13 @@ Gets a route filter. ### NoExpand ``` Get-AzRouteFilter [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzRouteFilter -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -139,6 +139,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzRouteFilterRuleConfig.md b/src/Network/Network/help/Get-AzRouteFilterRuleConfig.md index cf8fb3208df4..c82402af3607 100644 --- a/src/Network/Network/help/Get-AzRouteFilterRuleConfig.md +++ b/src/Network/Network/help/Get-AzRouteFilterRuleConfig.md @@ -14,7 +14,7 @@ Gets a route filter rule in a route filter. ``` Get-AzRouteFilterRuleConfig [-Name ] -RouteFilter - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -65,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter The RouteFilter diff --git a/src/Network/Network/help/Get-AzRouteMap.md b/src/Network/Network/help/Get-AzRouteMap.md index 7d3fdc5ba21f..a37eaba023e9 100644 --- a/src/Network/Network/help/Get-AzRouteMap.md +++ b/src/Network/Network/help/Get-AzRouteMap.md @@ -15,19 +15,19 @@ Retrieves a route map of a VirtualHub. ### ByVirtualHubName (Default) ``` Get-AzRouteMap [-ResourceGroupName ] [-VirtualHubName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzRouteMap [-VirtualHubObject ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzRouteMap [-VirtualHubResourceId ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -148,6 +148,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzRouteServer.md b/src/Network/Network/help/Get-AzRouteServer.md index 6f79608b987c..b695cd668718 100644 --- a/src/Network/Network/help/Get-AzRouteServer.md +++ b/src/Network/Network/help/Get-AzRouteServer.md @@ -14,18 +14,20 @@ Get an Azure RouteServer ### RouteServerSubscriptionIdParameterSet (Default) ``` -Get-AzRouteServer [-DefaultProfile ] [] +Get-AzRouteServer [-DefaultProfile ] [-ProgressAction ] + [] ``` ### RouteServerNameParameterSet ``` Get-AzRouteServer -ResourceGroupName [-RouteServerName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RouteServerResourceIdParameterSet ``` -Get-AzRouteServer -ResourceId [-DefaultProfile ] [] +Get-AzRouteServer -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +63,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server. diff --git a/src/Network/Network/help/Get-AzRouteServerPeer.md b/src/Network/Network/help/Get-AzRouteServerPeer.md index 6b36a9138cb8..caa6ff38a036 100644 --- a/src/Network/Network/help/Get-AzRouteServerPeer.md +++ b/src/Network/Network/help/Get-AzRouteServerPeer.md @@ -15,12 +15,13 @@ Gets a RouteServer peer in an Azure RouteServer ### RouteServerNPeerNameParameterSet (Default) ``` Get-AzRouteServerPeer -ResourceGroupName -PeerName -RouteServerName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RouteServerNPeerResourceIdParameterSet ``` -Get-AzRouteServerPeer -ResourceId [-DefaultProfile ] [] +Get-AzRouteServerPeer -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +72,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server. diff --git a/src/Network/Network/help/Get-AzRouteServerPeerAdvertisedRoute.md b/src/Network/Network/help/Get-AzRouteServerPeerAdvertisedRoute.md index 5f2234c3cf50..09a1668d2f93 100644 --- a/src/Network/Network/help/Get-AzRouteServerPeerAdvertisedRoute.md +++ b/src/Network/Network/help/Get-AzRouteServerPeerAdvertisedRoute.md @@ -15,13 +15,13 @@ List routes being advertised by specific route server peer ### RouteServerNPeerNameParameterSet (Default) ``` Get-AzRouteServerPeerAdvertisedRoute -ResourceGroupName -RouteServerName -PeerName - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### RouteServerNPeerInputObjectParameterSet ``` Get-AzRouteServerPeerAdvertisedRoute -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -102,6 +102,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Route server peer resource group's name diff --git a/src/Network/Network/help/Get-AzRouteServerPeerLearnedRoute.md b/src/Network/Network/help/Get-AzRouteServerPeerLearnedRoute.md index 4a485f6700bd..ab352a809b76 100644 --- a/src/Network/Network/help/Get-AzRouteServerPeerLearnedRoute.md +++ b/src/Network/Network/help/Get-AzRouteServerPeerLearnedRoute.md @@ -15,13 +15,13 @@ List routes learned by a specific route server peer ### RouteServerNPeerNameParameterSet (Default) ``` Get-AzRouteServerPeerLearnedRoute -ResourceGroupName -RouteServerName -PeerName - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### RouteServerNPeerInputObjectParameterSet ``` Get-AzRouteServerPeerLearnedRoute -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -102,6 +102,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Route server peer resource group's name diff --git a/src/Network/Network/help/Get-AzRouteTable.md b/src/Network/Network/help/Get-AzRouteTable.md index 1f93ce110f62..ca0a11ee2dc0 100644 --- a/src/Network/Network/help/Get-AzRouteTable.md +++ b/src/Network/Network/help/Get-AzRouteTable.md @@ -16,13 +16,13 @@ Gets route tables. ### NoExpand (Default) ``` Get-AzRouteTable [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzRouteTable -ResourceGroupName -Name -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -172,6 +172,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the route tables that this cmdlet gets. diff --git a/src/Network/Network/help/Get-AzRoutingIntent.md b/src/Network/Network/help/Get-AzRoutingIntent.md index 300196805341..48041bf385bc 100644 --- a/src/Network/Network/help/Get-AzRoutingIntent.md +++ b/src/Network/Network/help/Get-AzRoutingIntent.md @@ -15,19 +15,19 @@ Retrieves a routing intent resource associated with a VirtualHub. ### ByVirtualHubName (Default) ``` Get-AzRoutingIntent -ResourceGroupName -HubName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzRoutingIntent -VirtualHub [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzRoutingIntent -ParentResourceId [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -187,6 +187,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzRoutingPolicy.md b/src/Network/Network/help/Get-AzRoutingPolicy.md index 09d7ce2ffede..64f9a33bdc1e 100644 --- a/src/Network/Network/help/Get-AzRoutingPolicy.md +++ b/src/Network/Network/help/Get-AzRoutingPolicy.md @@ -14,7 +14,7 @@ Retrieves a routing policy of a routing intent resource associated with a Virtua ``` Get-AzRoutingPolicy -RoutingIntent -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -84,6 +84,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutingIntent The routing intent resource to which this rouing policy has to be added. diff --git a/src/Network/Network/help/Get-AzSecurityPartnerProvider.md b/src/Network/Network/help/Get-AzSecurityPartnerProvider.md index 820b3841ea88..2017bd23d88b 100644 --- a/src/Network/Network/help/Get-AzSecurityPartnerProvider.md +++ b/src/Network/Network/help/Get-AzSecurityPartnerProvider.md @@ -15,13 +15,13 @@ Get an Azure SecurityPartnerProvider ### SecurityPartnerProviderNameParameterSet (Default) ``` Get-AzSecurityPartnerProvider -Name -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SecurityPartnerProviderResourceIdParameterSet ``` Get-AzSecurityPartnerProvider -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -72,6 +72,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzServiceEndpointPolicy.md b/src/Network/Network/help/Get-AzServiceEndpointPolicy.md index 78a919e28070..d5abb143db9c 100644 --- a/src/Network/Network/help/Get-AzServiceEndpointPolicy.md +++ b/src/Network/Network/help/Get-AzServiceEndpointPolicy.md @@ -15,13 +15,14 @@ Gets a service endpoint policy. ### ListParameterSet (Default) ``` Get-AzServiceEndpointPolicy [-Name ] [-ResourceGroupName ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### GetByResourceIdParameterSet ``` -Get-AzServiceEndpointPolicy -ResourceId [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Get-AzServiceEndpointPolicy -ResourceId [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -82,6 +83,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzServiceEndpointPolicyDefinition.md b/src/Network/Network/help/Get-AzServiceEndpointPolicyDefinition.md index cb92d9b4bd8b..90e0c13a7cdc 100644 --- a/src/Network/Network/help/Get-AzServiceEndpointPolicyDefinition.md +++ b/src/Network/Network/help/Get-AzServiceEndpointPolicyDefinition.md @@ -14,7 +14,8 @@ Gets a service endpoint policy definition. ``` Get-AzServiceEndpointPolicyDefinition [-Name ] -ServiceEndpointPolicy - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -61,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ServiceEndpointPolicy The Service endpoint policy diff --git a/src/Network/Network/help/Get-AzVHubEffectiveRoute.md b/src/Network/Network/help/Get-AzVHubEffectiveRoute.md index 78d514cb462e..456897816067 100644 --- a/src/Network/Network/help/Get-AzVHubEffectiveRoute.md +++ b/src/Network/Network/help/Get-AzVHubEffectiveRoute.md @@ -15,19 +15,22 @@ Retrieves the effective routes of a virtual hub resource ### ByVirtualHubName (Default) ``` Get-AzVHubEffectiveRoute -ResourceGroupName -VirtualHubName [-ResourceId ] - [-VirtualWanResourceType ] [-DefaultProfile ] [] + [-VirtualWanResourceType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVHubEffectiveRoute -VirtualHubObject [-ResourceId ] - [-VirtualWanResourceType ] [-DefaultProfile ] [] + [-VirtualWanResourceType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzVHubEffectiveRoute -VirtualHubResourceId [-ResourceId ] - [-VirtualWanResourceType ] [-DefaultProfile ] [] + [-VirtualWanResourceType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -82,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVHubInboundRoute.md b/src/Network/Network/help/Get-AzVHubInboundRoute.md index 4b59f5ff2a27..9dc9a65f18de 100644 --- a/src/Network/Network/help/Get-AzVHubInboundRoute.md +++ b/src/Network/Network/help/Get-AzVHubInboundRoute.md @@ -15,19 +15,22 @@ Retrieves the inbound routes of a virtual hub connection ### ByVirtualHubName (Default) ``` Get-AzVHubInboundRoute -ResourceGroupName -VirtualHubName [-ResourceUri ] - [-VirtualWanConnectionType ] [-DefaultProfile ] [] + [-VirtualWanConnectionType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVHubInboundRoute -VirtualHubObject [-ResourceUri ] - [-VirtualWanConnectionType ] [-DefaultProfile ] [] + [-VirtualWanConnectionType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzVHubInboundRoute -VirtualHubResourceId [-ResourceUri ] - [-VirtualWanConnectionType ] [-DefaultProfile ] [] + [-VirtualWanConnectionType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -75,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVHubOutboundRoute.md b/src/Network/Network/help/Get-AzVHubOutboundRoute.md index cda6e33fa1ec..032c91a79511 100644 --- a/src/Network/Network/help/Get-AzVHubOutboundRoute.md +++ b/src/Network/Network/help/Get-AzVHubOutboundRoute.md @@ -15,19 +15,22 @@ Retrieves the outbound routes of a virtual hub connection ### ByVirtualHubName (Default) ``` Get-AzVHubOutboundRoute -ResourceGroupName -VirtualHubName [-ResourceUri ] - [-VirtualWanConnectionType ] [-DefaultProfile ] [] + [-VirtualWanConnectionType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVHubOutboundRoute -VirtualHubObject [-ResourceUri ] - [-VirtualWanConnectionType ] [-DefaultProfile ] [] + [-VirtualWanConnectionType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzVHubOutboundRoute -VirtualHubResourceId [-ResourceUri ] - [-VirtualWanConnectionType ] [-DefaultProfile ] [] + [-VirtualWanConnectionType ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -75,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVHubRouteTable.md b/src/Network/Network/help/Get-AzVHubRouteTable.md index 7ffe7ecc6a96..b47f4901d3e5 100644 --- a/src/Network/Network/help/Get-AzVHubRouteTable.md +++ b/src/Network/Network/help/Get-AzVHubRouteTable.md @@ -15,19 +15,19 @@ Retrieves a hub route table resource associated with a VirtualHub. ### ByVirtualHubName (Default) ``` Get-AzVHubRouteTable -ResourceGroupName -HubName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVHubRouteTable -VirtualHub [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzVHubRouteTable -ParentResourceId [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -165,6 +165,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualApplianceSite.md b/src/Network/Network/help/Get-AzVirtualApplianceSite.md index 68a324c014d9..353fc7e2a70c 100644 --- a/src/Network/Network/help/Get-AzVirtualApplianceSite.md +++ b/src/Network/Network/help/Get-AzVirtualApplianceSite.md @@ -15,12 +15,13 @@ Get or List sites connected to Network Virtual Appliance resource(s). ### ResourceNameParameterSet (Default) ``` Get-AzVirtualApplianceSite [-Name ] [-NetworkVirtualApplianceId ] [-ResourceGroupName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ResourceIdParameterSet ``` -Get-AzVirtualApplianceSite -ResourceId [-DefaultProfile ] [] +Get-AzVirtualApplianceSite -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -114,6 +115,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualHub.md b/src/Network/Network/help/Get-AzVirtualHub.md index 6e4380235688..ae546cbdf1d4 100644 --- a/src/Network/Network/help/Get-AzVirtualHub.md +++ b/src/Network/Network/help/Get-AzVirtualHub.md @@ -14,13 +14,14 @@ Gets an Azure VirtualHub by Name and ResourceGroupName or lists all Virtual Hubs ### ListBySubscriptionId (Default) ``` -Get-AzVirtualHub [-DefaultProfile ] [] +Get-AzVirtualHub [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzVirtualHub [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -118,6 +119,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualHubBgpConnection.md b/src/Network/Network/help/Get-AzVirtualHubBgpConnection.md index 26c6012dd065..90e1d3604973 100644 --- a/src/Network/Network/help/Get-AzVirtualHubBgpConnection.md +++ b/src/Network/Network/help/Get-AzVirtualHubBgpConnection.md @@ -15,19 +15,19 @@ The Get-AzVirtualHubBgpConnection cmdlet gets a Virtual WAN Hub BGP Connection i ### ByVirtualHubName (Default) ``` Get-AzVirtualHubBgpConnection -ResourceGroupName -VirtualHubName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVirtualHubBgpConnection [-Name ] -VirtualHub - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByHubBgpConnectionResourceId ``` Get-AzVirtualHubBgpConnection -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -116,6 +116,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualHubRouteTable.md b/src/Network/Network/help/Get-AzVirtualHubRouteTable.md index 9dbecdaef5a2..9f8f24d50df3 100644 --- a/src/Network/Network/help/Get-AzVirtualHubRouteTable.md +++ b/src/Network/Network/help/Get-AzVirtualHubRouteTable.md @@ -15,19 +15,19 @@ Gets a Virtual Hub Route Table in a virtual hub or lists all route tables in a v ### ByVirtualHubName (Default) ``` Get-AzVirtualHubRouteTable -ResourceGroupName -HubName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVirtualHubRouteTable -VirtualHub [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzVirtualHubRouteTable -ParentResourceId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -133,6 +133,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualHubVnetConnection.md b/src/Network/Network/help/Get-AzVirtualHubVnetConnection.md index d855290b2e15..d53701fee727 100644 --- a/src/Network/Network/help/Get-AzVirtualHubVnetConnection.md +++ b/src/Network/Network/help/Get-AzVirtualHubVnetConnection.md @@ -15,19 +15,19 @@ Gets a Virtual Network Connection in a virtual hub or lists all virtual network ### ByVirtualHubName (Default) ``` Get-AzVirtualHubVnetConnection -ResourceGroupName -ParentResourceName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubObject ``` Get-AzVirtualHubVnetConnection -ParentObject [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualHubResourceId ``` Get-AzVirtualHubVnetConnection -ParentResourceId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -245,6 +245,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualNetwork.md b/src/Network/Network/help/Get-AzVirtualNetwork.md index b857cf55359f..6e11257049bd 100644 --- a/src/Network/Network/help/Get-AzVirtualNetwork.md +++ b/src/Network/Network/help/Get-AzVirtualNetwork.md @@ -16,13 +16,13 @@ Gets a virtual network in a resource group. ### NoExpand ``` Get-AzVirtualNetwork [-Name ] [-ResourceGroupName ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### Expand ``` Get-AzVirtualNetwork -Name -ResourceGroupName -ExpandResource - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -147,6 +147,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that virtual network belongs to. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkAvailableEndpointService.md b/src/Network/Network/help/Get-AzVirtualNetworkAvailableEndpointService.md index fd099177dbc3..7bf81269890b 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkAvailableEndpointService.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkAvailableEndpointService.md @@ -14,7 +14,7 @@ Lists available endpoint services for location. ``` Get-AzVirtualNetworkAvailableEndpointService -Location [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -67,6 +67,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGateway.md b/src/Network/Network/help/Get-AzVirtualNetworkGateway.md index 0927a0c5f8d0..40dae3f2cc57 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGateway.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGateway.md @@ -15,7 +15,7 @@ Gets a Virtual Network Gateway ``` Get-AzVirtualNetworkGateway [-Name ] -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -68,6 +68,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName ```yaml Type: System.String diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayAdvertisedRoute.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayAdvertisedRoute.md index 3e1aca751a3c..a1c668f18400 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayAdvertisedRoute.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayAdvertisedRoute.md @@ -14,7 +14,8 @@ Lists routes being advertised by an Azure virtual network gateway ``` Get-AzVirtualNetworkGatewayAdvertisedRoute -VirtualNetworkGatewayName -ResourceGroupName - -Peer [-AsJob] [-DefaultProfile ] [] + -Peer [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -84,6 +85,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual network gateway resource group's name diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayBGPPeerStatus.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayBGPPeerStatus.md index ed1be804bfee..72ff60a08508 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayBGPPeerStatus.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayBGPPeerStatus.md @@ -14,7 +14,8 @@ Lists an Azure virtual network gateway's BGP peers ``` Get-AzVirtualNetworkGatewayBGPPeerStatus -VirtualNetworkGatewayName -ResourceGroupName - [-Peer ] [-AsJob] [-DefaultProfile ] [] + [-Peer ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -88,6 +89,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual network gateway resource group's name diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnection.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnection.md index fb14243d52c1..abdb271d3074 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnection.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnection.md @@ -15,7 +15,7 @@ Gets a Virtual Network Gateway Connection ``` Get-AzVirtualNetworkGatewayConnection [-Name ] -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName ```yaml Type: System.String diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionIkeSa.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionIkeSa.md index 6eb731f4849c..b74f28cacf1f 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionIkeSa.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionIkeSa.md @@ -15,19 +15,19 @@ Get IKE Security Associations of a Virtual Network Gateway Connection ### ByName (Default) ``` Get-AzVirtualNetworkGatewayConnectionIkeSa -Name -ResourceGroupName [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByInputObject ``` Get-AzVirtualNetworkGatewayConnectionIkeSa -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByResourceId ``` Get-AzVirtualNetworkGatewayConnectionIkeSa -ResourceId [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -121,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionSharedKey.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionSharedKey.md index 14151441c860..79d26d8094fa 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionSharedKey.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionSharedKey.md @@ -15,7 +15,7 @@ Displays the shared key used for the connection. ``` Get-AzVirtualNetworkGatewayConnectionSharedKey [-Name ] -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName ```yaml Type: System.String diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionVpnDeviceConfigScript.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionVpnDeviceConfigScript.md index 5a76b18d8f8f..ef57888e3f5b 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionVpnDeviceConfigScript.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayConnectionVpnDeviceConfigScript.md @@ -15,7 +15,8 @@ This commandlet takes the connection resource, VPN device brand, model, firmware ``` Get-AzVirtualNetworkGatewayConnectionVpnDeviceConfigScript -Name -ResourceGroupName -DeviceVendor -DeviceFamily -FirmwareVersion - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -109,6 +110,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayLearnedRoute.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayLearnedRoute.md index a9c3d025d2ae..fc58e923c466 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayLearnedRoute.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayLearnedRoute.md @@ -14,7 +14,7 @@ Lists routes learned by an Azure virtual network gateway ``` Get-AzVirtualNetworkGatewayLearnedRoute -VirtualNetworkGatewayName -ResourceGroupName - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -88,6 +88,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual network gateway resource group's name diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayNatRule.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayNatRule.md index f13b7f364ce3..324db60ed1fe 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayNatRule.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayNatRule.md @@ -15,19 +15,19 @@ Gets a Virtual Network Gateway NatRule. ### ByVirtualNetworkGatewayName (Default) ``` Get-AzVirtualNetworkGatewayNatRule -ResourceGroupName -ParentResourceName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualNetworkGatewayObject ``` Get-AzVirtualNetworkGatewayNatRule -ParentObject [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualNetworkGatewayResourceId ``` Get-AzVirtualNetworkGatewayNatRule -ParentResourceId [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -180,6 +180,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewaySupportedVpnDevice.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewaySupportedVpnDevice.md index afdd9c09fcdf..6fa34ca60a34 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewaySupportedVpnDevice.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewaySupportedVpnDevice.md @@ -14,7 +14,7 @@ This commandlet returns a list of supported VPN device brands, models, and firmw ``` Get-AzVirtualNetworkGatewaySupportedVpnDevice -Name -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -73,6 +73,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkGatewayVpnClientConnectionHealth.md b/src/Network/Network/help/Get-AzVirtualNetworkGatewayVpnClientConnectionHealth.md index 5a41c4034b5b..f0680d1a1171 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkGatewayVpnClientConnectionHealth.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkGatewayVpnClientConnectionHealth.md @@ -15,20 +15,22 @@ Get the list of vpn client connection health of an Azure virtual network gateway ### ByFactoryName (Default) ``` Get-AzVirtualNetworkGatewayVpnClientConnectionHealth -VirtualNetworkGatewayName - -ResourceGroupName [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -ResourceGroupName [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` Get-AzVirtualNetworkGatewayVpnClientConnectionHealth [-ResourceId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByFactoryObject ``` Get-AzVirtualNetworkGatewayVpnClientConnectionHealth [-InputObject ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -141,6 +143,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual network gateway resource group's name diff --git a/src/Network/Network/help/Get-AzVirtualNetworkPeering.md b/src/Network/Network/help/Get-AzVirtualNetworkPeering.md index 40c141e657aa..0b6983eb5e5c 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkPeering.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkPeering.md @@ -15,7 +15,7 @@ Gets the virtual network peering. ``` Get-AzVirtualNetworkPeering -VirtualNetworkName -ResourceGroupName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the resource group name that the virtual network peering belongs to. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkSubnetConfig.md b/src/Network/Network/help/Get-AzVirtualNetworkSubnetConfig.md index 00f96614b449..769e919fcfad 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkSubnetConfig.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkSubnetConfig.md @@ -16,13 +16,13 @@ Gets a subnet in a virtual network. ### GetByVirtualNetwork (Default) ``` Get-AzVirtualNetworkSubnetConfig [-Name ] -VirtualNetwork - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### GetByResourceId ``` Get-AzVirtualNetworkSubnetConfig -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -72,6 +72,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Specifies the resource id of the subnet that this cmdlet gets. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkTap.md b/src/Network/Network/help/Get-AzVirtualNetworkTap.md index 8156c1470f50..c8f6282c9d1d 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkTap.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkTap.md @@ -15,13 +15,14 @@ Gets a virtual network tap ### ListParameterSet (Default) ``` Get-AzVirtualNetworkTap [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### GetByResourceIdParameterSet ``` -Get-AzVirtualNetworkTap -ResourceId [-DefaultProfile ] [-WhatIf] [-Confirm] - [] +Get-AzVirtualNetworkTap -ResourceId [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -75,6 +76,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual network tap. diff --git a/src/Network/Network/help/Get-AzVirtualNetworkUsageList.md b/src/Network/Network/help/Get-AzVirtualNetworkUsageList.md index 19524ae97dc3..b04fbaf0b2b0 100644 --- a/src/Network/Network/help/Get-AzVirtualNetworkUsageList.md +++ b/src/Network/Network/help/Get-AzVirtualNetworkUsageList.md @@ -14,7 +14,7 @@ Gets virtual network current usage. ``` Get-AzVirtualNetworkUsageList -ResourceGroupName -Name - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -75,6 +75,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that virtual network belongs to. diff --git a/src/Network/Network/help/Get-AzVirtualRouter.md b/src/Network/Network/help/Get-AzVirtualRouter.md index 59913b2614b8..fd0f53bc9cce 100644 --- a/src/Network/Network/help/Get-AzVirtualRouter.md +++ b/src/Network/Network/help/Get-AzVirtualRouter.md @@ -14,18 +14,20 @@ Get an Azure VirtualRouter ### VirtualRouterSubscriptionIdParameterSet (Default) ``` -Get-AzVirtualRouter [-DefaultProfile ] [] +Get-AzVirtualRouter [-DefaultProfile ] [-ProgressAction ] + [] ``` ### VirtualRouterNameParameterSet ``` Get-AzVirtualRouter -ResourceGroupName [-RouterName ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### VirtualRouterResourceIdParameterSet ``` -Get-AzVirtualRouter -ResourceId [-DefaultProfile ] [] +Get-AzVirtualRouter -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +63,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router. diff --git a/src/Network/Network/help/Get-AzVirtualRouterPeer.md b/src/Network/Network/help/Get-AzVirtualRouterPeer.md index 222324477193..bcab2db8a6ca 100644 --- a/src/Network/Network/help/Get-AzVirtualRouterPeer.md +++ b/src/Network/Network/help/Get-AzVirtualRouterPeer.md @@ -15,12 +15,13 @@ Gets a VirtualRouter peer in an Azure VirtualRouter ### VirtualRouterPeerNameParameterSet (Default) ``` Get-AzVirtualRouterPeer -ResourceGroupName -PeerName -VirtualRouterName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### VirtualRouterPeerResourceIdParameterSet ``` -Get-AzVirtualRouterPeer -ResourceId [-DefaultProfile ] [] +Get-AzVirtualRouterPeer -ResourceId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +72,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router. diff --git a/src/Network/Network/help/Get-AzVirtualRouterPeerAdvertisedRoute.md b/src/Network/Network/help/Get-AzVirtualRouterPeerAdvertisedRoute.md index dd07c4f452b7..18718efbaa45 100644 --- a/src/Network/Network/help/Get-AzVirtualRouterPeerAdvertisedRoute.md +++ b/src/Network/Network/help/Get-AzVirtualRouterPeerAdvertisedRoute.md @@ -15,13 +15,14 @@ List routes being advertised by specific virtual router peer ### VirtualRouterPeerNameParameterSet (Default) ``` Get-AzVirtualRouterPeerAdvertisedRoute -ResourceGroupName -VirtualRouterName - -PeerName [-AsJob] [-DefaultProfile ] [] + -PeerName [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### VirtualRouterPeerObjectParameterSet ``` Get-AzVirtualRouterPeerAdvertisedRoute -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -102,6 +103,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual router peer resource group's name diff --git a/src/Network/Network/help/Get-AzVirtualRouterPeerLearnedRoute.md b/src/Network/Network/help/Get-AzVirtualRouterPeerLearnedRoute.md index 0541cf1823ed..587f30fe3687 100644 --- a/src/Network/Network/help/Get-AzVirtualRouterPeerLearnedRoute.md +++ b/src/Network/Network/help/Get-AzVirtualRouterPeerLearnedRoute.md @@ -15,13 +15,13 @@ List routes learned by a specific virtual router peer ### VirtualRouterPeerNameParameterSet (Default) ``` Get-AzVirtualRouterPeerLearnedRoute -ResourceGroupName -VirtualRouterName -PeerName - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### VirtualRouterPeerObjectParameterSet ``` Get-AzVirtualRouterPeerLearnedRoute -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -102,6 +102,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Virtual router peer resource group's name diff --git a/src/Network/Network/help/Get-AzVirtualWan.md b/src/Network/Network/help/Get-AzVirtualWan.md index 72d487b1f4e8..987bc7bc061c 100644 --- a/src/Network/Network/help/Get-AzVirtualWan.md +++ b/src/Network/Network/help/Get-AzVirtualWan.md @@ -14,13 +14,14 @@ Gets a Virtual WAN or all Virtual WANs in a resource group or subscription. ### ListBySubscriptionId (Default) ``` -Get-AzVirtualWan [-DefaultProfile ] [] +Get-AzVirtualWan [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzVirtualWan [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualWanVpnConfiguration.md b/src/Network/Network/help/Get-AzVirtualWanVpnConfiguration.md index a83bc5094d2f..99cad6f14b1e 100644 --- a/src/Network/Network/help/Get-AzVirtualWanVpnConfiguration.md +++ b/src/Network/Network/help/Get-AzVirtualWanVpnConfiguration.md @@ -16,37 +16,43 @@ configuration to a storage blob specified by the customer. ### ByVirtualWanNameByVpnSiteObject (Default) ``` Get-AzVirtualWanVpnConfiguration -ResourceGroupName -Name -StorageSasUrl - -VpnSite [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -VpnSite [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualWanNameByVpnSiteResourceId ``` Get-AzVirtualWanVpnConfiguration -ResourceGroupName -Name -StorageSasUrl - -VpnSiteId [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -VpnSiteId [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualWanObjectByVpnSiteObject ``` Get-AzVirtualWanVpnConfiguration -InputObject -StorageSasUrl -VpnSite - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanObjectByVpnSiteResourceId ``` Get-AzVirtualWanVpnConfiguration -InputObject -StorageSasUrl -VpnSiteId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanResourceIdByVpnSiteObject ``` Get-AzVirtualWanVpnConfiguration -ResourceId -StorageSasUrl -VpnSite - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanResourceIdByVpnSiteResourceId ``` Get-AzVirtualWanVpnConfiguration -ResourceId -StorageSasUrl -VpnSiteId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -139,6 +145,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualWanVpnServerConfiguration.md b/src/Network/Network/help/Get-AzVirtualWanVpnServerConfiguration.md index 5d2c16342c2e..6fe9324c17f6 100644 --- a/src/Network/Network/help/Get-AzVirtualWanVpnServerConfiguration.md +++ b/src/Network/Network/help/Get-AzVirtualWanVpnServerConfiguration.md @@ -15,19 +15,19 @@ Gets the list of all VpnServerConfigurations that are associated with this Virtu ### ByVirtualWanName (Default) ``` Get-AzVirtualWanVpnServerConfiguration -Name -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualWanObject ``` Get-AzVirtualWanVpnServerConfiguration -VirtualWanObject - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualWanResourceId ``` Get-AzVirtualWanVpnServerConfiguration -ResourceId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVirtualWanVpnServerConfigurationVpnProfile.md b/src/Network/Network/help/Get-AzVirtualWanVpnServerConfigurationVpnProfile.md index 2c30f751c81b..d4d4e141b706 100644 --- a/src/Network/Network/help/Get-AzVirtualWanVpnServerConfigurationVpnProfile.md +++ b/src/Network/Network/help/Get-AzVirtualWanVpnServerConfigurationVpnProfile.md @@ -16,41 +16,42 @@ Generates and downloads Vpn profile at VirtualWan-VpnServerConfiguration level f ``` Get-AzVirtualWanVpnServerConfigurationVpnProfile [-Name ] -ResourceGroupName -VpnServerConfiguration [-AuthenticationMethod ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualWanNameByVpnServerConfigurationResourceId ``` Get-AzVirtualWanVpnServerConfigurationVpnProfile [-Name ] -ResourceGroupName -VpnServerConfigurationId [-AuthenticationMethod ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVirtualWanObjectByVpnServerConfigurationObject ``` Get-AzVirtualWanVpnServerConfigurationVpnProfile -VirtualWanObject -VpnServerConfiguration [-AuthenticationMethod ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualWanObjectByVpnServerConfigurationResourceId ``` Get-AzVirtualWanVpnServerConfigurationVpnProfile -VirtualWanObject -VpnServerConfigurationId [-AuthenticationMethod ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVirtualWanResourceIdByVpnServerConfigurationObject ``` Get-AzVirtualWanVpnServerConfigurationVpnProfile -ResourceId -VpnServerConfiguration [-AuthenticationMethod ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVirtualWanResourceIdByVpnServerConfigurationResourceId ``` Get-AzVirtualWanVpnServerConfigurationVpnProfile -ResourceId -VpnServerConfigurationId - [-AuthenticationMethod ] [-DefaultProfile ] [] + [-AuthenticationMethod ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -118,6 +119,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnClientConfiguration.md b/src/Network/Network/help/Get-AzVpnClientConfiguration.md index e46fd80b20cb..c6f4387c55a7 100644 --- a/src/Network/Network/help/Get-AzVpnClientConfiguration.md +++ b/src/Network/Network/help/Get-AzVpnClientConfiguration.md @@ -14,7 +14,8 @@ Allows users to easily download the Vpn Profile package that was generated using ``` Get-AzVpnClientConfiguration [-Name ] -ResourceGroupName - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -63,6 +64,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnClientIpsecParameter.md b/src/Network/Network/help/Get-AzVpnClientIpsecParameter.md index 1ea0276377a0..fe2624cb81cf 100644 --- a/src/Network/Network/help/Get-AzVpnClientIpsecParameter.md +++ b/src/Network/Network/help/Get-AzVpnClientIpsecParameter.md @@ -14,7 +14,7 @@ Gets the vpn Ipsec parameters set on Virtual Network Gateway for Point to site c ``` Get-AzVpnClientIpsecParameter [-Name ] -ResourceGroupName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnClientPackage.md b/src/Network/Network/help/Get-AzVpnClientPackage.md index 865daf1a3255..4bbf1246b287 100644 --- a/src/Network/Network/help/Get-AzVpnClientPackage.md +++ b/src/Network/Network/help/Get-AzVpnClientPackage.md @@ -15,7 +15,8 @@ Gets information about a VPN client package. ``` Get-AzVpnClientPackage -ResourceGroupName -VirtualNetworkGatewayName - -ProcessorArchitecture [-DefaultProfile ] [] + -ProcessorArchitecture [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -68,6 +69,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that the virtual network gateway is assigned to. Resource groups categorize items to help simplify inventory management and general Azure administration. diff --git a/src/Network/Network/help/Get-AzVpnClientRevokedCertificate.md b/src/Network/Network/help/Get-AzVpnClientRevokedCertificate.md index b949165b444b..781daad6bd39 100644 --- a/src/Network/Network/help/Get-AzVpnClientRevokedCertificate.md +++ b/src/Network/Network/help/Get-AzVpnClientRevokedCertificate.md @@ -16,7 +16,7 @@ Gets information about VPN client-revocation certificates. ``` Get-AzVpnClientRevokedCertificate [-VpnClientRevokedCertificateName ] -VirtualNetworkGatewayName -ResourceGroupName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -58,6 +58,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that the virtual network gateway is assigned to. Resource groups categorize items to help simplify inventory management and general Azure administration. diff --git a/src/Network/Network/help/Get-AzVpnClientRootCertificate.md b/src/Network/Network/help/Get-AzVpnClientRootCertificate.md index da4b3ebf3ce3..1663b46a15ac 100644 --- a/src/Network/Network/help/Get-AzVpnClientRootCertificate.md +++ b/src/Network/Network/help/Get-AzVpnClientRootCertificate.md @@ -15,7 +15,8 @@ Gets information about VPN root certificates. ``` Get-AzVpnClientRootCertificate [-VpnClientRootCertificateName ] -VirtualNetworkGatewayName - -ResourceGroupName [-DefaultProfile ] [] + -ResourceGroupName [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -58,6 +59,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that the virtual network gateway is assigned to. Resource groups categorize items to help simplify inventory management and general Azure administration. diff --git a/src/Network/Network/help/Get-AzVpnConnection.md b/src/Network/Network/help/Get-AzVpnConnection.md index 7e7966ce2153..75a3863ccb35 100644 --- a/src/Network/Network/help/Get-AzVpnConnection.md +++ b/src/Network/Network/help/Get-AzVpnConnection.md @@ -18,19 +18,19 @@ Gets a vpn connection by name or lists all vpn connections connected to a VpnGat ### ByVpnGatewayName (Default) ``` Get-AzVpnConnection -ResourceGroupName -ParentResourceName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVpnGatewayObject ``` Get-AzVpnConnection -ParentObject [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVpnGatewayResourceId ``` Get-AzVpnConnection -ParentResourceId [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -243,6 +243,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnGateway.md b/src/Network/Network/help/Get-AzVpnGateway.md index eb555695c730..858349ef703a 100644 --- a/src/Network/Network/help/Get-AzVpnGateway.md +++ b/src/Network/Network/help/Get-AzVpnGateway.md @@ -14,13 +14,14 @@ Gets a VpnGateway resource using ResourceGroupName and GatewayName OR lists all ### ListBySubscriptionId (Default) ``` -Get-AzVpnGateway [-DefaultProfile ] [] +Get-AzVpnGateway [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzVpnGateway [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnGatewayNatRule.md b/src/Network/Network/help/Get-AzVpnGatewayNatRule.md index aaf5a1580a83..155f4e91a2f2 100644 --- a/src/Network/Network/help/Get-AzVpnGatewayNatRule.md +++ b/src/Network/Network/help/Get-AzVpnGatewayNatRule.md @@ -15,19 +15,19 @@ Gets a NAT rule associated with VpnGateway. ### ByVpnGatewayName (Default) ``` Get-AzVpnGatewayNatRule -ResourceGroupName -ParentResourceName [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVpnGatewayObject ``` Get-AzVpnGatewayNatRule -ParentObject [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByVpnGatewayResourceId ``` Get-AzVpnGatewayNatRule -ParentResourceId [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -142,6 +142,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnServerConfiguration.md b/src/Network/Network/help/Get-AzVpnServerConfiguration.md index 403d230b25a0..0fc44f37fd4d 100644 --- a/src/Network/Network/help/Get-AzVpnServerConfiguration.md +++ b/src/Network/Network/help/Get-AzVpnServerConfiguration.md @@ -14,13 +14,14 @@ Gets an existing VpnServerConfiguration for point to site connectivity. ### ListBySubscriptionId (Default) ``` -Get-AzVpnServerConfiguration [-DefaultProfile ] [] +Get-AzVpnServerConfiguration [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzVpnServerConfiguration [-ResourceGroupName ] [-Name ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -91,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnServerConfigurationPolicyGroup.md b/src/Network/Network/help/Get-AzVpnServerConfigurationPolicyGroup.md index 871722f7fd06..1a9e32884295 100644 --- a/src/Network/Network/help/Get-AzVpnServerConfigurationPolicyGroup.md +++ b/src/Network/Network/help/Get-AzVpnServerConfigurationPolicyGroup.md @@ -19,8 +19,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubNameByVpnServerConfigurationResourceId @@ -30,7 +30,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByVpnServerConfigurationObject @@ -40,8 +41,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByVpnServerConfigurationResourceId @@ -51,7 +52,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationObject @@ -61,7 +63,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationResourceId @@ -71,7 +74,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -258,6 +262,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/Get-AzVpnSite.md b/src/Network/Network/help/Get-AzVpnSite.md index 8f8711ad5b70..fe6fcf32263f 100644 --- a/src/Network/Network/help/Get-AzVpnSite.md +++ b/src/Network/Network/help/Get-AzVpnSite.md @@ -16,13 +16,14 @@ This is an RM representation of customer branches that are uploaded to Azure for ### ListBySubscriptionId (Default) ``` -Get-AzVpnSite [-DefaultProfile ] [] +Get-AzVpnSite [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ListByResourceGroupName ``` Get-AzVpnSite [-ResourceGroupName ] [-Name ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -125,6 +126,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Get-AzVpnSiteLinkConnectionIkeSa.md b/src/Network/Network/help/Get-AzVpnSiteLinkConnectionIkeSa.md index 3b0d0d702d3b..ddfddcee4f1e 100644 --- a/src/Network/Network/help/Get-AzVpnSiteLinkConnectionIkeSa.md +++ b/src/Network/Network/help/Get-AzVpnSiteLinkConnectionIkeSa.md @@ -16,19 +16,19 @@ Get IKE Security Associations of VPN Site Link Connections ``` Get-AzVpnSiteLinkConnectionIkeSa -ResourceGroupName -VpnGatewayName -VpnConnectionName -Name [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByInputObject ``` Get-AzVpnSiteLinkConnectionIkeSa -InputObject [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### ByResourceId ``` Get-AzVpnSiteLinkConnectionIkeSa -ResourceId [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -122,6 +122,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Invoke-AzFirewallPacketCapture.md b/src/Network/Network/help/Invoke-AzFirewallPacketCapture.md index e49b3f1ce16e..1a67ed2a51f6 100644 --- a/src/Network/Network/help/Invoke-AzFirewallPacketCapture.md +++ b/src/Network/Network/help/Invoke-AzFirewallPacketCapture.md @@ -15,7 +15,7 @@ Invoke Packet Capture on Azure Firewall ``` Invoke-AzFirewallPacketCapture -AzureFirewall -Parameter [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -48,7 +48,7 @@ This example invokes packet capture request on azure firewall with the parameter Run cmdlet in the background ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: @@ -63,7 +63,7 @@ Accept wildcard characters: False The AzureFirewall ```yaml -Type: PSAzureFirewall +Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewall Parameter Sets: (All) Aliases: @@ -78,7 +78,7 @@ Accept wildcard characters: False The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: IAzureContextContainer +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential @@ -93,7 +93,7 @@ Accept wildcard characters: False The packet capture parameters ```yaml -Type: PSAzureFirewallPacketCaptureParameters +Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPacketCaptureParameters Parameter Sets: (All) Aliases: @@ -104,11 +104,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -124,7 +139,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi diff --git a/src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md b/src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md new file mode 100644 index 000000000000..6b5f6ff9f91c --- /dev/null +++ b/src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md @@ -0,0 +1,353 @@ +--- +external help file: Az.NetworkSecurityPerimeter.psm1-help.xml +Module Name: Az.Network +online version: https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspaccessrulesreconcile +schema: 2.0.0 +--- + +# Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile + +## SYNOPSIS +Reconcile NSP access rules + +## SYNTAX + +### PostExpanded (Default) +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName + [-SubscriptionId ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] +``` + +### PostViaJsonString +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName + [-SubscriptionId ] -JsonString [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaJsonFilePath +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName + [-SubscriptionId ] -JsonFilePath [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentityProfileExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -ProfileInputObject [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentityProfile +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -ProfileInputObject -Parameter [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentityNetworkSecurityPerimeterExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName -ProfileName + -NetworkSecurityPerimeterInputObject [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentityNetworkSecurityPerimeter +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName -ProfileName + -NetworkSecurityPerimeterInputObject -Parameter + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### Post +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName + [-SubscriptionId ] -Parameter [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentityExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentity +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject + -Parameter [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +## DESCRIPTION +Reconcile NSP access rules + +## EXAMPLES + +### Example 1: Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules +```powershell +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName MyAccessRule -ProfileName profile -ResourceGroupName ResourceGroup-1 -NetworkSecurityPerimeterName nsp3 +``` + +Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules + +### Example 2: Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules by identity (using pipe) +```powershell +$GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject $GETObj +``` + +Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules by identity (using pipe) + +## PARAMETERS + +### -AccessRuleName +The name of the NSP access rule. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, PostViaIdentityProfileExpanded, PostViaIdentityProfile, PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaIdentityNetworkSecurityPerimeter, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DefaultProfile +The DefaultProfile parameter is not functional. +Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + +```yaml +Type: System.Management.Automation.PSObject +Parameter Sets: (All) +Aliases: AzureRMContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -InputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityExpanded, PostViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -JsonFilePath +Path of Json file supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonFilePath +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -JsonString +Json string supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterInputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaIdentityNetworkSecurityPerimeter +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterName +The name of the network security perimeter. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Parameter +Anything + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +Parameter Sets: PostViaIdentityProfile, PostViaIdentityNetworkSecurityPerimeter, Post, PostViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ProfileInputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityProfileExpanded, PostViaIdentityProfile +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ProfileName +The name of the NSP profile. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaIdentityNetworkSecurityPerimeter, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ResourceGroupName +The name of the resource group. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SubscriptionId +The subscription credentials which uniquely identify the Microsoft Azure subscription. +The subscription ID forms part of the URI for every service call. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, Post +Aliases: + +Required: False +Position: Named +Default value: (Get-AzContext).Subscription.Id +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + +## OUTPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +## NOTES + +## RELATED LINKS diff --git a/src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md b/src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md new file mode 100644 index 000000000000..77eedb954bd2 --- /dev/null +++ b/src/Network/Network/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md @@ -0,0 +1,308 @@ +--- +external help file: Az.NetworkSecurityPerimeter.psm1-help.xml +Module Name: Az.Network +online version: https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspassociationreconcile +schema: 2.0.0 +--- + +# Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile + +## SYNOPSIS +Reconcile NSP association + +## SYNTAX + +### PostExpanded (Default) +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName [-SubscriptionId ] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaJsonString +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName [-SubscriptionId ] + -JsonString [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +### PostViaJsonFilePath +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName [-SubscriptionId ] + -JsonFilePath [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +### PostViaIdentityNetworkSecurityPerimeterExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterInputObject [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentityNetworkSecurityPerimeter +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterInputObject -Parameter + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### Post +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName [-SubscriptionId ] + -Parameter [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +### PostViaIdentityExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PostViaIdentity +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject + -Parameter [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +## DESCRIPTION +Reconcile NSP association + +## EXAMPLES + +### Example 1: Reconcile NSP association +```powershell +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName association3 -NetworkSecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 +``` + +Reconcile NSP association + +### Example 2: Reconcile NSP association by identity (using pipe) +```powershell +$GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject $GETObj +``` + +Reconcile NSP association by identity (using pipe) + +## PARAMETERS + +### -AssociationName +The name of the NSP association. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaIdentityNetworkSecurityPerimeter, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DefaultProfile +The DefaultProfile parameter is not functional. +Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + +```yaml +Type: System.Management.Automation.PSObject +Parameter Sets: (All) +Aliases: AzureRMContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -InputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityExpanded, PostViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -JsonFilePath +Path of Json file supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonFilePath +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -JsonString +Json string supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterInputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaIdentityNetworkSecurityPerimeter +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterName +The name of the network security perimeter. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Parameter +Anything + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +Parameter Sets: PostViaIdentityNetworkSecurityPerimeter, Post, PostViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ResourceGroupName +The name of the resource group. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, Post +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SubscriptionId +The subscription credentials which uniquely identify the Microsoft Azure subscription. +The subscription ID forms part of the URI for every service call. + +```yaml +Type: System.String +Parameter Sets: PostExpanded, PostViaJsonString, PostViaJsonFilePath, Post +Aliases: + +Required: False +Position: Named +Default value: (Get-AzContext).Subscription.Id +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + +## OUTPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +## NOTES + +## RELATED LINKS diff --git a/src/Network/Network/help/Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic.md b/src/Network/Network/help/Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic.md index 89187a487f01..2d7f2db47e8b 100644 --- a/src/Network/Network/help/Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic.md +++ b/src/Network/Network/help/Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic.md @@ -17,7 +17,7 @@ Invoke network configuration diagnostic session for specified network profiles o Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic -NetworkWatcher -TargetResourceId [-VerbosityLevel ] -Profile - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName @@ -25,7 +25,7 @@ Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic -NetworkWatcher -ResourceGroupName -TargetResourceId [-VerbosityLevel ] -Profile - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation @@ -33,7 +33,7 @@ Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic -NetworkWatcherName -TargetResourceId [-VerbosityLevel ] -Profile - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId @@ -41,7 +41,7 @@ Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic -Location -Target Invoke-AzNetworkWatcherNetworkConfigurationDiagnostic -ResourceId -TargetResourceId [-VerbosityLevel ] -Profile - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -178,6 +178,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Move-AzExpressRouteCircuit.md b/src/Network/Network/help/Move-AzExpressRouteCircuit.md index 3d3f8ae736a1..79edc315b307 100644 --- a/src/Network/Network/help/Move-AzExpressRouteCircuit.md +++ b/src/Network/Network/help/Move-AzExpressRouteCircuit.md @@ -15,8 +15,8 @@ Moves an ExpressRoute circuit from the classic deployment model to the Resource ``` Move-AzExpressRouteCircuit -Name -ResourceGroupName -Location -ServiceKey - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group that will contain the ExpressRoute circuit being moved. diff --git a/src/Network/Network/help/New-AzApplicationGateway.md b/src/Network/Network/help/New-AzApplicationGateway.md index b6a0baef04a2..8f60cae78391 100644 --- a/src/Network/Network/help/New-AzApplicationGateway.md +++ b/src/Network/Network/help/New-AzApplicationGateway.md @@ -34,11 +34,12 @@ New-AzApplicationGateway -Name -ResourceGroupName -Location ] [-WebApplicationFirewallConfiguration ] [-AutoscaleConfiguration ] [-EnableHttp2] [-EnableFIPS] - [-EnableRequestBuffering] [-EnableResponseBuffering] - [-ForceFirewallPolicyAssociation] [-Zone ] [-Tag ] [-UserAssignedIdentityId ] - [-Force] [-AsJob] [-CustomErrorConfiguration ] + [-EnableRequestBuffering ] [-EnableResponseBuffering ] [-ForceFirewallPolicyAssociation] + [-Zone ] [-Tag ] [-UserAssignedIdentityId ] [-Force] [-AsJob] + [-CustomErrorConfiguration ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -62,11 +63,12 @@ New-AzApplicationGateway -Name -ResourceGroupName -Location ] [-WebApplicationFirewallConfiguration ] [-FirewallPolicyId ] [-AutoscaleConfiguration ] - [-EnableHttp2] [-EnableFIPS] [-ForceFirewallPolicyAssociation] [-Zone ] [-Tag ] [-Force] - [-EnableRequestBuffering] [-EnableResponseBuffering] - [-AsJob] [-CustomErrorConfiguration ] + [-EnableHttp2] [-EnableFIPS] [-EnableRequestBuffering ] [-EnableResponseBuffering ] + [-ForceFirewallPolicyAssociation] [-Zone ] [-Tag ] [-Force] [-AsJob] + [-CustomErrorConfiguration ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResource @@ -91,11 +93,12 @@ New-AzApplicationGateway -Name -ResourceGroupName -Location ] [-FirewallPolicy ] [-AutoscaleConfiguration ] [-EnableHttp2] [-EnableFIPS] - [-EnableRequestBuffering] [-EnableResponseBuffering] - [-ForceFirewallPolicyAssociation] [-Zone ] [-Tag ] [-Force] [-AsJob] + [-EnableRequestBuffering ] [-EnableResponseBuffering ] [-ForceFirewallPolicyAssociation] + [-Zone ] [-Tag ] [-Force] [-AsJob] [-CustomErrorConfiguration ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### IdentityByIdentityObject @@ -119,11 +122,12 @@ New-AzApplicationGateway -Name -ResourceGroupName -Location ] [-WebApplicationFirewallConfiguration ] [-AutoscaleConfiguration ] [-EnableHttp2] [-EnableFIPS] - [-EnableRequestBuffering] [-EnableResponseBuffering] - [-ForceFirewallPolicyAssociation] [-Zone ] [-Tag ] -Identity - [-Force] [-AsJob] [-CustomErrorConfiguration ] + [-EnableRequestBuffering ] [-EnableResponseBuffering ] [-ForceFirewallPolicyAssociation] + [-Zone ] [-Tag ] -Identity [-Force] [-AsJob] + [-CustomErrorConfiguration ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -362,7 +366,7 @@ Accept wildcard characters: False Whether Request Buffering is enabled. ```yaml -Type: System.Boolean +Type: System.Nullable`1[System.Boolean] Parameter Sets: (All) Aliases: @@ -377,7 +381,7 @@ Accept wildcard characters: False Whether Response Buffering is enabled. ```yaml -Type: System.Boolean +Type: System.Nullable`1[System.Boolean] Parameter Sets: (All) Aliases: @@ -598,6 +602,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectConfigurations The list of redirect configuration diff --git a/src/Network/Network/help/New-AzApplicationGatewayAuthenticationCertificate.md b/src/Network/Network/help/New-AzApplicationGatewayAuthenticationCertificate.md index 774b045207b3..c8aec1e3340e 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayAuthenticationCertificate.md +++ b/src/Network/Network/help/New-AzApplicationGatewayAuthenticationCertificate.md @@ -15,7 +15,8 @@ Creates an authentication certificate for an application gateway. ``` New-AzApplicationGatewayAuthenticationCertificate -Name -CertificateFile - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -77,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzApplicationGatewayAutoscaleConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayAutoscaleConfiguration.md index e1d06d933881..7fac9b493c20 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayAutoscaleConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayAutoscaleConfiguration.md @@ -14,7 +14,8 @@ Creates a Autoscale Configuration for the Application Gateway. ``` New-AzApplicationGatewayAutoscaleConfiguration -MinCapacity [-MaxCapacity ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -92,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzApplicationGatewayBackendAddressPool.md b/src/Network/Network/help/New-AzApplicationGatewayBackendAddressPool.md index 09297ff5fed6..40a5a6d6c3b2 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayBackendAddressPool.md +++ b/src/Network/Network/help/New-AzApplicationGatewayBackendAddressPool.md @@ -15,8 +15,8 @@ Creates a back-end address pool for an application gateway. ``` New-AzApplicationGatewayBackendAddressPool -Name [-BackendIPAddresses ] - [-BackendFqdns ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-BackendFqdns ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -101,6 +101,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzApplicationGatewayBackendHttpSetting.md b/src/Network/Network/help/New-AzApplicationGatewayBackendHttpSetting.md index ac08c4b9d34f..c9b1fd5cb130 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayBackendHttpSetting.md +++ b/src/Network/Network/help/New-AzApplicationGatewayBackendHttpSetting.md @@ -20,7 +20,7 @@ New-AzApplicationGatewayBackendHttpSetting -Name -Port -Protoco [-AuthenticationCertificates ] [-TrustedRootCertificate ] [-PickHostNameFromBackendAddress] [-HostName ] [-AffinityCookieName ] [-Path ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -232,6 +232,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol to use for communication between the application gateway and the back-end servers. The acceptable values for this parameter are: Http and Https. diff --git a/src/Network/Network/help/New-AzApplicationGatewayBackendSetting.md b/src/Network/Network/help/New-AzApplicationGatewayBackendSetting.md index fc21040c2476..6abff52e0872 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayBackendSetting.md +++ b/src/Network/Network/help/New-AzApplicationGatewayBackendSetting.md @@ -16,7 +16,8 @@ Creates back-end TCP\TLS setting for an application gateway. New-AzApplicationGatewayBackendSetting -Name -Port -Protocol [-Timeout ] [-ProbeId ] [-Probe ] [-TrustedRootCertificate ] [-PickHostNameFromBackendAddress] - [-HostName ] [-DefaultProfile ] [] + [-HostName ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -140,6 +141,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol diff --git a/src/Network/Network/help/New-AzApplicationGatewayClientAuthConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayClientAuthConfiguration.md index c209f6a0192e..37545781a922 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayClientAuthConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayClientAuthConfiguration.md @@ -14,7 +14,7 @@ Creates a new client authentication configuration for SSL profile. ``` New-AzApplicationGatewayClientAuthConfiguration [-VerifyClientCertIssuerDN] [-VerifyClientRevocation ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -46,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VerifyClientCertIssuerDN Verify client certificate issuer name. diff --git a/src/Network/Network/help/New-AzApplicationGatewayConnectionDraining.md b/src/Network/Network/help/New-AzApplicationGatewayConnectionDraining.md index 75e1992e8047..ea16d127f1e0 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayConnectionDraining.md +++ b/src/Network/Network/help/New-AzApplicationGatewayConnectionDraining.md @@ -14,7 +14,7 @@ Creates a new connection draining configuration for back-end HTTP settings. ``` New-AzApplicationGatewayConnectionDraining -Enabled -DrainTimeoutInSec - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayCustomError.md b/src/Network/Network/help/New-AzApplicationGatewayCustomError.md index 68057918c46f..b895a05ee7a3 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayCustomError.md +++ b/src/Network/Network/help/New-AzApplicationGatewayCustomError.md @@ -14,7 +14,7 @@ Creates a custom error with http status code and custom error page url ``` New-AzApplicationGatewayCustomError -StatusCode -CustomErrorPageUrl - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallCondition.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallCondition.md index 0d4afb0996ba..5ae1d1338038 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallCondition.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallCondition.md @@ -15,7 +15,7 @@ Creates a match condition for custom rule ``` New-AzApplicationGatewayFirewallCondition -MatchVariable -Operator [-NegationCondition ] [-MatchValue ] [-Transform ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -108,6 +108,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Transform List of transforms. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRule.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRule.md index cc6a216edae4..91ec7899cf5f 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRule.md @@ -16,7 +16,8 @@ Creates a new custom rule for the application gateway firewall policy. New-AzApplicationGatewayFirewallCustomRule -Name -Priority [-RateLimitDuration ] [-RateLimitThreshold ] -RuleType -MatchCondition [-GroupByUserSession ] -Action - [-State ] [-DefaultProfile ] [] + [-State ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -214,6 +215,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RateLimitDuration Describes duration over which Rate Limit policy will be applied. Applies only when ruleType is RateLimitRule. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByUserSession.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByUserSession.md index f51821914856..6ff145d24048 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByUserSession.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByUserSession.md @@ -15,7 +15,7 @@ Creates a new GroupByUserSession for the application gateway firewall custom rul ``` New-AzApplicationGatewayFirewallCustomRuleGroupByUserSession -GroupByVariable - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByVariable.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByVariable.md index a9fd75a13222..2a2b18c0f9a7 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByVariable.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallCustomRuleGroupByVariable.md @@ -14,7 +14,7 @@ Creates a new GroupByVariable for the application gateway firewall custom rule G ``` New-AzApplicationGatewayFirewallCustomRuleGroupByVariable -VariableName - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -46,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VariableName User Session clause variable. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallDisabledRuleGroupConfig.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallDisabledRuleGroupConfig.md index 15974fe5abd2..e4b0e53cd152 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallDisabledRuleGroupConfig.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallDisabledRuleGroupConfig.md @@ -14,7 +14,7 @@ Creates a new disabled rule group configuration. ``` New-AzApplicationGatewayFirewallDisabledRuleGroupConfig -RuleGroupName [-Rules ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -46,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleGroupName The name of the rule group that will be disabled. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallExclusionConfig.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallExclusionConfig.md index df4cf168fd2b..ea77ef9dcebf 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallExclusionConfig.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallExclusionConfig.md @@ -15,7 +15,7 @@ Creates a new exclusion rule list for application gateway waf ``` New-AzApplicationGatewayFirewallExclusionConfig -Variable -Operator -Selector [-ExclusionManagedRuleSet ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Selector When variable is a collection, operator used to specify which elements in the collection this exclusion applies to. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallMatchVariable.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallMatchVariable.md index 5c3271a1190a..d4ce61529d84 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallMatchVariable.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallMatchVariable.md @@ -14,7 +14,7 @@ Creates a match variable for firewall condition. ``` New-AzApplicationGatewayFirewallMatchVariable -VariableName [-Selector ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -46,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Selector Describes field of the matchVariable collection. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicy.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicy.md index 5bcd2573883e..13ded3d81d23 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicy.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicy.md @@ -17,7 +17,8 @@ New-AzApplicationGatewayFirewallPolicy -Name -ResourceGroupName ] [-PolicySetting ] [-ManagedRule ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -165,6 +166,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusion.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusion.md index 6f0b99c09267..f0c121519d61 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusion.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusion.md @@ -15,7 +15,7 @@ Creates an exclusion on the Firewall Policy ``` New-AzApplicationGatewayFirewallPolicyExclusion -MatchVariable -SelectorMatchOperator -Selector [-ExclusionManagedRuleSet ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -92,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Selector When variable is a collection, operator used to specify which elements in the collection this exclusion applies to. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRule.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRule.md index b9cacb12270d..c1600bb03ca8 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRule.md @@ -14,7 +14,7 @@ Creates an exclusionManagedRule entry for ExclusionManagedRuleGroup entry. ``` New-AzApplicationGatewayFirewallPolicyExclusionManagedRule -RuleId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -46,6 +46,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleId Specify the RuleId in exclusion rule entry. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleGroup.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleGroup.md index d1e403ae8ebf..c18bb7c5a487 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleGroup.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleGroup.md @@ -15,7 +15,7 @@ Creates ExclusionManagedRuleGroup entry in ExclusionManagedRuleSets for the fire ``` New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleGroup -Name [-Rule ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule List of Rules. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleSet.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleSet.md index 4f0bc237c3fc..8d839fc45bcb 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleSet.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleSet.md @@ -15,7 +15,7 @@ Creates an ExclusionManagedRuleSet for the firewallPolicy exclusion ``` New-AzApplicationGatewayFirewallPolicyExclusionManagedRuleSet -Type -Version [-RuleGroup ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -49,6 +49,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleGroup Rule Group Overrides. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingConfiguration.md index c9056174cb53..309f57749098 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingConfiguration.md @@ -15,7 +15,7 @@ Creates a log scrubbing configuration for firewall policy ``` New-AzApplicationGatewayFirewallPolicyLogScrubbingConfiguration -State -ScrubbingRule - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -48,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ScrubbingRule The rules that are applied to the logs for scrubbing. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingRule.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingRule.md index 2be86e5e4b3e..0c8d957ae71a 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyLogScrubbingRule.md @@ -15,7 +15,7 @@ Creates a log scrubbing rule for firewall policy ``` New-AzApplicationGatewayFirewallPolicyLogScrubbingRule -State -MatchVariable -SelectorMatchOperator [-Selector ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -72,6 +72,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Selector When matchVariable is a collection, operator used to specify which elements in the collection this rule applies to. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRule.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRule.md index e80069042364..c316b7b201c6 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRule.md @@ -16,7 +16,7 @@ Create ManagedRules for the firewall policy. New-AzApplicationGatewayFirewallPolicyManagedRule [-ManagedRuleSet ] [-Exclusion ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride.md index 4b49965ec5a7..a6f65a55065f 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride.md @@ -15,7 +15,7 @@ Creates RuleGroupOverride entry in ManagedRuleSets for the firewall policy. ``` New-AzApplicationGatewayFirewallPolicyManagedRuleGroupOverride -RuleGroupName [-Rule ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -47,6 +47,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule List of Rules. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleOverride.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleOverride.md index 03c6c6d3b337..fcef4860b06f 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleOverride.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleOverride.md @@ -14,7 +14,7 @@ Creates a managedRuleOverride entry for RuleGroupOverrideGroup entry. ``` New-AzApplicationGatewayFirewallPolicyManagedRuleOverride -RuleId [-State ] [-Action ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleId Specify the RuleId in override rule entry. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleSet.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleSet.md index a82e9b829527..bfa54dd07c4d 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleSet.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicyManagedRuleSet.md @@ -15,7 +15,7 @@ Creates a ManagedRuleSet for the firewallPolicy ``` New-AzApplicationGatewayFirewallPolicyManagedRuleSet -RuleSetType -RuleSetVersion [-RuleGroupOverride ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -49,6 +49,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleGroupOverride Rule Group Overrides. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicySetting.md b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicySetting.md index 4da03ce04888..77c05ffb9af7 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicySetting.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFirewallPolicySetting.md @@ -18,8 +18,8 @@ New-AzApplicationGatewayFirewallPolicySetting [-Mode ] [-State ] [-MaxRequestBodySizeInKb ] [-DisableFileUploadEnforcement ] [-MaxFileUploadInMb ] [-CustomBlockResponseStatusCode ] [-CustomBlockResponseBody ] [-LogScrubbing ] - [-JSChallengeCookieExpirationInMins ] - [-DefaultProfile ] [] + [-JSChallengeCookieExpirationInMins ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -151,6 +151,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -JSChallengeCookieExpirationInMins +Web Application Firewall JavaScript Challenge Cookie Expiration time in minutes. + +```yaml +Type: System.Nullable`1[System.Int32] +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -LogScrubbing To scrub sensitive log fields @@ -212,13 +227,13 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -RequestBodyInspectLimitInKB -Max inspection limit in KB for request body inspection. +### -ProgressAction +{{ Fill ProgressAction Description }} ```yaml -Type: System.Nullable`1[System.Int32] +Type: System.Management.Automation.ActionPreference Parameter Sets: (All) -Aliases: +Aliases: proga Required: False Position: Named @@ -227,8 +242,8 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -JSChallengeCookieExpirationInMins -Web Application Firewall JavaScript Challenge Cookie Expiration time in minutes. +### -RequestBodyInspectLimitInKB +Max inspection limit in KB for request body inspection. ```yaml Type: System.Nullable`1[System.Int32] diff --git a/src/Network/Network/help/New-AzApplicationGatewayFrontendIPConfig.md b/src/Network/Network/help/New-AzApplicationGatewayFrontendIPConfig.md index 5f5fefbf31cd..d05dd8155848 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFrontendIPConfig.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFrontendIPConfig.md @@ -17,7 +17,7 @@ Creates a front-end IP configuration for an application gateway. ``` New-AzApplicationGatewayFrontendIPConfig -Name [-PrivateIPAddress ] [-SubnetId ] [-PublicIPAddressId ] [-PrivateLinkConfigurationId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource @@ -25,7 +25,7 @@ New-AzApplicationGatewayFrontendIPConfig -Name [-PrivateIPAddress [-PrivateIPAddress ] [-Subnet ] [-PublicIPAddress ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -148,6 +148,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIPAddress Specifies the public IP address object which this cmdlet associates with the front-end IP address of the application gateway. diff --git a/src/Network/Network/help/New-AzApplicationGatewayFrontendPort.md b/src/Network/Network/help/New-AzApplicationGatewayFrontendPort.md index af1bf1a39484..55b4bec23d8c 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayFrontendPort.md +++ b/src/Network/Network/help/New-AzApplicationGatewayFrontendPort.md @@ -15,7 +15,7 @@ Creates a front-end port for an application gateway. ``` New-AzApplicationGatewayFrontendPort -Name -Port [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayHeaderValueMatcher.md b/src/Network/Network/help/New-AzApplicationGatewayHeaderValueMatcher.md index ba254da0ef23..e81400b5a8d1 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayHeaderValueMatcher.md +++ b/src/Network/Network/help/New-AzApplicationGatewayHeaderValueMatcher.md @@ -14,7 +14,7 @@ Creates a **HeaderValueMatcher** object configuration to use in **ApplicationGat ``` New-AzApplicationGatewayHeaderValueMatcher -Pattern [-IgnoreCase] [-Negate] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -92,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayHttpListener.md b/src/Network/Network/help/New-AzApplicationGatewayHttpListener.md index b185146ff9f0..ba460002b59d 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayHttpListener.md +++ b/src/Network/Network/help/New-AzApplicationGatewayHttpListener.md @@ -19,7 +19,7 @@ New-AzApplicationGatewayHttpListener -Name [-FrontendIPConfigurationId [-FrontendPortId ] [-SslCertificateId ] [-FirewallPolicyId ] [-SslProfileId ] [-HostName ] [-HostNames ] [-RequireServerNameIndication ] -Protocol [-CustomErrorConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResource @@ -31,7 +31,7 @@ New-AzApplicationGatewayHttpListener -Name [-SslCertificate ] [-SslProfile ] [-HostName ] [-HostNames ] [-RequireServerNameIndication ] -Protocol [-CustomErrorConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -245,6 +245,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that the HTTP listener uses. diff --git a/src/Network/Network/help/New-AzApplicationGatewayIPConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayIPConfiguration.md index 3ef526ff874a..8af211b26f09 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayIPConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayIPConfiguration.md @@ -16,13 +16,13 @@ Creates an IP configuration for an application gateway. ### SetByResourceId ``` New-AzApplicationGatewayIPConfiguration -Name [-SubnetId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` New-AzApplicationGatewayIPConfiguration -Name [-Subnet ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -74,6 +74,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet Specifies the subnet object. This is the subnet in which the application gateway is deployed. diff --git a/src/Network/Network/help/New-AzApplicationGatewayIdentity.md b/src/Network/Network/help/New-AzApplicationGatewayIdentity.md index 8efbef650117..05f1c534d680 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayIdentity.md +++ b/src/Network/Network/help/New-AzApplicationGatewayIdentity.md @@ -14,7 +14,7 @@ Creates an identity object for an application gateway. This will hold reference ``` New-AzApplicationGatewayIdentity -UserAssignedIdentityId [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -48,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -UserAssignedIdentityId ResourceId of the user assigned identity to be assigned to Application Gateway. diff --git a/src/Network/Network/help/New-AzApplicationGatewayListener.md b/src/Network/Network/help/New-AzApplicationGatewayListener.md index b2d842dd0f39..70eb433bbc52 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayListener.md +++ b/src/Network/Network/help/New-AzApplicationGatewayListener.md @@ -18,14 +18,15 @@ New-AzApplicationGatewayListener -Name [-FrontendIPConfiguration ] [-FrontendPort ] [-SslCertificate ] [-SslProfile ] -Protocol [-HostNames ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId ``` New-AzApplicationGatewayListener -Name [-FrontendIPConfigurationId ] [-FrontendPortId ] [-SslCertificateId ] [-SslProfileId ] -Protocol - [-HostNames ] [-DefaultProfile ] [] + [-HostNames ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -155,6 +156,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol diff --git a/src/Network/Network/help/New-AzApplicationGatewayPathRuleConfig.md b/src/Network/Network/help/New-AzApplicationGatewayPathRuleConfig.md index 10d25b35526a..3981515121df 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayPathRuleConfig.md +++ b/src/Network/Network/help/New-AzApplicationGatewayPathRuleConfig.md @@ -17,7 +17,8 @@ Creates an application gateway path rule. ``` New-AzApplicationGatewayPathRuleConfig -Name -Paths [-BackendAddressPoolId ] [-BackendHttpSettingsId ] [-RewriteRuleSetId ] [-RedirectConfigurationId ] - [-FirewallPolicyId ] [-DefaultProfile ] [] + [-FirewallPolicyId ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResource @@ -28,7 +29,7 @@ New-AzApplicationGatewayPathRuleConfig -Name -Paths [-RewriteRuleSet ] [-RedirectConfiguration ] [-FirewallPolicy ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -233,6 +234,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectConfiguration Application gateway RedirectConfiguration diff --git a/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkConfiguration.md index efcd3b26ef60..91e07fd6be6c 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkConfiguration.md @@ -15,7 +15,7 @@ Creates a private link configuration for an application gateway ``` New-AzApplicationGatewayPrivateLinkConfiguration -Name -IpConfiguration [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -89,6 +89,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkIpConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkIpConfiguration.md index bfe41d4636c0..bc351deea62f 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkIpConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayPrivateLinkIpConfiguration.md @@ -15,7 +15,7 @@ Creates an Ip Configuration to be associated with PrivateLink Configuration ``` New-AzApplicationGatewayPrivateLinkIpConfiguration -Name -Subnet [-PrivateIpAddressVersion ] [-PrivateIpAddress ] [-Primary] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -108,6 +108,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet Subnet diff --git a/src/Network/Network/help/New-AzApplicationGatewayProbeConfig.md b/src/Network/Network/help/New-AzApplicationGatewayProbeConfig.md index 47624989f8e0..3025f02e9dfd 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayProbeConfig.md +++ b/src/Network/Network/help/New-AzApplicationGatewayProbeConfig.md @@ -16,7 +16,7 @@ Creates a health probe. New-AzApplicationGatewayProbeConfig -Name -Protocol [-HostName ] [-Path ] -Interval -Timeout -UnhealthyThreshold [-PickHostNameFromBackendHttpSettings] [-MinServers ] [-Port ] [-Match ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -186,6 +186,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol used to send probe. diff --git a/src/Network/Network/help/New-AzApplicationGatewayProbeHealthResponseMatch.md b/src/Network/Network/help/New-AzApplicationGatewayProbeHealthResponseMatch.md index c489dc3ae076..417465b003de 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayProbeHealthResponseMatch.md +++ b/src/Network/Network/help/New-AzApplicationGatewayProbeHealthResponseMatch.md @@ -14,7 +14,7 @@ Creates a health probe response match used by Health Probe for an application ga ``` New-AzApplicationGatewayProbeHealthResponseMatch [-Body ] [-StatusCode ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Allowed ranges of healthy status codes.Default range of healthy status codes is 200 - 399 diff --git a/src/Network/Network/help/New-AzApplicationGatewayRedirectConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayRedirectConfiguration.md index a3ae2443e297..611fb9bb5ddb 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRedirectConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRedirectConfiguration.md @@ -16,21 +16,21 @@ Creates a redirect configuration for an application gateway. ``` New-AzApplicationGatewayRedirectConfiguration -Name -RedirectType [-TargetListenerID ] [-IncludePath ] [-IncludeQueryString ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` New-AzApplicationGatewayRedirectConfiguration -Name -RedirectType [-TargetListener ] [-IncludePath ] [-IncludeQueryString ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByURL ``` New-AzApplicationGatewayRedirectConfiguration -Name -RedirectType [-TargetUrl ] [-IncludePath ] [-IncludeQueryString ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -120,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectType The type of redirect diff --git a/src/Network/Network/help/New-AzApplicationGatewayRequestRoutingRule.md b/src/Network/Network/help/New-AzApplicationGatewayRequestRoutingRule.md index d74394b99d13..6118727c2b84 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRequestRoutingRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRequestRoutingRule.md @@ -18,7 +18,7 @@ Creates a request routing rule for an application gateway. New-AzApplicationGatewayRequestRoutingRule -Name -RuleType [-Priority ] [-BackendHttpSettingsId ] [-HttpListenerId ] [-BackendAddressPoolId ] [-UrlPathMapId ] [-RewriteRuleSetId ] [-RedirectConfigurationId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource @@ -29,7 +29,7 @@ New-AzApplicationGatewayRequestRoutingRule -Name -RuleType [-P [-BackendAddressPool ] [-UrlPathMap ] [-RewriteRuleSet ] [-RedirectConfiguration ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -181,6 +181,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectConfiguration Application gateway RedirectConfiguration diff --git a/src/Network/Network/help/New-AzApplicationGatewayRewriteRule.md b/src/Network/Network/help/New-AzApplicationGatewayRewriteRule.md index 8688d7231d9e..e8bb35d2d93f 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRewriteRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRewriteRule.md @@ -15,7 +15,7 @@ Creates a rewrite rule for an application gateway. ``` New-AzApplicationGatewayRewriteRule -Name -ActionSet [-RuleSequence ] [-Condition ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -92,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleSequence The rule ordering of this rewrite rule in the rewrite rule set diff --git a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleActionSet.md b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleActionSet.md index e66243c5b73c..8542b95d4fd2 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleActionSet.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleActionSet.md @@ -17,7 +17,7 @@ New-AzApplicationGatewayRewriteRuleActionSet [-RequestHeaderConfiguration ] [-ResponseHeaderConfiguration ] [-UrlConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -49,6 +49,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RequestHeaderConfiguration List of request header configurations diff --git a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleCondition.md b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleCondition.md index bb7e1c10bc30..0c5880146c8e 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleCondition.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleCondition.md @@ -14,7 +14,7 @@ Adds a condition to the RewriteRule for an application gateway. ``` New-AzApplicationGatewayRewriteRuleCondition -Variable [-Pattern ] [-IgnoreCase] [-Negate] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -106,6 +106,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Variable Name of the Header to set condition on it diff --git a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleHeaderConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleHeaderConfiguration.md index 9e65d5fb2aec..32282b7e917d 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleHeaderConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleHeaderConfiguration.md @@ -15,7 +15,7 @@ Creates a rewrite rule header configuration for an application gateway. ``` New-AzApplicationGatewayRewriteRuleHeaderConfiguration -HeaderName [-HeaderValue ] [-HeaderValueMatcher ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -93,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleSet.md b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleSet.md index 2f6cd09e8c02..75246dece7ee 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleSet.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleSet.md @@ -15,7 +15,7 @@ Creates a rewrite rule set for an application gateway. ``` New-AzApplicationGatewayRewriteRuleSet -Name -RewriteRule - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RewriteRule List of rewrite rules diff --git a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleUrlConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleUrlConfiguration.md index d04d1132c2ca..efabdc516532 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleUrlConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRewriteRuleUrlConfiguration.md @@ -14,7 +14,8 @@ Creates a rewrite rule url configuration for an application gateway. ``` New-AzApplicationGatewayRewriteRuleUrlConfiguration [-ModifiedPath ] [-ModifiedQueryString ] - [-Reroute] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Reroute] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -78,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Reroute Flag to re-evaluate the url path map provided in path based request routing rules using modified path. diff --git a/src/Network/Network/help/New-AzApplicationGatewayRoutingRule.md b/src/Network/Network/help/New-AzApplicationGatewayRoutingRule.md index b7e687f98971..863d263b7da6 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayRoutingRule.md +++ b/src/Network/Network/help/New-AzApplicationGatewayRoutingRule.md @@ -17,14 +17,14 @@ Creates a routing rule for an application gateway. New-AzApplicationGatewayRoutingRule -Name -RuleType -Priority [-BackendSettings ] [-Listener ] [-BackendAddressPool ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResourceId ``` New-AzApplicationGatewayRoutingRule -Name -RuleType -Priority [-BackendSettingsId ] [-ListenerId ] [-BackendAddressPoolId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -176,6 +176,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleType The type of rule diff --git a/src/Network/Network/help/New-AzApplicationGatewaySku.md b/src/Network/Network/help/New-AzApplicationGatewaySku.md index 0b9dcb5602d6..9d1f2c50f4d9 100644 --- a/src/Network/Network/help/New-AzApplicationGatewaySku.md +++ b/src/Network/Network/help/New-AzApplicationGatewaySku.md @@ -15,7 +15,7 @@ Creates a SKU for an application gateway. ``` New-AzApplicationGatewaySku -Name -Tier [-Capacity ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -87,6 +87,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Tier Specifies the tier of the SKU. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/New-AzApplicationGatewaySslCertificate.md b/src/Network/Network/help/New-AzApplicationGatewaySslCertificate.md index 21756772dd64..691612dce666 100644 --- a/src/Network/Network/help/New-AzApplicationGatewaySslCertificate.md +++ b/src/Network/Network/help/New-AzApplicationGatewaySslCertificate.md @@ -15,7 +15,8 @@ Creates an SSL certificate for an Azure application gateway. ``` New-AzApplicationGatewaySslCertificate -Name [-CertificateFile ] [-Password ] - [-KeyVaultSecretId ] [-DefaultProfile ] [] + [-KeyVaultSecretId ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -128,6 +129,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewaySslPolicy.md b/src/Network/Network/help/New-AzApplicationGatewaySslPolicy.md index 18c39c101dad..5f36249e4983 100644 --- a/src/Network/Network/help/New-AzApplicationGatewaySslPolicy.md +++ b/src/Network/Network/help/New-AzApplicationGatewaySslPolicy.md @@ -16,7 +16,8 @@ Creates an SSL policy for an application gateway. ``` New-AzApplicationGatewaySslPolicy [-DisabledSslProtocols ] [-PolicyType ] [-PolicyName ] [-CipherSuite ] [-MinProtocolVersion ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -130,6 +131,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzApplicationGatewaySslProfile.md b/src/Network/Network/help/New-AzApplicationGatewaySslProfile.md index d18ccd903b18..8e72dc131125 100644 --- a/src/Network/Network/help/New-AzApplicationGatewaySslProfile.md +++ b/src/Network/Network/help/New-AzApplicationGatewaySslProfile.md @@ -16,7 +16,7 @@ Creates SSL profile for an application gateway. New-AzApplicationGatewaySslProfile -Name [-SslPolicy ] [-ClientAuthConfiguration ] [-TrustedClientCertificates ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -82,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslPolicy SSL policy diff --git a/src/Network/Network/help/New-AzApplicationGatewayTrustedClientCertificate.md b/src/Network/Network/help/New-AzApplicationGatewayTrustedClientCertificate.md index 43fe1bba6a4a..04f13580b747 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayTrustedClientCertificate.md +++ b/src/Network/Network/help/New-AzApplicationGatewayTrustedClientCertificate.md @@ -14,7 +14,7 @@ Creates a trusted client CA certificate chain for an application gateway. ``` New-AzApplicationGatewayTrustedClientCertificate -Name -CertificateFile - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayTrustedRootCertificate.md b/src/Network/Network/help/New-AzApplicationGatewayTrustedRootCertificate.md index 002bb39b2441..f4027d99de6f 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayTrustedRootCertificate.md +++ b/src/Network/Network/help/New-AzApplicationGatewayTrustedRootCertificate.md @@ -14,7 +14,8 @@ Creates a Trusted Root Certificate for an application gateway. ``` New-AzApplicationGatewayTrustedRootCertificate -Name -CertificateFile - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -77,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzApplicationGatewayUrlPathMapConfig.md b/src/Network/Network/help/New-AzApplicationGatewayUrlPathMapConfig.md index fcebd9de8770..0cfdd8ca2a90 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayUrlPathMapConfig.md +++ b/src/Network/Network/help/New-AzApplicationGatewayUrlPathMapConfig.md @@ -19,14 +19,15 @@ New-AzApplicationGatewayUrlPathMapConfig -Name -PathRules -DefaultBackendHttpSettings [-DefaultRewriteRuleSet ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### BackendSetByResourceId ``` New-AzApplicationGatewayUrlPathMapConfig -Name -PathRules -DefaultBackendAddressPoolId -DefaultBackendHttpSettingsId - [-DefaultRewriteRuleSetId ] [-DefaultProfile ] [] + [-DefaultRewriteRuleSetId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### RedirectSetByResource @@ -34,14 +35,14 @@ New-AzApplicationGatewayUrlPathMapConfig -Name -PathRules -PathRules [-DefaultRewriteRuleSet ] -DefaultRedirectConfiguration - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RedirectSetByResourceId ``` New-AzApplicationGatewayUrlPathMapConfig -Name -PathRules [-DefaultRewriteRuleSetId ] -DefaultRedirectConfigurationId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -224,6 +225,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzApplicationGatewayWebApplicationFirewallConfiguration.md b/src/Network/Network/help/New-AzApplicationGatewayWebApplicationFirewallConfiguration.md index e9e6fc7d11e2..b2f5d1e72bc3 100644 --- a/src/Network/Network/help/New-AzApplicationGatewayWebApplicationFirewallConfiguration.md +++ b/src/Network/Network/help/New-AzApplicationGatewayWebApplicationFirewallConfiguration.md @@ -18,8 +18,8 @@ New-AzApplicationGatewayWebApplicationFirewallConfiguration -Enabled - [-RuleSetType ] [-RuleSetVersion ] [-DisabledRuleGroup ] [-RequestBodyCheck ] [-MaxRequestBodySizeInKb ] [-FileUploadLimitInMb ] - [-Exclusion ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-Exclusion ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -149,6 +149,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RequestBodyCheck Whether request body is checked or not. diff --git a/src/Network/Network/help/New-AzApplicationSecurityGroup.md b/src/Network/Network/help/New-AzApplicationSecurityGroup.md index e18dc1d7d8d1..c53b8ba1de2b 100644 --- a/src/Network/Network/help/New-AzApplicationSecurityGroup.md +++ b/src/Network/Network/help/New-AzApplicationSecurityGroup.md @@ -14,7 +14,8 @@ Creates an application security group. ``` New-AzApplicationSecurityGroup -ResourceGroupName -Name -Location [-Tag ] - [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the application security group. diff --git a/src/Network/Network/help/New-AzBastion.md b/src/Network/Network/help/New-AzBastion.md index 6dccdbf29fa0..94cb35251ebe 100644 --- a/src/Network/Network/help/New-AzBastion.md +++ b/src/Network/Network/help/New-AzBastion.md @@ -18,7 +18,7 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddress [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByPublicIpAddressByVirtualNetworkRGNameByVirtualNetworkName @@ -27,7 +27,8 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddress -VirtualNetworkName [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByPublicIpAddressByVirtualNetworkId @@ -36,7 +37,7 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddress [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByPublicIpAddressIdByVirtualNetwork @@ -45,7 +46,7 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddressId [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByPublicIpAddressIdByVirtualNetworkRGNameByVirtualNetworkName @@ -54,7 +55,8 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddressId -VirtualNetworkName [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByPublicIpAddressIdByVirtualNetworkId @@ -62,7 +64,8 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddressId -Name -PublicIpAddressId -VirtualNetworkId [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] - [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Tag ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByPublicIpAddressRgNameByPublicIpAddressNameByVirtualNetwork @@ -71,7 +74,8 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddressRgName -PublicIpAddressName -VirtualNetwork [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByPublicIpAddressRgNameByPublicIpAddressNameByVirtualNetworkRGNameByVirtualNetworkName @@ -80,7 +84,8 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddressRgName -PublicIpAddressName -VirtualNetworkRgName -VirtualNetworkName [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByPublicIpAddressRgNameByPublicIpAddressNameByVirtualNetworkId @@ -89,7 +94,8 @@ New-AzBastion -ResourceGroupName -Name -PublicIpAddressRgName -PublicIpAddressName -VirtualNetworkId [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-AsJob] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -352,6 +358,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress The public IP address object for bastion. diff --git a/src/Network/Network/help/New-AzContainerNicConfig.md b/src/Network/Network/help/New-AzContainerNicConfig.md index b91e0849ebaf..9f0e8b7832d2 100644 --- a/src/Network/Network/help/New-AzContainerNicConfig.md +++ b/src/Network/Network/help/New-AzContainerNicConfig.md @@ -14,7 +14,8 @@ Creates a new container network interface configuration object. ``` New-AzContainerNicConfig [-Name ] [-IpConfiguration ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -89,6 +90,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzContainerNicConfigIpConfig.md b/src/Network/Network/help/New-AzContainerNicConfigIpConfig.md index c786cd1bd093..60b5582cc334 100644 --- a/src/Network/Network/help/New-AzContainerNicConfigIpConfig.md +++ b/src/Network/Network/help/New-AzContainerNicConfigIpConfig.md @@ -14,7 +14,8 @@ Creates a container nic configuration ip configuration object. ``` New-AzContainerNicConfigIpConfig -Name -Subnet [-SubnetId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -69,6 +70,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet Subnet diff --git a/src/Network/Network/help/New-AzCustomIpPrefix.md b/src/Network/Network/help/New-AzCustomIpPrefix.md index 0b0897dfca7e..3ec1f2fae5f3 100644 --- a/src/Network/Network/help/New-AzCustomIpPrefix.md +++ b/src/Network/Network/help/New-AzCustomIpPrefix.md @@ -16,8 +16,8 @@ Creates a CustomIpPrefix resource New-AzCustomIpPrefix -Name -ResourceGroupName -Location -Cidr [-Asn ] [-Geo ] [-SignedMessage ] [-AuthorizationMessage ] [-ExpressRouteAdvertise] [-CustomIpPrefixParent ] [-IsParent] [-Zone ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -214,6 +214,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzDdosProtectionPlan.md b/src/Network/Network/help/New-AzDdosProtectionPlan.md index 5cae79982cf6..bbde5b82e33c 100644 --- a/src/Network/Network/help/New-AzDdosProtectionPlan.md +++ b/src/Network/Network/help/New-AzDdosProtectionPlan.md @@ -14,7 +14,8 @@ Creates a DDoS protection plan. ``` New-AzDdosProtectionPlan -ResourceGroupName -Name -Location [-Tag ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -147,6 +148,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the resource group of the DDoS protection plan to be created. diff --git a/src/Network/Network/help/New-AzDelegation.md b/src/Network/Network/help/New-AzDelegation.md index f56a990c5d83..f4f49f18c7fa 100644 --- a/src/Network/Network/help/New-AzDelegation.md +++ b/src/Network/Network/help/New-AzDelegation.md @@ -14,7 +14,7 @@ Creates a service delegation. ``` New-AzDelegation -Name -ServiceName [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -65,6 +65,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ServiceName The name of the service to which the subnet should be delegated diff --git a/src/Network/Network/help/New-AzExpressRouteCircuit.md b/src/Network/Network/help/New-AzExpressRouteCircuit.md index 6a59f4a63674..26ff39c0ea93 100644 --- a/src/Network/Network/help/New-AzExpressRouteCircuit.md +++ b/src/Network/Network/help/New-AzExpressRouteCircuit.md @@ -19,7 +19,8 @@ New-AzExpressRouteCircuit -Name -ResourceGroupName -Location < [-SkuFamily ] -ServiceProviderName -PeeringLocation -BandwidthInMbps [-Peering ] [-Authorization ] [-AllowClassicOperations ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ExpressRoutePort @@ -28,7 +29,8 @@ New-AzExpressRouteCircuit -Name -ResourceGroupName -Location < [-SkuFamily ] -ExpressRoutePort -BandwidthInGbps [-AuthorizationKey ] [-Peering ] [-Authorization ] [-AllowClassicOperations ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -263,6 +265,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group that will contain the circuit. diff --git a/src/Network/Network/help/New-AzExpressRouteCircuitAuthorization.md b/src/Network/Network/help/New-AzExpressRouteCircuitAuthorization.md index b3baf61d4de3..9d61a7486bd3 100644 --- a/src/Network/Network/help/New-AzExpressRouteCircuitAuthorization.md +++ b/src/Network/Network/help/New-AzExpressRouteCircuitAuthorization.md @@ -15,7 +15,7 @@ Creates an ExpressRoute circuit authorization. ``` New-AzExpressRouteCircuitAuthorization -Name [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzExpressRouteCircuitPeeringConfig.md b/src/Network/Network/help/New-AzExpressRouteCircuitPeeringConfig.md index 928238000ce7..0d3e9fec5b5e 100644 --- a/src/Network/Network/help/New-AzExpressRouteCircuitPeeringConfig.md +++ b/src/Network/Network/help/New-AzExpressRouteCircuitPeeringConfig.md @@ -19,7 +19,7 @@ New-AzExpressRouteCircuitPeeringConfig -Name -PeeringType -Pee -PrimaryPeerAddressPrefix -SecondaryPeerAddressPrefix -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] [-PeerAddressType ] [-LegacyMode ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### MicrosoftPeeringConfigRoutFilterId @@ -28,7 +28,8 @@ New-AzExpressRouteCircuitPeeringConfig -Name -PeeringType -Pee -PrimaryPeerAddressPrefix -SecondaryPeerAddressPrefix -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] -RouteFilterId [-PeerAddressType ] - [-LegacyMode ] [-DefaultProfile ] [] + [-LegacyMode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### MicrosoftPeeringConfigRoutFilter @@ -37,7 +38,8 @@ New-AzExpressRouteCircuitPeeringConfig -Name -PeeringType -Pee -PrimaryPeerAddressPrefix -SecondaryPeerAddressPrefix -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] -RouteFilter [-PeerAddressType ] - [-LegacyMode ] [-DefaultProfile ] [] + [-LegacyMode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -235,6 +237,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter This is an existing RouteFilter object. diff --git a/src/Network/Network/help/New-AzExpressRouteConnection.md b/src/Network/Network/help/New-AzExpressRouteConnection.md index 7c19db00870c..2193250bd30f 100644 --- a/src/Network/Network/help/New-AzExpressRouteConnection.md +++ b/src/Network/Network/help/New-AzExpressRouteConnection.md @@ -17,7 +17,8 @@ Creates an ExpressRoute connection that connects an ExpressRoute gateway to an o New-AzExpressRouteConnection -ResourceGroupName -ExpressRouteGatewayName -Name -ExpressRouteCircuitPeeringId [-AuthorizationKey ] [-RoutingWeight ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteGatewayObject @@ -25,15 +26,16 @@ New-AzExpressRouteConnection -ResourceGroupName -ExpressRouteGatewayNam New-AzExpressRouteConnection -ExpressRouteGatewayObject -Name -ExpressRouteCircuitPeeringId [-AuthorizationKey ] [-RoutingWeight ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteGatewayResourceId ``` New-AzExpressRouteConnection -ParentResourceId -Name -ExpressRouteCircuitPeeringId [-AuthorizationKey ] [-RoutingWeight ] [-EnableInternetSecurity] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -222,6 +224,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzExpressRouteGateway.md b/src/Network/Network/help/New-AzExpressRouteGateway.md index cfab232b7f4d..91e8b5d9312e 100644 --- a/src/Network/Network/help/New-AzExpressRouteGateway.md +++ b/src/Network/Network/help/New-AzExpressRouteGateway.md @@ -16,21 +16,24 @@ Creates a Scalable ExpressRoute Gateway. ``` New-AzExpressRouteGateway -ResourceGroupName -Name -MinScaleUnits [-MaxScaleUnits ] -VirtualHubName [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObject ``` New-AzExpressRouteGateway -ResourceGroupName -Name -MinScaleUnits [-MaxScaleUnits ] -VirtualHub [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId ``` New-AzExpressRouteGateway -ResourceGroupName -Name -MinScaleUnits [-MaxScaleUnits ] -VirtualHubId [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -157,6 +160,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/New-AzExpressRoutePort.md b/src/Network/Network/help/New-AzExpressRoutePort.md index 9a228d09b39d..fd13251c63bb 100644 --- a/src/Network/Network/help/New-AzExpressRoutePort.md +++ b/src/Network/Network/help/New-AzExpressRoutePort.md @@ -17,7 +17,8 @@ Creates an Azure ExpressRoutePort. New-AzExpressRoutePort -ResourceGroupName -Name -PeeringLocation -BandwidthInGbps -Encapsulation -Location [-Tag ] [-Link ] [-Force] [-AsJob] [-Identity ] - [-BillingType ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-BillingType ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ResourceIdParameterSet @@ -25,7 +26,7 @@ New-AzExpressRoutePort -ResourceGroupName -Name -PeeringLocati New-AzExpressRoutePort -ResourceId -PeeringLocation -BandwidthInGbps -Encapsulation -Location [-Tag ] [-Link ] [-Force] [-AsJob] [-Identity ] [-BillingType ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -225,6 +226,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ExpressRoutePort. diff --git a/src/Network/Network/help/New-AzExpressRoutePortIdentity.md b/src/Network/Network/help/New-AzExpressRoutePortIdentity.md index 1ebdd714906d..dc61692f9b62 100644 --- a/src/Network/Network/help/New-AzExpressRoutePortIdentity.md +++ b/src/Network/Network/help/New-AzExpressRoutePortIdentity.md @@ -14,7 +14,7 @@ Creates an Azure ExpressRoutePortIdentity. ``` New-AzExpressRoutePortIdentity -UserAssignedIdentityId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -47,6 +47,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -UserAssignedIdentityId ResourceId of the user assigned identity to be assigned to ExpressRoutePort. diff --git a/src/Network/Network/help/New-AzExpressRoutePortLOA.md b/src/Network/Network/help/New-AzExpressRoutePortLOA.md index 1f40fbf7f21c..9b3f7e035e93 100644 --- a/src/Network/Network/help/New-AzExpressRoutePortLOA.md +++ b/src/Network/Network/help/New-AzExpressRoutePortLOA.md @@ -15,19 +15,21 @@ Download letter of authorization document for an express route port. ### ResourceNameParameterSet (Default) ``` New-AzExpressRoutePortLOA -PortName -ResourceGroupName -CustomerName - [-Destination ] [-PassThru] [-AsJob] [-DefaultProfile ] [] + [-Destination ] [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### ResourceObjectParameterSet ``` New-AzExpressRoutePortLOA -ExpressRoutePort -CustomerName [-Destination ] - [-PassThru] [-AsJob] [-DefaultProfile ] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ResourceIdParameterSet ``` New-AzExpressRoutePortLOA -Id -CustomerName [-Destination ] [-PassThru] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -175,6 +177,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the express route port. diff --git a/src/Network/Network/help/New-AzFirewall.md b/src/Network/Network/help/New-AzFirewall.md index 6ab340149ef0..715a68dbc036 100644 --- a/src/Network/Network/help/New-AzFirewall.md +++ b/src/Network/Network/help/New-AzFirewall.md @@ -16,6 +16,7 @@ Creates a new Firewall in a resource group. ### Default (Default) ``` New-AzFirewall -Name -ResourceGroupName -Location + [-PublicIpAddress ] [-ApplicationRuleCollection ] [-NatRuleCollection ] [-NetworkRuleCollection ] [-ThreatIntelMode ] @@ -23,20 +24,23 @@ New-AzFirewall -Name -ResourceGroupName -Location [-DnsServer ] [-Tag ] [-Force] [-AsJob] [-Zone ] [-SkuName ] [-SkuTier ] [-VirtualHubId ] [-HubIPAddress ] [-FirewallPolicyId ] [-AllowActiveFTP] [-EnableFatFlowLogging] [-EnableUDPLogOptimization] - [-RouteServerId ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RouteServerId ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### OldIpConfigurationParameterValues ``` New-AzFirewall -Name -ResourceGroupName -Location -VirtualNetworkName - [-PublicIpName ] [-ApplicationRuleCollection ] + [-PublicIpName ] [-PublicIpAddress ] + [-ApplicationRuleCollection ] [-NatRuleCollection ] [-NetworkRuleCollection ] [-ThreatIntelMode ] [-ThreatIntelWhitelist ] [-PrivateRange ] [-EnableDnsProxy] [-DnsServer ] [-Tag ] [-Force] [-AsJob] [-Zone ] [-SkuName ] [-SkuTier ] [-VirtualHubId ] [-HubIPAddress ] [-FirewallPolicyId ] [-AllowActiveFTP] [-EnableFatFlowLogging] [-EnableUDPLogOptimization] - [-RouteServerId ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RouteServerId ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### IpConfigurationParameterValues @@ -50,7 +54,8 @@ New-AzFirewall -Name -ResourceGroupName -Location -Vi [-DnsServer ] [-Tag ] [-Force] [-AsJob] [-Zone ] [-SkuName ] [-SkuTier ] [-VirtualHubId ] [-HubIPAddress ] [-FirewallPolicyId ] [-AllowActiveFTP] [-EnableFatFlowLogging] [-EnableUDPLogOptimization] - [-RouteServerId ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RouteServerId ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -523,12 +528,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress One or more Public IP Addresses. The Public IP addresses must use Standard SKU and must belong to the same resource group as the Firewall. No input needed for Forced Tunneling Firewalls. ```yaml Type: Microsoft.Azure.Commands.Network.Models.PSPublicIpAddress[] -Parameter Sets: IpConfigurationParameterValues +Parameter Sets: (All) Aliases: Required: False diff --git a/src/Network/Network/help/New-AzFirewallApplicationRule.md b/src/Network/Network/help/New-AzFirewallApplicationRule.md index f0e9aefd435c..eeb16e99c635 100644 --- a/src/Network/Network/help/New-AzFirewallApplicationRule.md +++ b/src/Network/Network/help/New-AzFirewallApplicationRule.md @@ -17,14 +17,15 @@ Creates a Firewall Application Rule. ``` New-AzFirewallApplicationRule -Name [-Description ] [-SourceAddress ] [-SourceIpGroup ] -TargetFqdn -Protocol - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### FqdnTag ``` New-AzFirewallApplicationRule -Name [-Description ] [-SourceAddress ] - [-SourceIpGroup ] -FqdnTag [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-SourceIpGroup ] -FqdnTag [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the type of traffic to be filtered by this rule. The format is :`. For example, "http:80" or "https:443". diff --git a/src/Network/Network/help/New-AzFirewallApplicationRuleCollection.md b/src/Network/Network/help/New-AzFirewallApplicationRuleCollection.md index fcbae6af44bf..a67d340076ee 100644 --- a/src/Network/Network/help/New-AzFirewallApplicationRuleCollection.md +++ b/src/Network/Network/help/New-AzFirewallApplicationRuleCollection.md @@ -16,7 +16,7 @@ Creates a collection of Firewall application rules. ``` New-AzFirewallApplicationRuleCollection -Name -Priority -Rule -ActionType [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -131,6 +131,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule Specifies the list of rules to be grouped under this collection. diff --git a/src/Network/Network/help/New-AzFirewallHubIpAddress.md b/src/Network/Network/help/New-AzFirewallHubIpAddress.md index 3b77be584823..fd2683cfa5b1 100644 --- a/src/Network/Network/help/New-AzFirewallHubIpAddress.md +++ b/src/Network/Network/help/New-AzFirewallHubIpAddress.md @@ -14,7 +14,7 @@ Ip addresses assoicated to the firewall on virtual hub ``` New-AzFirewallHubIpAddress [-PrivateIPAddress ] [-PublicIP ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIP The IP Addresses of the Firewall attached to a hub diff --git a/src/Network/Network/help/New-AzFirewallHubPublicIpAddress.md b/src/Network/Network/help/New-AzFirewallHubPublicIpAddress.md index 8e37b5a6c0f6..e639b21e6f99 100644 --- a/src/Network/Network/help/New-AzFirewallHubPublicIpAddress.md +++ b/src/Network/Network/help/New-AzFirewallHubPublicIpAddress.md @@ -14,7 +14,7 @@ Public Ip assoicated to the firewall on virtual hub ``` New-AzFirewallHubPublicIpAddress [-Count ] [-Address ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzFirewallNatRule.md b/src/Network/Network/help/New-AzFirewallNatRule.md index 481b2e634d31..27137c3d6276 100644 --- a/src/Network/Network/help/New-AzFirewallNatRule.md +++ b/src/Network/Network/help/New-AzFirewallNatRule.md @@ -17,7 +17,8 @@ Creates a Firewall NAT Rule. New-AzFirewallNatRule -Name [-Description ] [-SourceAddress ] [-SourceIpGroup ] -DestinationAddress -DestinationPort -Protocol [-TranslatedAddress ] [-TranslatedFqdn ] -TranslatedPort - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -120,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the type of traffic to be filtered by this rule. The supported protocols are TCP and UDP. diff --git a/src/Network/Network/help/New-AzFirewallNatRuleCollection.md b/src/Network/Network/help/New-AzFirewallNatRuleCollection.md index 5cc6dfff4d5a..2152c26c106d 100644 --- a/src/Network/Network/help/New-AzFirewallNatRuleCollection.md +++ b/src/Network/Network/help/New-AzFirewallNatRuleCollection.md @@ -15,7 +15,8 @@ Creates a collection of Firewall NAT rules. ``` New-AzFirewallNatRuleCollection -Name -Priority -Rule - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -112,6 +113,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule Specifies the list of rules to be grouped under this collection. diff --git a/src/Network/Network/help/New-AzFirewallNetworkRule.md b/src/Network/Network/help/New-AzFirewallNetworkRule.md index 46f15888f142..e30eb56de861 100644 --- a/src/Network/Network/help/New-AzFirewallNetworkRule.md +++ b/src/Network/Network/help/New-AzFirewallNetworkRule.md @@ -17,7 +17,8 @@ Creates a Firewall Network Rule. New-AzFirewallNetworkRule -Name [-Description ] [-SourceAddress ] [-SourceIpGroup ] [-DestinationAddress ] [-DestinationIpGroup ] [-DestinationFqdn ] -DestinationPort -Protocol - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -153,6 +154,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the type of traffic to be filtered by this rule. Possible values are TCP, UDP, ICMP and Any. diff --git a/src/Network/Network/help/New-AzFirewallNetworkRuleCollection.md b/src/Network/Network/help/New-AzFirewallNetworkRuleCollection.md index c6a738399eb6..d72f5a7b51e1 100644 --- a/src/Network/Network/help/New-AzFirewallNetworkRuleCollection.md +++ b/src/Network/Network/help/New-AzFirewallNetworkRuleCollection.md @@ -15,7 +15,8 @@ Creates a Azure Firewall Network Collection of Network rules. ``` New-AzFirewallNetworkRuleCollection -Name -Priority -Rule - -ActionType [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -ActionType [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -132,6 +133,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule Specifies the list of rules to be grouped under this collection. diff --git a/src/Network/Network/help/New-AzFirewallPacketCaptureParameter.md b/src/Network/Network/help/New-AzFirewallPacketCaptureParameter.md index 66f7adcbeac2..e3f9984e74f4 100644 --- a/src/Network/Network/help/New-AzFirewallPacketCaptureParameter.md +++ b/src/Network/Network/help/New-AzFirewallPacketCaptureParameter.md @@ -15,8 +15,8 @@ Create a Packet Capture Parameter for Azure Firewall ``` New-AzFirewallPacketCaptureParameter -DurationInSeconds -NumberOfPacketsToCapture -SasUrl -FileName [-Protocol ] [-Flag ] - -Filter [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -Filter [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -41,7 +41,7 @@ This creates the parameter for packet capture request with a set of rules. The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: IAzureContextContainer +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential @@ -56,7 +56,7 @@ Accept wildcard characters: False The intended durations of packet capture in seconds ```yaml -Type: UInt32 +Type: System.UInt32 Parameter Sets: (All) Aliases: @@ -71,7 +71,7 @@ Accept wildcard characters: False Name of packet capture file ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -86,7 +86,7 @@ Accept wildcard characters: False The list of filters to capture ```yaml -Type: PSAzureFirewallPacketCaptureRule[] +Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPacketCaptureRule[] Parameter Sets: (All) Aliases: @@ -101,7 +101,7 @@ Accept wildcard characters: False The list of tcp-flags to capture ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -116,7 +116,7 @@ Accept wildcard characters: False The intended number of packets to capture ```yaml -Type: UInt32 +Type: System.UInt32 Parameter Sets: (All) Aliases: @@ -127,11 +127,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol The Protocols to capture ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: Accepted values: Any, TCP, UDP, ICMP @@ -147,7 +162,7 @@ Accept wildcard characters: False Upload capture storage container SASURL with write and delete permissions ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -162,7 +177,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -178,7 +193,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi diff --git a/src/Network/Network/help/New-AzFirewallPacketCaptureRule.md b/src/Network/Network/help/New-AzFirewallPacketCaptureRule.md index 5c0c87e4a9c0..12d17bd1615e 100644 --- a/src/Network/Network/help/New-AzFirewallPacketCaptureRule.md +++ b/src/Network/Network/help/New-AzFirewallPacketCaptureRule.md @@ -14,7 +14,8 @@ Creates a Packet Capture Rule for Azure Firewall ``` New-AzFirewallPacketCaptureRule -Source -Destination [-DestinationPort ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -24,7 +25,7 @@ Creates a Packet Capture Rule for Azure Firewall ### Example 1: Create a new Firewall Packet Capture Rule ``` - New-AzFirewallPacketCaptureRule -Source "10.0.0.2","192.123.12.1" -Destination "172.32.1.2" -DestinationPort "80","443" +New-AzFirewallPacketCaptureRule -Source "10.0.0.2","192.123.12.1" -Destination "172.32.1.2" -DestinationPort "80","443" ``` ## PARAMETERS @@ -74,6 +75,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Source The source addresses of the rule diff --git a/src/Network/Network/help/New-AzFirewallPolicy.md b/src/Network/Network/help/New-AzFirewallPolicy.md index 2ea9ed80464f..279fad44f93e 100644 --- a/src/Network/Network/help/New-AzFirewallPolicy.md +++ b/src/Network/Network/help/New-AzFirewallPolicy.md @@ -20,7 +20,8 @@ New-AzFirewallPolicy -Name -ResourceGroupName -Location ] [-TransportSecurityKeyVaultSecretId ] [-SkuTier ] [-UserAssignedIdentityId ] [-Identity ] [-PrivateRange ] [-ExplicitProxy ] [-Snat ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -279,6 +280,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzFirewallPolicyApplicationRule.md b/src/Network/Network/help/New-AzFirewallPolicyApplicationRule.md index f293cc73b4ca..084661060a45 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyApplicationRule.md +++ b/src/Network/Network/help/New-AzFirewallPolicyApplicationRule.md @@ -16,54 +16,56 @@ Create a new Azure Firewall Policy Application Rule ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceAddress -TargetFqdn -Protocol [-TerminateTLS] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SourceAddressAndFqdnTag ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceAddress - -FqdnTag [-TerminateTLS] [-DefaultProfile ] [] + -FqdnTag [-TerminateTLS] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SourceAddressAndWebCategory ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceAddress -WebCategory -Protocol [-TerminateTLS] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SourceAddressAndTargetUrl ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceAddress -Protocol -TargetUrl [-TerminateTLS] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SourceIpGroupAndTargetFqdn ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceIpGroup -TargetFqdn -Protocol [-TerminateTLS] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SourceIpGroupAndFqdnTag ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceIpGroup - -FqdnTag [-TerminateTLS] [-DefaultProfile ] [] + -FqdnTag [-TerminateTLS] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SourceIpGroupAndWebCategory ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceIpGroup -FqdnTag -WebCategory -Protocol [-TerminateTLS] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SourceIpGroupAndTargetUrl ``` New-AzFirewallPolicyApplicationRule -Name [-Description ] -SourceIpGroup -Protocol -TargetUrl [-TerminateTLS] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -147,6 +149,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol The protocols of the rule diff --git a/src/Network/Network/help/New-AzFirewallPolicyApplicationRuleCustomHttpHeader.md b/src/Network/Network/help/New-AzFirewallPolicyApplicationRuleCustomHttpHeader.md index 5f175bf00527..f3e3bc2e21c7 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyApplicationRuleCustomHttpHeader.md +++ b/src/Network/Network/help/New-AzFirewallPolicyApplicationRuleCustomHttpHeader.md @@ -14,7 +14,8 @@ Create a new Azure Firewall Policy Application Rule Custon HTTP Header ``` New-AzFirewallPolicyApplicationRuleCustomHttpHeader -HeaderName -HeaderValue - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -80,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzFirewallPolicyDnsSetting.md b/src/Network/Network/help/New-AzFirewallPolicyDnsSetting.md index 3b48ce4b11e6..9c0b5e9ac83b 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyDnsSetting.md +++ b/src/Network/Network/help/New-AzFirewallPolicyDnsSetting.md @@ -14,7 +14,7 @@ Creates a new DNS Setting for Azure Firewall Policy ``` New-AzFirewallPolicyDnsSetting [-EnableProxy] [-Server ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -70,6 +70,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Server The list of DNS Servers diff --git a/src/Network/Network/help/New-AzFirewallPolicyExplicitProxy.md b/src/Network/Network/help/New-AzFirewallPolicyExplicitProxy.md index 12bbbfc19f03..7aec793d600d 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyExplicitProxy.md +++ b/src/Network/Network/help/New-AzFirewallPolicyExplicitProxy.md @@ -15,7 +15,7 @@ Creates a new Explicit Proxy ``` New-AzFirewallPolicyExplicitProxy [-EnableExplicitProxy] [-HttpPort ] [-HttpsPort ] [-EnablePacFile] [-PacFilePort ] [-PacFile ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -148,6 +148,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzFirewallPolicyFilterRuleCollection.md b/src/Network/Network/help/New-AzFirewallPolicyFilterRuleCollection.md index d90a081ea037..0eeade52298e 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyFilterRuleCollection.md +++ b/src/Network/Network/help/New-AzFirewallPolicyFilterRuleCollection.md @@ -15,7 +15,7 @@ Create a new Azure Firewall Policy Filter Rule Collection ``` New-AzFirewallPolicyFilterRuleCollection -Name -Priority [-Rule ] -ActionType [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -93,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule The list of application rules diff --git a/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetection.md b/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetection.md index cd1a9b49c761..f96bcc3ec69a 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetection.md +++ b/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetection.md @@ -13,11 +13,11 @@ Creates a new Azure Firewall Policy Intrusion Detection to associate with Firewa ## SYNTAX ``` -New-AzFirewallPolicyIntrusionDetection -Mode - [-Profile ] +New-AzFirewallPolicyIntrusionDetection -Mode [-Profile ] [-SignatureOverride ] [-BypassTraffic ] [-PrivateRange ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -59,7 +59,7 @@ This example creates intrusion detection with bypass traffic setting ### Example 5: Create firewall policy with intrusion detection profile setting ```powershell -$intrusionDetection = New-AzFirewallPolicyIntrusionDetection -Mode "Deny" -Profile “Advanced” +$intrusionDetection = New-AzFirewallPolicyIntrusionDetection -Mode "Deny" -Profile �Advanced� New-AzFirewallPolicy -Name fp1 -Location "westus2" -ResourceGroupName TestRg -SkuTier "Premium" -IntrusionDetection $intrusionDetection ``` @@ -67,58 +67,57 @@ This example creates intrusion detection with Alert and Deny mode and Advanced s ## PARAMETERS -### -Mode -Intrusion Detection general state. +### -BypassTraffic +List of rules for traffic to bypass. ```yaml -Type: System.String +Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyIntrusionDetectionBypassTrafficSetting[] Parameter Sets: (All) Aliases: -Accepted values: Off, Alert, Deny -Required: True +Required: False Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` -### -Profile -Sets IDPS signatures profile. +### -DefaultProfile +The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: System.String +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) -Aliases: -Accepted values: Basic, Standard, Advanced +Aliases: AzContext, AzureRmContext, AzureCredential Required: False Position: Named -Default value: For newly created policy the default IDPS profile is “Standard” and for existing policy without IDPS profile setting, the default is “Advanced” +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` -### -SignatureOverride -List of specific signatures states. +### -Mode +Intrusion Detection general state. ```yaml -Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyIntrusionDetectionSignatureOverride[] +Type: System.String Parameter Sets: (All) Aliases: +Accepted values: Off, Alert, Deny -Required: False +Required: True Position: Named Default value: None Accept pipeline input: False Accept wildcard characters: False ``` -### -BypassTraffic -List of rules for traffic to bypass. +### -PrivateRange +List of IDPS Private IP ranges. ```yaml -Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyIntrusionDetectionBypassTrafficSetting[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -129,28 +128,28 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -PrivateRange -List of IDPS Private IP ranges. +### -Profile +Sets IDPS signatures profile. ```yaml -Type: System.String[] +Type: System.String Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: None +Default value: For newly created policy the default IDPS profile is �Standard� and for existing policy without IDPS profile setting, the default is �Advanced� Accept pipeline input: False Accept wildcard characters: False ``` -### -DefaultProfile -The credentials, account, tenant, and subscription used for communication with Azure. +### -ProgressAction +{{ Fill ProgressAction Description }} ```yaml -Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer +Type: System.Management.Automation.ActionPreference Parameter Sets: (All) -Aliases: AzContext, AzureRmContext, AzureCredential +Aliases: proga Required: False Position: Named @@ -159,14 +158,13 @@ Accept pipeline input: False Accept wildcard characters: False ``` -### -WhatIf -Shows what would happen if the cmdlet runs. -The cmdlet is not run. +### -SignatureOverride +List of specific signatures states. ```yaml -Type: System.Management.Automation.SwitchParameter +Type: Microsoft.Azure.Commands.Network.Models.PSAzureFirewallPolicyIntrusionDetectionSignatureOverride[] Parameter Sets: (All) -Aliases: wi +Aliases: Required: False Position: Named @@ -190,6 +188,22 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionBypassTraffic.md b/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionBypassTraffic.md index 073db8f154ef..c8b1aab60c16 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionBypassTraffic.md +++ b/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionBypassTraffic.md @@ -16,7 +16,7 @@ Creates a new Azure Firewall Policy Intrusion Detection Bypass Traffic Setting New-AzFirewallPolicyIntrusionDetectionBypassTraffic -Name [-Description ] -Protocol [-SourceAddress ] [-DestinationAddress ] [-SourceIpGroup ] [-DestinationIpGroup ] -DestinationPort [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -124,6 +124,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Bypass setting protocol. diff --git a/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionSignatureOverride.md b/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionSignatureOverride.md index 30b274dad0d5..9c0cda62c606 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionSignatureOverride.md +++ b/src/Network/Network/help/New-AzFirewallPolicyIntrusionDetectionSignatureOverride.md @@ -14,7 +14,8 @@ Creates a new Azure Firewall Policy Intrusion Detection Signature Override ``` New-AzFirewallPolicyIntrusionDetectionSignatureOverride -Id -Mode - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -78,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzFirewallPolicyNatRule.md b/src/Network/Network/help/New-AzFirewallPolicyNatRule.md index 9ed7ba5e47c1..231ef7a52871 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyNatRule.md +++ b/src/Network/Network/help/New-AzFirewallPolicyNatRule.md @@ -16,28 +16,32 @@ Create a new Azure Firewall Policy NAT Rule ``` New-AzFirewallPolicyNatRule -Name [-Description ] -SourceAddress -DestinationAddress -DestinationPort -Protocol -TranslatedAddress - -TranslatedPort [-DefaultProfile ] [] + -TranslatedPort [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SourceAddressAndTranslatedFqdn ``` New-AzFirewallPolicyNatRule -Name [-Description ] -SourceAddress -DestinationAddress -DestinationPort -Protocol -TranslatedFqdn - -TranslatedPort [-DefaultProfile ] [] + -TranslatedPort [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SourceIpGroupAndTranslatedAddress ``` New-AzFirewallPolicyNatRule -Name [-Description ] -SourceIpGroup -DestinationAddress -DestinationPort -Protocol -TranslatedAddress - -TranslatedPort [-DefaultProfile ] [] + -TranslatedPort [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SourceIpGroupAndTranslatedFqdn ``` New-AzFirewallPolicyNatRule -Name [-Description ] -SourceIpGroup -DestinationAddress -DestinationPort -Protocol -TranslatedFqdn - -TranslatedPort [-DefaultProfile ] [] + -TranslatedPort [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -136,6 +140,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol The protocols of the rule diff --git a/src/Network/Network/help/New-AzFirewallPolicyNatRuleCollection.md b/src/Network/Network/help/New-AzFirewallPolicyNatRuleCollection.md index 1c88cd119668..2370c6832f72 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyNatRuleCollection.md +++ b/src/Network/Network/help/New-AzFirewallPolicyNatRuleCollection.md @@ -15,7 +15,7 @@ Create a new Azure Firewall Policy Nat Rule Collection ``` New-AzFirewallPolicyNatRuleCollection -Name -Priority [-Rule ] -ActionType [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -94,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Rule The list of network rules diff --git a/src/Network/Network/help/New-AzFirewallPolicyNetworkRule.md b/src/Network/Network/help/New-AzFirewallPolicyNetworkRule.md index 41da8f4e9aa7..f5a27c7c38ef 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyNetworkRule.md +++ b/src/Network/Network/help/New-AzFirewallPolicyNetworkRule.md @@ -17,7 +17,7 @@ Create a new Azure Firewall Policy Network Rule New-AzFirewallPolicyNetworkRule -Name [-Description ] -SourceAddress [-DestinationAddress ] [-DestinationIpGroup ] -DestinationPort [-DestinationFqdn ] -Protocol [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SourceIpGroup @@ -25,7 +25,7 @@ New-AzFirewallPolicyNetworkRule -Name [-Description ] -SourceAd New-AzFirewallPolicyNetworkRule -Name [-Description ] -SourceIpGroup [-DestinationAddress ] [-DestinationIpGroup ] -DestinationPort [-DestinationFqdn ] -Protocol [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -147,6 +147,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol The protocols of the rule diff --git a/src/Network/Network/help/New-AzFirewallPolicyRuleCollectionGroup.md b/src/Network/Network/help/New-AzFirewallPolicyRuleCollectionGroup.md index 659f28f32ba7..189a1e040f6f 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyRuleCollectionGroup.md +++ b/src/Network/Network/help/New-AzFirewallPolicyRuleCollectionGroup.md @@ -16,15 +16,16 @@ Create a new Azure Firewall Policy Rule Collection Group ``` New-AzFirewallPolicyRuleCollectionGroup -Name -Priority [-RuleCollection ] -ResourceGroupName - -FirewallPolicyName [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -FirewallPolicyName [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### SetByInputObjectParameterSet ``` New-AzFirewallPolicyRuleCollectionGroup -Name -Priority [-RuleCollection ] -FirewallPolicyObject - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -127,6 +128,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzFirewallPolicySnat.md b/src/Network/Network/help/New-AzFirewallPolicySnat.md index 2d13e05ecb44..3edad2281132 100644 --- a/src/Network/Network/help/New-AzFirewallPolicySnat.md +++ b/src/Network/Network/help/New-AzFirewallPolicySnat.md @@ -14,7 +14,7 @@ Creates SNAT configuration of PrivateRange and AutoLearnPrivateRanges for the fi ``` New-AzFirewallPolicySnat [-PrivateRange ] [-AutoLearnPrivateRange] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -94,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzFirewallPolicySqlSetting.md b/src/Network/Network/help/New-AzFirewallPolicySqlSetting.md index 4e2e2589c43a..8ce6b5f5a2c5 100644 --- a/src/Network/Network/help/New-AzFirewallPolicySqlSetting.md +++ b/src/Network/Network/help/New-AzFirewallPolicySqlSetting.md @@ -13,8 +13,8 @@ Creates a new SQL Setting for Azure Firewall Policy ## SYNTAX ``` -New-AzFirewallPolicySqlSetting [-AllowSqlRedirect] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +New-AzFirewallPolicySqlSetting [-AllowSqlRedirect] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzFirewallPolicyThreatIntelWhitelist.md b/src/Network/Network/help/New-AzFirewallPolicyThreatIntelWhitelist.md index d832c6f72825..60b2a4e18937 100644 --- a/src/Network/Network/help/New-AzFirewallPolicyThreatIntelWhitelist.md +++ b/src/Network/Network/help/New-AzFirewallPolicyThreatIntelWhitelist.md @@ -14,7 +14,7 @@ Create a new threat intelligence allowlist for Azure Firewall Policy ``` New-AzFirewallPolicyThreatIntelWhitelist [-FQDN ] [-IpAddress ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzFirewallPublicIpAddress.md b/src/Network/Network/help/New-AzFirewallPublicIpAddress.md index 5ff48f82e9ba..700598e19243 100644 --- a/src/Network/Network/help/New-AzFirewallPublicIpAddress.md +++ b/src/Network/Network/help/New-AzFirewallPublicIpAddress.md @@ -14,7 +14,7 @@ This is the placeholder for the Ip Address that can be used for multi pip on azu ``` New-AzFirewallPublicIpAddress [-Address ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -61,6 +61,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzFirewallThreatIntelWhitelist.md b/src/Network/Network/help/New-AzFirewallThreatIntelWhitelist.md index 0a6f75121bb5..c779de6a49d4 100644 --- a/src/Network/Network/help/New-AzFirewallThreatIntelWhitelist.md +++ b/src/Network/Network/help/New-AzFirewallThreatIntelWhitelist.md @@ -14,7 +14,7 @@ Create a new threat intelligence allowlist for Azure Firewall ``` New-AzFirewallThreatIntelWhitelist [-FQDN ] [-IpAddress ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzGatewayCustomBgpIpConfigurationObject.md b/src/Network/Network/help/New-AzGatewayCustomBgpIpConfigurationObject.md index 10e5a0efee24..948c0516fb87 100644 --- a/src/Network/Network/help/New-AzGatewayCustomBgpIpConfigurationObject.md +++ b/src/Network/Network/help/New-AzGatewayCustomBgpIpConfigurationObject.md @@ -14,7 +14,8 @@ creates a new GatewayCustomBgpIpConfigurationObject. ``` New-AzGatewayCustomBgpIpConfigurationObject -IpConfigurationId -CustomBgpIpAddress - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -83,6 +84,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzIpAllocation.md b/src/Network/Network/help/New-AzIpAllocation.md index 6d2bc0f4e958..a8ea521083da 100644 --- a/src/Network/Network/help/New-AzIpAllocation.md +++ b/src/Network/Network/help/New-AzIpAllocation.md @@ -16,7 +16,7 @@ Creates an Azure IpAllocation. New-AzIpAllocation -Name -ResourceGroupName -Location -IpAllocationType [-Prefix ] [-PrefixLength ] [-PrefixType ] [-IpamAllocationId ] [-IpAllocationTag ] [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -203,6 +203,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzIpConfigurationBgpPeeringAddressObject.md b/src/Network/Network/help/New-AzIpConfigurationBgpPeeringAddressObject.md index 23180dd2e988..1af1175cb800 100644 --- a/src/Network/Network/help/New-AzIpConfigurationBgpPeeringAddressObject.md +++ b/src/Network/Network/help/New-AzIpConfigurationBgpPeeringAddressObject.md @@ -15,7 +15,7 @@ creates a new IpconfigurationBgpPeeringAddressObject ``` New-AzIpConfigurationBgpPeeringAddressObject -IpConfigurationId -CustomAddress [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzIpGroup.md b/src/Network/Network/help/New-AzIpGroup.md index d07a584808a7..2e82c41d14ef 100644 --- a/src/Network/Network/help/New-AzIpGroup.md +++ b/src/Network/Network/help/New-AzIpGroup.md @@ -14,8 +14,8 @@ Creates an Azure IpGroup. ``` New-AzIpGroup -Name -ResourceGroupName [-IpAddress ] -Location - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -125,6 +125,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ipgroup. diff --git a/src/Network/Network/help/New-AzIpsecPolicy.md b/src/Network/Network/help/New-AzIpsecPolicy.md index 067be7c8d54d..a4251bbfd83b 100644 --- a/src/Network/Network/help/New-AzIpsecPolicy.md +++ b/src/Network/Network/help/New-AzIpsecPolicy.md @@ -15,7 +15,7 @@ Creates an IPSec Policy. ``` New-AzIpsecPolicy [-SALifeTimeSeconds ] [-SADataSizeKilobytes ] -IpsecEncryption -IpsecIntegrity -IkeEncryption -IkeIntegrity -DhGroup -PfsGroup - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -144,6 +144,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SADataSizeKilobytes The IPSec Security Association (also called Quick Mode or Phase 2 SA) payload size in KB diff --git a/src/Network/Network/help/New-AzIpsecTrafficSelectorPolicy.md b/src/Network/Network/help/New-AzIpsecTrafficSelectorPolicy.md index 6395153c3f72..6e41cbeb6591 100644 --- a/src/Network/Network/help/New-AzIpsecTrafficSelectorPolicy.md +++ b/src/Network/Network/help/New-AzIpsecTrafficSelectorPolicy.md @@ -14,7 +14,8 @@ Creates a traffic selector policy. ``` New-AzIpsecTrafficSelectorPolicy -LocalAddressRange -RemoteAddressRange - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -62,6 +63,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RemoteAddressRange A collection of CIDR address ranges diff --git a/src/Network/Network/help/New-AzLoadBalancer.md b/src/Network/Network/help/New-AzLoadBalancer.md index 652016b9f968..731150009582 100644 --- a/src/Network/Network/help/New-AzLoadBalancer.md +++ b/src/Network/Network/help/New-AzLoadBalancer.md @@ -19,7 +19,8 @@ New-AzLoadBalancer -ResourceGroupName -Name -Location [-BackendAddressPool ] [-LoadBalancingRule ] [-Probe ] [-InboundNatRule ] [-InboundNatPool ] [-OutboundRule ] [-EdgeZone ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -263,6 +264,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group in which to create a load balancer. diff --git a/src/Network/Network/help/New-AzLoadBalancerBackendAddressConfig.md b/src/Network/Network/help/New-AzLoadBalancerBackendAddressConfig.md index 19aa66b3a7c2..9f3086e4b63c 100644 --- a/src/Network/Network/help/New-AzLoadBalancerBackendAddressConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerBackendAddressConfig.md @@ -15,19 +15,22 @@ Returns a load balancer backend address config. ### SetByIpAndSubnet (Default) ``` New-AzLoadBalancerBackendAddressConfig -IpAddress -Name -SubnetId - [-AdminState ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AdminState ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### SetByIpAndVnet ``` New-AzLoadBalancerBackendAddressConfig -IpAddress -Name -VirtualNetworkId - [-AdminState ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AdminState ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### SetByResourceFrontendIPConfiguration ``` New-AzLoadBalancerBackendAddressConfig -Name -LoadBalancerFrontendIPConfigurationId - [-AdminState ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AdminState ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -131,6 +134,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SubnetId The subnet associated with the Backend Address config diff --git a/src/Network/Network/help/New-AzLoadBalancerBackendAddressPool.md b/src/Network/Network/help/New-AzLoadBalancerBackendAddressPool.md index b077b39e03d4..c95932131d1a 100644 --- a/src/Network/Network/help/New-AzLoadBalancerBackendAddressPool.md +++ b/src/Network/Network/help/New-AzLoadBalancerBackendAddressPool.md @@ -16,16 +16,16 @@ Creates a backend address pool on a loadbalancer. ``` New-AzLoadBalancerBackendAddressPool -ResourceGroupName -LoadBalancerName -Name [-TunnelInterface ] [-LoadBalancerBackendAddress ] - [-SyncMode ] [-VirtualNetworkId ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-SyncMode ] [-VirtualNetworkId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateByParentObjectParameterSet ``` New-AzLoadBalancerBackendAddressPool -LoadBalancer -Name [-TunnelInterface ] [-LoadBalancerBackendAddress ] - [-SyncMode ] [-VirtualNetworkId ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-SyncMode ] [-VirtualNetworkId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -148,6 +148,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the load balancer. diff --git a/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolConfig.md b/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolConfig.md index 40af5097f689..9f4cf9e9072c 100644 --- a/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolConfig.md @@ -15,7 +15,8 @@ Creates a backend address pool configuration for a load balancer. ``` New-AzLoadBalancerBackendAddressPoolConfig -Name [-TunnelInterface ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -70,6 +71,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -TunnelInterface The configuration of Gateway LoadBalancer Provider. diff --git a/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolTunnelInterfaceConfig.md b/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolTunnelInterfaceConfig.md index 2cf0df3d348d..2d6ce59086e0 100644 --- a/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolTunnelInterfaceConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerBackendAddressPoolTunnelInterfaceConfig.md @@ -14,7 +14,8 @@ Creates a tunnel interface in a backend address pool of a load balancer. ``` New-AzLoadBalancerBackendAddressPoolTunnelInterfaceConfig -Protocol -Type -Identifier - -Port [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -Port [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -84,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol of tunnel interface. diff --git a/src/Network/Network/help/New-AzLoadBalancerFrontendIpConfig.md b/src/Network/Network/help/New-AzLoadBalancerFrontendIpConfig.md index 80019a288a84..c15cf83b0176 100644 --- a/src/Network/Network/help/New-AzLoadBalancerFrontendIpConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerFrontendIpConfig.md @@ -17,38 +17,44 @@ Creates a front-end IP configuration for a load balancer. ``` New-AzLoadBalancerFrontendIpConfig -Name [-PrivateIpAddress ] [-PrivateIpAddressVersion ] [-Zone ] -Subnet - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdSubnet ``` New-AzLoadBalancerFrontendIpConfig -Name [-PrivateIpAddress ] [-PrivateIpAddressVersion ] [-Zone ] -SubnetId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdPublicIpAddress ``` New-AzLoadBalancerFrontendIpConfig -Name [-Zone ] -PublicIpAddressId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourcePublicIpAddress ``` New-AzLoadBalancerFrontendIpConfig -Name [-Zone ] -PublicIpAddress - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdPublicIpAddressPrefix ``` New-AzLoadBalancerFrontendIpConfig -Name [-Zone ] -PublicIpAddressPrefixId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourcePublicIpAddressPrefix ``` New-AzLoadBalancerFrontendIpConfig -Name [-Zone ] -PublicIpAddressPrefix - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -138,6 +144,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies the **PublicIpAddress** object to associate with a front-end IP configuration. diff --git a/src/Network/Network/help/New-AzLoadBalancerInboundNatPoolConfig.md b/src/Network/Network/help/New-AzLoadBalancerInboundNatPoolConfig.md index 27aa2c4d6c00..f44c117a46ef 100644 --- a/src/Network/Network/help/New-AzLoadBalancerInboundNatPoolConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerInboundNatPoolConfig.md @@ -18,15 +18,16 @@ Creates an inbound NAT pool configuration for a load balancer. New-AzLoadBalancerInboundNatPoolConfig -Name -Protocol -FrontendPortRangeStart -FrontendPortRangeEnd -BackendPort [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfiguration ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` New-AzLoadBalancerInboundNatPoolConfig -Name -Protocol -FrontendPortRangeStart -FrontendPortRangeEnd -BackendPort [-IdleTimeoutInMinutes ] [-EnableFloatingIP] - [-EnableTcpReset] [-FrontendIpConfigurationId ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-EnableTcpReset] [-FrontendIpConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -181,6 +182,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol ```yaml Type: System.String diff --git a/src/Network/Network/help/New-AzLoadBalancerInboundNatRuleConfig.md b/src/Network/Network/help/New-AzLoadBalancerInboundNatRuleConfig.md index 43801fdc2ccc..a12703335142 100644 --- a/src/Network/Network/help/New-AzLoadBalancerInboundNatRuleConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerInboundNatRuleConfig.md @@ -19,7 +19,8 @@ New-AzLoadBalancerInboundNatRuleConfig -Name [-Protocol ] [-Fro [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfiguration ] [-FrontendPortRangeStart ] [-FrontendPortRangeEnd ] [-BackendAddressPool ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -27,8 +28,8 @@ New-AzLoadBalancerInboundNatRuleConfig -Name [-Protocol ] [-Fro New-AzLoadBalancerInboundNatRuleConfig -Name [-Protocol ] [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfigurationId ] [-FrontendPortRangeStart ] [-FrontendPortRangeEnd ] - [-BackendAddressPoolId ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-BackendAddressPoolId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -255,6 +256,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies a protocol. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/New-AzLoadBalancerOutboundRuleConfig.md b/src/Network/Network/help/New-AzLoadBalancerOutboundRuleConfig.md index f4486fdb7162..ce4e616f1d29 100644 --- a/src/Network/Network/help/New-AzLoadBalancerOutboundRuleConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerOutboundRuleConfig.md @@ -16,16 +16,16 @@ Creates an outbound rule configuration for a load balancer. ``` New-AzLoadBalancerOutboundRuleConfig -Name [-AllocatedOutboundPort ] -Protocol [-EnableTcpReset] [-IdleTimeoutInMinutes ] -FrontendIpConfiguration - -BackendAddressPool [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -BackendAddressPool [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceId ``` New-AzLoadBalancerOutboundRuleConfig -Name [-AllocatedOutboundPort ] -Protocol [-EnableTcpReset] [-IdleTimeoutInMinutes ] -FrontendIpConfiguration - -BackendAddressPoolId [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -BackendAddressPoolId [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -183,6 +183,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol - TCP, UDP or All diff --git a/src/Network/Network/help/New-AzLoadBalancerProbeConfig.md b/src/Network/Network/help/New-AzLoadBalancerProbeConfig.md index e5cbd94198e8..adb964e717e9 100644 --- a/src/Network/Network/help/New-AzLoadBalancerProbeConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerProbeConfig.md @@ -16,7 +16,8 @@ Creates a probe configuration for a load balancer. ``` New-AzLoadBalancerProbeConfig -Name [-Protocol ] -Port -IntervalInSeconds -ProbeCount [-ProbeThreshold ] [-RequestPath ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -135,6 +136,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol to use for the probe configuration. The acceptable values for this parameter are: Tcp or Http. diff --git a/src/Network/Network/help/New-AzLoadBalancerRuleConfig.md b/src/Network/Network/help/New-AzLoadBalancerRuleConfig.md index e6c918ab24b1..63b3d180bc25 100644 --- a/src/Network/Network/help/New-AzLoadBalancerRuleConfig.md +++ b/src/Network/Network/help/New-AzLoadBalancerRuleConfig.md @@ -19,7 +19,7 @@ New-AzLoadBalancerRuleConfig -Name [-Protocol ] [-LoadDistribut [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-DisableOutboundSNAT] [-FrontendIpConfiguration ] [-BackendAddressPool ] [-Probe ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceId @@ -27,8 +27,8 @@ New-AzLoadBalancerRuleConfig -Name [-Protocol ] [-LoadDistribut New-AzLoadBalancerRuleConfig -Name [-Protocol ] [-LoadDistribution ] [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-DisableOutboundSNAT] [-FrontendIpConfigurationId ] - [-BackendAddressPoolId ] [-ProbeId ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-BackendAddressPoolId ] [-ProbeId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -292,6 +292,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that is matched by a load balancer rule configuration. The acceptable values for this parameter are: Tcp or Udp. diff --git a/src/Network/Network/help/New-AzLocalNetworkGateway.md b/src/Network/Network/help/New-AzLocalNetworkGateway.md index 66e3692968be..158eacb2f548 100644 --- a/src/Network/Network/help/New-AzLocalNetworkGateway.md +++ b/src/Network/Network/help/New-AzLocalNetworkGateway.md @@ -18,15 +18,15 @@ Creates a Local Network Gateway New-AzLocalNetworkGateway -Name -ResourceGroupName -Location [-GatewayIpAddress ] [-AddressPrefix ] [-Asn ] [-BgpPeeringAddress ] [-PeerWeight ] [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByLocalNetworkGatewayFqdn ``` New-AzLocalNetworkGateway -Name -ResourceGroupName -Location [-Fqdn ] [-AddressPrefix ] [-Asn ] [-BgpPeeringAddress ] [-PeerWeight ] - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -199,6 +199,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the resource group that the local network gateway belongs to. diff --git a/src/Network/Network/help/New-AzNatGateway.md b/src/Network/Network/help/New-AzNatGateway.md index 48a3ed2ebb85..ddeafa890a29 100644 --- a/src/Network/Network/help/New-AzNatGateway.md +++ b/src/Network/Network/help/New-AzNatGateway.md @@ -15,8 +15,8 @@ Create new Nat Gateway resource with properties Public Ip Address/Public Ip Pref ``` New-AzNatGateway -ResourceGroupName -Name [-IdleTimeoutInMinutes ] [-Zone ] [-Sku ] [-Location ] [-Tag ] [-PublicIpAddress ] - [-PublicIpPrefix ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-PublicIpPrefix ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -144,6 +144,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress An array of public ip addresses associated with the nat gateway resource. diff --git a/src/Network/Network/help/New-AzNetworkInterface.md b/src/Network/Network/help/New-AzNetworkInterface.md index d206cbecf9e2..73fcb873b192 100644 --- a/src/Network/Network/help/New-AzNetworkInterface.md +++ b/src/Network/Network/help/New-AzNetworkInterface.md @@ -19,7 +19,8 @@ New-AzNetworkInterface -Name -ResourceGroupName -Location [-DnsServer ] [-InternalDnsNameLabel ] [-DisableTcpStateTracking ] [-EnableIPForwarding] [-EnableAcceleratedNetworking] [-AuxiliaryMode ] [-AuxiliarySku ] [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByIpConfigurationResourceId @@ -29,7 +30,8 @@ New-AzNetworkInterface -Name -ResourceGroupName -Location ] [-DnsServer ] [-InternalDnsNameLabel ] [-DisableTcpStateTracking ] [-EnableIPForwarding] [-EnableAcceleratedNetworking] [-AuxiliaryMode ] [-AuxiliarySku ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -41,7 +43,8 @@ New-AzNetworkInterface -Name -ResourceGroupName -Location ] [-IpConfigurationName ] [-DnsServer ] [-InternalDnsNameLabel ] [-DisableTcpStateTracking ] [-EnableIPForwarding] [-EnableAcceleratedNetworking] [-AuxiliaryMode ] [-AuxiliarySku ] [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResource @@ -54,7 +57,8 @@ New-AzNetworkInterface -Name -ResourceGroupName -Location ] [-DnsServer ] [-InternalDnsNameLabel ] [-DisableTcpStateTracking ] [-EnableIPForwarding] [-EnableAcceleratedNetworking] [-AuxiliaryMode ] [-AuxiliarySku ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -493,6 +497,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies a **PublicIPAddress** object to assign to a network interface. diff --git a/src/Network/Network/help/New-AzNetworkInterfaceIpConfig.md b/src/Network/Network/help/New-AzNetworkInterfaceIpConfig.md index c6f359ad8f57..c17b9a5c1b83 100644 --- a/src/Network/Network/help/New-AzNetworkInterfaceIpConfig.md +++ b/src/Network/Network/help/New-AzNetworkInterfaceIpConfig.md @@ -20,7 +20,7 @@ New-AzNetworkInterfaceIpConfig -Name [-PrivateIpAddressVersion [-LoadBalancerBackendAddressPool ] [-LoadBalancerInboundNatRule ] [-ApplicationGatewayBackendAddressPool ] [-ApplicationSecurityGroup ] [-GatewayLoadBalancerId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId @@ -28,7 +28,8 @@ New-AzNetworkInterfaceIpConfig -Name [-PrivateIpAddressVersion New-AzNetworkInterfaceIpConfig -Name [-PrivateIpAddressVersion ] [-PrivateIpAddress ] [-Primary] [-SubnetId ] [-PublicIpAddressId ] [-LoadBalancerBackendAddressPoolId ] [-LoadBalancerInboundNatRuleId ] [-ApplicationGatewayBackendAddressPoolId ] - [-ApplicationSecurityGroupId ] [-DefaultProfile ] [] + [-ApplicationSecurityGroupId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -293,6 +294,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies a **PublicIPAddress** object. This cmdlet creates a reference to a public IP Address to associate with this network interface IP configuration. diff --git a/src/Network/Network/help/New-AzNetworkManager.md b/src/Network/Network/help/New-AzNetworkManager.md index 3b77d3e17276..115202884c7f 100644 --- a/src/Network/Network/help/New-AzNetworkManager.md +++ b/src/Network/Network/help/New-AzNetworkManager.md @@ -16,7 +16,8 @@ Creates a network manager. New-AzNetworkManager -Name -ResourceGroupName -Location [-Description ] [-Tag ] -NetworkManagerScope -NetworkManagerScopeAccess [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -236,6 +237,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerAddressPrefixItem.md b/src/Network/Network/help/New-AzNetworkManagerAddressPrefixItem.md index 239baf96eeb8..725ab0bda53f 100644 --- a/src/Network/Network/help/New-AzNetworkManagerAddressPrefixItem.md +++ b/src/Network/Network/help/New-AzNetworkManagerAddressPrefixItem.md @@ -14,7 +14,7 @@ Creates a network manager address prefix item. ``` New-AzNetworkManagerAddressPrefixItem -AddressPrefix -AddressPrefixType - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -96,6 +96,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzNetworkManagerConnectivityConfiguration.md b/src/Network/Network/help/New-AzNetworkManagerConnectivityConfiguration.md index bc0ec22bc987..3b2c8f86cf77 100644 --- a/src/Network/Network/help/New-AzNetworkManagerConnectivityConfiguration.md +++ b/src/Network/Network/help/New-AzNetworkManagerConnectivityConfiguration.md @@ -16,8 +16,8 @@ Creates a network manager connectivity configuration. New-AzNetworkManagerConnectivityConfiguration -Name -NetworkManagerName -ResourceGroupName -AppliesToGroup -ConnectivityTopology [-Description ] [-Hub ] [-DeleteExistingPeering] - [-IsGlobal] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-IsGlobal] [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -286,6 +286,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerConnectivityGroupItem.md b/src/Network/Network/help/New-AzNetworkManagerConnectivityGroupItem.md index 24940ef311ad..4fec90aca96f 100644 --- a/src/Network/Network/help/New-AzNetworkManagerConnectivityGroupItem.md +++ b/src/Network/Network/help/New-AzNetworkManagerConnectivityGroupItem.md @@ -14,7 +14,8 @@ Creates a connectivity group item. ``` New-AzNetworkManagerConnectivityGroupItem -NetworkGroupId [-UseHubGateway] - [-GroupConnectivity ] [-IsGlobal] [-DefaultProfile ] [] + [-GroupConnectivity ] [-IsGlobal] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -113,6 +114,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -UseHubGateway Use hub gateway flag diff --git a/src/Network/Network/help/New-AzNetworkManagerGroup.md b/src/Network/Network/help/New-AzNetworkManagerGroup.md index 4064dcf308d7..8eeffcbd3514 100644 --- a/src/Network/Network/help/New-AzNetworkManagerGroup.md +++ b/src/Network/Network/help/New-AzNetworkManagerGroup.md @@ -15,7 +15,7 @@ Creates a network manager group. ``` New-AzNetworkManagerGroup -Name -NetworkManagerName -ResourceGroupName [-Description ] [-IfMatch ] [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -157,6 +157,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerHub.md b/src/Network/Network/help/New-AzNetworkManagerHub.md index 1a693c066fa7..e0e4d6156b29 100644 --- a/src/Network/Network/help/New-AzNetworkManagerHub.md +++ b/src/Network/Network/help/New-AzNetworkManagerHub.md @@ -14,7 +14,7 @@ Creates a network manager hub. ``` New-AzNetworkManagerHub -ResourceId -ResourceType [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -52,6 +52,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource Id diff --git a/src/Network/Network/help/New-AzNetworkManagerManagementGroupConnection.md b/src/Network/Network/help/New-AzNetworkManagerManagementGroupConnection.md index cd5706509019..2645cc02b7de 100644 --- a/src/Network/Network/help/New-AzNetworkManagerManagementGroupConnection.md +++ b/src/Network/Network/help/New-AzNetworkManagerManagementGroupConnection.md @@ -15,7 +15,8 @@ Creates a network manager management group connection. ``` New-AzNetworkManagerManagementGroupConnection -ManagementGroupId -Name -NetworkManagerId [-Description ] [-AsJob] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -153,6 +154,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzNetworkManagerScope.md b/src/Network/Network/help/New-AzNetworkManagerScope.md index dea74857737c..92f6163681aa 100644 --- a/src/Network/Network/help/New-AzNetworkManagerScope.md +++ b/src/Network/Network/help/New-AzNetworkManagerScope.md @@ -14,7 +14,7 @@ Creates a network manager scope. ``` New-AzNetworkManagerScope [-ManagementGroup ] [-Subscription ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -69,6 +69,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subscription Subscription Lists in Network Manager Scope diff --git a/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md index 6558a51a0002..ec6824c69bac 100644 --- a/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/New-AzNetworkManagerScopeConnection.md @@ -15,7 +15,8 @@ Creates a scope connection. ``` New-AzNetworkManagerScopeConnection -Name -NetworkManagerName -ResourceGroupName -TenantId -ResourceId [-Description ] [-AsJob] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -173,6 +174,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerSecurityAdminConfiguration.md b/src/Network/Network/help/New-AzNetworkManagerSecurityAdminConfiguration.md index 2da0122c34f4..6fc2e5577cb0 100644 --- a/src/Network/Network/help/New-AzNetworkManagerSecurityAdminConfiguration.md +++ b/src/Network/Network/help/New-AzNetworkManagerSecurityAdminConfiguration.md @@ -16,7 +16,8 @@ Creates a security admin configuration. New-AzNetworkManagerSecurityAdminConfiguration -Name -NetworkManagerName -ResourceGroupName [-Description ] [-ApplyOnNetworkIntentPolicyBasedService ] [-DeleteExistingNSG] - [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -213,6 +214,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRule.md b/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRule.md index 4845635b70f8..bee5b177cab2 100644 --- a/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRule.md +++ b/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRule.md @@ -20,15 +20,16 @@ New-AzNetworkManagerSecurityAdminRule -Name -RuleCollectionName ] [-DestinationAddressPrefix ] [-SourcePortRange ] [-DestinationPortRange ] -Priority [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### Default ``` New-AzNetworkManagerSecurityAdminRule -Name -RuleCollectionName -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName - -Flag [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -Flag [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -276,6 +277,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol of Rule. diff --git a/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRuleCollection.md b/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRuleCollection.md index 6206bb5a1934..a1482c41fcc1 100644 --- a/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRuleCollection.md +++ b/src/Network/Network/help/New-AzNetworkManagerSecurityAdminRuleCollection.md @@ -16,7 +16,8 @@ Creates a security admin rule collection. New-AzNetworkManagerSecurityAdminRuleCollection -Name -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName [-Description ] -AppliesToGroup [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -166,6 +167,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerSecurityGroupItem.md b/src/Network/Network/help/New-AzNetworkManagerSecurityGroupItem.md index 06f99f13c8fc..b9a5284f8b17 100644 --- a/src/Network/Network/help/New-AzNetworkManagerSecurityGroupItem.md +++ b/src/Network/Network/help/New-AzNetworkManagerSecurityGroupItem.md @@ -14,7 +14,7 @@ Creates a security group item. ``` New-AzNetworkManagerSecurityGroupItem -NetworkGroupId [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -67,6 +67,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzNetworkManagerStaticMember.md b/src/Network/Network/help/New-AzNetworkManagerStaticMember.md index 0fccebf01485..a6e8fd678559 100644 --- a/src/Network/Network/help/New-AzNetworkManagerStaticMember.md +++ b/src/Network/Network/help/New-AzNetworkManagerStaticMember.md @@ -15,7 +15,7 @@ Creates a network manager static member. ``` New-AzNetworkManagerStaticMember -Name -NetworkManagerName -NetworkGroupName -ResourceGroupName -ResourceId [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -143,6 +143,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkManagerSubscriptionConnection.md b/src/Network/Network/help/New-AzNetworkManagerSubscriptionConnection.md index 58971a1d73ad..284045c01107 100644 --- a/src/Network/Network/help/New-AzNetworkManagerSubscriptionConnection.md +++ b/src/Network/Network/help/New-AzNetworkManagerSubscriptionConnection.md @@ -14,7 +14,8 @@ Creates a network manager subscription connection. ``` New-AzNetworkManagerSubscriptionConnection -Name -NetworkManagerId [-Description ] - [-AsJob] [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -135,6 +136,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzNetworkProfile.md b/src/Network/Network/help/New-AzNetworkProfile.md index 9dc8f80760c2..390bef8f6e15 100644 --- a/src/Network/Network/help/New-AzNetworkProfile.md +++ b/src/Network/Network/help/New-AzNetworkProfile.md @@ -15,7 +15,8 @@ Creates a new network profile. ``` New-AzNetworkProfile -ResourceGroupName -Name [-Location ] [-Tag ] [-ContainerNicConfig ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -133,6 +134,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the network profile. diff --git a/src/Network/Network/help/New-AzNetworkSecurityGroup.md b/src/Network/Network/help/New-AzNetworkSecurityGroup.md index c864cbf27b0a..f900a34cc0e7 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityGroup.md +++ b/src/Network/Network/help/New-AzNetworkSecurityGroup.md @@ -16,7 +16,8 @@ Creates a network security group. ``` New-AzNetworkSecurityGroup -Name -ResourceGroupName -Location [-FlushConnection] [-SecurityRules ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -149,6 +150,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of a resource group. This cmdlet creates a network security group in the resource group that this parameter specifies. diff --git a/src/Network/Network/help/New-AzNetworkSecurityPerimeter.md b/src/Network/Network/help/New-AzNetworkSecurityPerimeter.md index 505fc6e5d30b..005b046ad562 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityPerimeter.md +++ b/src/Network/Network/help/New-AzNetworkSecurityPerimeter.md @@ -15,33 +15,36 @@ Create a Network Security Perimeter. ### CreateExpanded (Default) ``` New-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] - [-Location ] [-SecurityPerimeterId ] [-Tag ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-Location ] [-SecurityPerimeterId ] [-Tag ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonString ``` New-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] - -JsonString [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -JsonString [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### CreateViaJsonFilePath ``` New-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] - -JsonFilePath [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -JsonFilePath [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### Create ``` New-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] - -Parameter [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -Parameter [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityExpanded ``` New-AzNetworkSecurityPerimeter -InputObject [-Location ] - [-SecurityPerimeterId ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-SecurityPerimeterId ] [-Tag ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -49,16 +52,32 @@ Create a Network Security Perimeter. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Creates a NetworkSecurityPerimeter +```powershell New-AzNetworkSecurityPerimeter -ResourceGroupName ResourceGroup-1 -Name nsp1 -Location eastus2euap ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- +eastus2euap nsp1 ``` + +Creates a NetworkSecurityPerimeter + +### Example 2: Creates a NetworkSecurityPerimeter +```powershell New-AzNetworkSecurityPerimeter -ResourceGroupName ResourceGroup-1 -Name nsp2 -Location eastus2euap ``` +```output +Location Name +-------- ---- +eastus2euap nsp2 +``` + +Creates a NetworkSecurityPerimeter + ## PARAMETERS ### -DefaultProfile @@ -66,7 +85,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -79,10 +98,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityExpanded Aliases: @@ -97,7 +115,7 @@ Accept wildcard characters: False Path of Json file supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonFilePath Aliases: @@ -112,7 +130,7 @@ Accept wildcard characters: False Json string supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonString Aliases: @@ -127,7 +145,7 @@ Accept wildcard characters: False Resource location. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityExpanded Aliases: @@ -142,7 +160,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: NetworkSecurityPerimeterName, SecurityPerimeterName, NSPName @@ -155,10 +173,9 @@ Accept wildcard characters: False ### -Parameter The Network Security Perimeter resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeter +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter Parameter Sets: Create Aliases: @@ -169,11 +186,26 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: @@ -188,7 +220,7 @@ Accept wildcard characters: False Resource ID. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityExpanded Aliases: Id @@ -204,13 +236,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -219,7 +251,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: CreateExpanded, CreateViaIdentityExpanded Aliases: @@ -234,7 +266,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -250,7 +282,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -267,36 +299,13 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -PARAMETER \: The Network Security Perimeter resource - \[Id \\]: Resource ID. - \[Location \\]: Resource location. - \[Tag \\]: Resource tags. - \[(Any) \\]: This indicates any property can be added to this object. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeter](https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeter) - diff --git a/src/Network/Network/help/New-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/Network/help/New-AzNetworkSecurityPerimeterAccessRule.md index 111129bfb45c..fe8639513b1f 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/Network/help/New-AzNetworkSecurityPerimeterAccessRule.md @@ -17,38 +17,39 @@ Create a network access rule. New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] - [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] [-ServiceTag ] + [-Subscription ] [-Tag ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonString ``` New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -JsonString [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonFilePath ``` New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -JsonFilePath [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityProfileExpanded ``` New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileInputObject [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] - [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] [-ServiceTag ] + [-Subscription ] [-Tag ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityProfile ``` New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileInputObject - -Parameter [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -Parameter [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeterExpanded @@ -56,32 +57,32 @@ New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileInputObject -ProfileName -NetworkSecurityPerimeterInputObject [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] - [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] [-ServiceTag ] + [-Subscription ] [-Tag ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeter ``` New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -NetworkSecurityPerimeterInputObject -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### Create ``` New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityExpanded ``` New-AzNetworkSecurityPerimeterAccessRule -InputObject [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] - [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] [-ServiceTag ] + [-Subscription ] [-Tag ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -89,24 +90,40 @@ Create a network access rule. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Creates a NetworkSecurityPerimeterAccessRule +```powershell New-AzNetworkSecurityPerimeterAccessRule -Name accessRule1 -ProfileName profile2 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -AddressPrefix '10.10.0.0/16' -Direction 'Inbound' -Location eastus2euap ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- + accessRule1 ``` + +Creates a NetworkSecurityPerimeterAccessRule + +### Example 2: Creates a NetworkSecurityPerimeterAccessRule +```powershell $emails = @("test123@microsoft.com", "test321@microsoft.com") New-AzNetworkSecurityPerimeterAccessRule -Name accessRule2 -ProfileName profile2 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -EmailAddress $emails -Direction 'Outbound' -Location eastus2euap ``` +```output +Location Name +-------- ---- + accessRule2 +``` + +Creates a NetworkSecurityPerimeterAccessRule + ## PARAMETERS ### -AccessRuleId Resource ID. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: Id @@ -121,7 +138,7 @@ Accept wildcard characters: False Inbound address prefixes (IPv4/IPv6) ```yaml -Type: String[] +Type: System.String[] Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -137,7 +154,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -152,7 +169,7 @@ Accept wildcard characters: False Direction that specifies whether the access rules is inbound/outbound. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -167,7 +184,7 @@ Accept wildcard characters: False Outbound rules email address format. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -182,7 +199,7 @@ Accept wildcard characters: False Outbound rules fully qualified domain name format. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -195,10 +212,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityExpanded Aliases: @@ -213,7 +229,7 @@ Accept wildcard characters: False Path of Json file supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonFilePath Aliases: @@ -228,7 +244,7 @@ Accept wildcard characters: False Json string supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonString Aliases: @@ -243,7 +259,7 @@ Accept wildcard characters: False Resource location. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -258,7 +274,7 @@ Accept wildcard characters: False The name of the NSP access rule. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, CreateViaIdentityProfileExpanded, CreateViaIdentityProfile, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: AccessRuleName @@ -271,10 +287,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter Aliases: @@ -287,10 +302,9 @@ Accept wildcard characters: False ### -Parameter The NSP access rule resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml -Type: INspAccessRule +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule Parameter Sets: CreateViaIdentityProfile, CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: @@ -305,7 +319,7 @@ Accept wildcard characters: False Outbound rules phone number format. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -318,10 +332,9 @@ Accept wildcard characters: False ### -ProfileInputObject Identity Parameter -To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityProfileExpanded, CreateViaIdentityProfile Aliases: @@ -336,7 +349,7 @@ Accept wildcard characters: False The name of the NSP profile. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: SecurityPerimeterProfileName, NSPProfileName @@ -347,11 +360,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: @@ -366,7 +394,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: NetworkSecurityPerimeterName, NSPName @@ -377,12 +405,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ServiceTag +Inbound rules service tag names. + +```yaml +Type: System.String[] +Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subscription List of subscription ids -To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ```yaml -Type: ISubscriptionId[] +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[] Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -398,13 +440,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -413,7 +455,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: CreateExpanded, CreateViaIdentityProfileExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -428,7 +470,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -444,7 +486,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -461,72 +503,13 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity -### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule -## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## OUTPUTS -PARAMETER \: The NSP access rule resource - \[Id \\]: Resource ID. - \[Location \\]: Resource location. - \[Tag \\]: Resource tags. - \[(Any) \\]: This indicates any property can be added to this object. - \[AddressPrefix \\>\]: Inbound address prefixes (IPv4/IPv6) - \[Direction \\]: Direction that specifies whether the access rules is inbound/outbound. - \[EmailAddress \\>\]: Outbound rules email address format. - \[FullyQualifiedDomainName \\>\]: Outbound rules fully qualified domain name format. - \[PhoneNumber \\>\]: Outbound rules phone number format. - \[Subscription \\>\]: List of subscription ids - \[Id \\]: Subscription id in the ARM id format. - -PROFILEINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule -SUBSCRIPTION \: List of subscription ids - \[Id \\]: Subscription id in the ARM id format. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeteraccessrule](https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeteraccessrule) - diff --git a/src/Network/Network/help/New-AzNetworkSecurityPerimeterAssociation.md b/src/Network/Network/help/New-AzNetworkSecurityPerimeterAssociation.md index fa4780914770..b4bc20903f27 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/Network/help/New-AzNetworkSecurityPerimeterAssociation.md @@ -17,21 +17,21 @@ Create a NSP resource association. New-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-AccessMode ] [-AssociationId ] [-Location ] [-PrivateLinkResourceId ] [-ProfileId ] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonString ``` New-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -JsonString [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonFilePath ``` New-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -JsonFilePath [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeterExpanded @@ -39,29 +39,30 @@ New-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName -NetworkSecurityPerimeterInputObject [-AccessMode ] [-AssociationId ] [-Location ] [-PrivateLinkResourceId ] [-ProfileId ] - [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Tag ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### CreateViaIdentityNetworkSecurityPerimeter ``` New-AzNetworkSecurityPerimeterAssociation -Name -NetworkSecurityPerimeterInputObject -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### Create ``` New-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityExpanded ``` New-AzNetworkSecurityPerimeterAssociation -InputObject [-AccessMode ] [-AssociationId ] [-Location ] [-PrivateLinkResourceId ] - [-ProfileId ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-ProfileId ] [-Tag ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -69,20 +70,28 @@ Create a NSP resource association. ## EXAMPLES -### EXAMPLE 1 +### Example 1: Creates a NetworkSecurityPerimeterAccessAssociation +```powershell +$profileId = '/subscriptions//resourceGroups/ResourceGroup-1/providers/Microsoft.Network/networkSecurityPerimeters/nsp3/profiles/profile2' + $privateLinkResourceId = '/subscriptions//resourceGroups/ResourceGroup-1/providers/Microsoft.KeyVault/vaults/rp4' + New-AzNetworkSecurityPerimeterAssociation -Name association1 -SecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 -Location eastus2euap -AccessMode Learning -ProfileId $profileId -PrivateLinkResourceId $privateLinkResourceId ``` -/resourceGroups/ResourceGroup-1/providers/Microsoft.Network/networkSecurityPerimeters/nsp3/profiles/profile2' -$privateLinkResourceId = '/subscriptions//resourceGroups/ResourceGroup-1/providers/Microsoft.KeyVault/vaults/rp4' -New-AzNetworkSecurityPerimeterAssociation -Name association1 -SecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 -Location eastus2euap -AccessMode Learning -ProfileId $profileId -PrivateLinkResourceId $privateLinkResourceId + +```output +Location Name +-------- ---- + association1 ``` +Creates a NetworkSecurityPerimeterAccessAssociation + ## PARAMETERS ### -AccessMode Access mode on the association. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -97,7 +106,7 @@ Accept wildcard characters: False Resource ID. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: Id @@ -113,7 +122,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -126,10 +135,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityExpanded Aliases: @@ -144,7 +152,7 @@ Accept wildcard characters: False Path of Json file supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonFilePath Aliases: @@ -159,7 +167,7 @@ Accept wildcard characters: False Json string supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonString Aliases: @@ -174,7 +182,7 @@ Accept wildcard characters: False Resource location. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -189,7 +197,7 @@ Accept wildcard characters: False The name of the NSP association. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: AssociationName @@ -202,10 +210,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter Aliases: @@ -218,10 +225,9 @@ Accept wildcard characters: False ### -Parameter The NSP resource association resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml -Type: INspAssociation +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation Parameter Sets: CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: @@ -236,7 +242,7 @@ Accept wildcard characters: False Resource ID. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -251,7 +257,7 @@ Accept wildcard characters: False Resource ID. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -262,11 +268,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: @@ -281,7 +302,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: NetworkSecurityPerimeterName, NSPName @@ -297,13 +318,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -312,7 +333,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -327,7 +348,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -343,7 +364,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -360,52 +381,13 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. - -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -PARAMETER \: The NSP resource association resource - \[Id \\]: Resource ID. - \[Location \\]: Resource location. - \[Tag \\]: Resource tags. - \[(Any) \\]: This indicates any property can be added to this object. - \[AccessMode \\]: Access mode on the association. - \[PrivateLinkResourceId \\]: Resource ID. - \[ProfileId \\]: Resource ID. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterassociation](https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterassociation) - diff --git a/src/Network/Network/help/New-AzNetworkSecurityPerimeterLink.md b/src/Network/Network/help/New-AzNetworkSecurityPerimeterLink.md index e39c42660218..5e4d0438260b 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/Network/help/New-AzNetworkSecurityPerimeterLink.md @@ -16,22 +16,22 @@ Create NSP link resource. ``` New-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-AutoApprovedRemotePerimeterResourceId ] [-Description ] - [-LocalInboundProfile ] [-RemoteInboundProfile ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-LocalInboundProfile ] [-RemoteInboundProfile ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonString ``` New-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -SecurityPerimeterName - [-SubscriptionId ] -JsonString [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-SubscriptionId ] -JsonString [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonFilePath ``` New-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -SecurityPerimeterName - [-SubscriptionId ] -JsonFilePath [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-SubscriptionId ] -JsonFilePath [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeterExpanded @@ -39,28 +39,30 @@ New-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -S New-AzNetworkSecurityPerimeterLink -Name -NetworkSecurityPerimeterInputObject [-AutoApprovedRemotePerimeterResourceId ] [-Description ] [-LocalInboundProfile ] - [-RemoteInboundProfile ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RemoteInboundProfile ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeter ``` New-AzNetworkSecurityPerimeterLink -Name -NetworkSecurityPerimeterInputObject -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### Create ``` New-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -SecurityPerimeterName - [-SubscriptionId ] -Parameter [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-SubscriptionId ] -Parameter [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityExpanded ``` New-AzNetworkSecurityPerimeterLink -InputObject [-AutoApprovedRemotePerimeterResourceId ] [-Description ] [-LocalInboundProfile ] - [-RemoteInboundProfile ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RemoteInboundProfile ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -68,18 +70,34 @@ Create NSP link resource. ## EXAMPLES -### EXAMPLE 1 -``` -/resourceGroups/psrg_ex/providers/Microsoft.Network/networkSecurityPerimeters/nsp7" +### Example 1: Create network security perimeter link +```powershell +$remoteNsp = "/subscriptions//resourceGroups/psrg_ex/providers/Microsoft.Network/networkSecurityPerimeters/nsp7" New-AzNetworkSecurityPerimeterLink -Name exlink3 -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp6 -AutoApprovedRemotePerimeterResourceId $remoteNsp -LocalInboundProfile @('*') -RemoteInboundProfile @('*') ``` -### EXAMPLE 2 +```output +Etag Name +---- ---- + exlink3 ``` -/resourceGroups/psrg_ex/providers/Microsoft.Network/networkSecurityPerimeters/nsp7" + +Create network security perimeter link + +### Example 2: Create network security perimeter link +```powershell +$remoteNsp = "/subscriptions//resourceGroups/psrg_ex/providers/Microsoft.Network/networkSecurityPerimeters/nsp7" New-AzNetworkSecurityPerimeterLink -Name exlink4 -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp6 -AutoApprovedRemotePerimeterResourceId $remoteNsp -LocalInboundProfile @('*') -RemoteInboundProfile @('*') ``` +```output +Etag Name +---- ---- + exlink4 +``` + +Create network security perimeter link + ## PARAMETERS ### -AutoApprovedRemotePerimeterResourceId @@ -87,7 +105,7 @@ Perimeter ARM Id for the remote NSP with which the link gets created in Auto-app It should be used when the NSP admin have Microsoft.Network/networkSecurityPerimeters/linkPerimeter/action permission on the remote NSP resource. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -103,7 +121,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -120,7 +138,7 @@ In case of Auto-approved flow, it is default to 'Auto Approved'. Restricted to 140 chars. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -133,10 +151,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityExpanded Aliases: @@ -151,7 +168,7 @@ Accept wildcard characters: False Path of Json file supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonFilePath Aliases: @@ -166,7 +183,7 @@ Accept wildcard characters: False Json string supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonString Aliases: @@ -179,11 +196,10 @@ Accept wildcard characters: False ### -LocalInboundProfile Local Inbound profile names to which Inbound is allowed. -Use \['*'\] to allow inbound to all profiles. -It's default value is \['*'\]. +Use ['*'] to allow inbound to all profiles. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -198,7 +214,7 @@ Accept wildcard characters: False The name of the NSP link. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: LinkName @@ -211,10 +227,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter Aliases: @@ -227,10 +242,9 @@ Accept wildcard characters: False ### -Parameter The network security perimeter link resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml -Type: INspLink +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink Parameter Sets: CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: @@ -241,14 +255,28 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RemoteInboundProfile Remote Inbound profile names to which Inbound is allowed. -Use \['*'\] to allow inbound to all profiles. +Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. -It's default value is \['*'\]. ```yaml -Type: String[] +Type: System.String[] Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -263,7 +291,7 @@ Accept wildcard characters: False The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: @@ -278,7 +306,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: NetworkSecurityPerimeterName, NSPName @@ -294,13 +322,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -309,7 +337,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -325,7 +353,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -342,57 +370,13 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. - -PARAMETER \: The network security perimeter link resource - \[AutoApprovedRemotePerimeterResourceId \\]: Perimeter ARM Id for the remote NSP with which the link gets created in Auto-approval mode. -It should be used when the NSP admin have Microsoft.Network/networkSecurityPerimeters/linkPerimeter/action permission on the remote NSP resource. - \[Description \\]: A message passed to the owner of the remote NSP link resource with this connection request. -In case of Auto-approved flow, it is default to 'Auto Approved'. -Restricted to 140 chars. - \[LocalInboundProfile \\>\]: Local Inbound profile names to which Inbound is allowed. -Use \['*'\] to allow inbound to all profiles. -It's default value is \['*'\]. - \[RemoteInboundProfile \\>\]: Remote Inbound profile names to which Inbound is allowed. -Use \['*'\] to allow inbound to all profiles. -This property can only be updated in auto-approval mode. -It's default value is \['*'\]. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterlink](https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterlink) - diff --git a/src/Network/Network/help/New-AzNetworkSecurityPerimeterProfile.md b/src/Network/Network/help/New-AzNetworkSecurityPerimeterProfile.md index a578d1c1aba9..6414cdfc0115 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityPerimeterProfile.md +++ b/src/Network/Network/help/New-AzNetworkSecurityPerimeterProfile.md @@ -16,50 +16,51 @@ Create a network profile. ``` New-AzNetworkSecurityPerimeterProfile -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-Location ] [-ProfileId ] - [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Tag ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### CreateViaJsonString ``` New-AzNetworkSecurityPerimeterProfile -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -JsonString [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaJsonFilePath ``` New-AzNetworkSecurityPerimeterProfile -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -JsonFilePath [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeterExpanded ``` New-AzNetworkSecurityPerimeterProfile -Name -NetworkSecurityPerimeterInputObject [-Location ] - [-ProfileId ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-ProfileId ] [-Tag ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityNetworkSecurityPerimeter ``` New-AzNetworkSecurityPerimeterProfile -Name -NetworkSecurityPerimeterInputObject -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### Create ``` New-AzNetworkSecurityPerimeterProfile -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] -Parameter - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### CreateViaIdentityExpanded ``` New-AzNetworkSecurityPerimeterProfile -InputObject [-Location ] - [-ProfileId ] [-Tag ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-ProfileId ] [-Tag ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -67,16 +68,32 @@ Create a network profile. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Creates a NetworkSecurityPerimeterProfile +```powershell New-AzNetworkSecurityPerimeterProfile -Name profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- +eastus2euap profile1 ``` + +Creates a NetworkSecurityPerimeterProfile + +### Example 2: Creates a NetworkSecurityPerimeterProfile +```powershell New-AzNetworkSecurityPerimeterProfile -Name profile2 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 ``` +```output +Location Name +-------- ---- +eastus2euap profile2 +``` + +Creates a NetworkSecurityPerimeterProfile + ## PARAMETERS ### -DefaultProfile @@ -84,7 +101,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -97,10 +114,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityExpanded Aliases: @@ -115,7 +131,7 @@ Accept wildcard characters: False Path of Json file supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonFilePath Aliases: @@ -130,7 +146,7 @@ Accept wildcard characters: False Json string supplied to the Create operation ```yaml -Type: String +Type: System.String Parameter Sets: CreateViaJsonString Aliases: @@ -145,7 +161,7 @@ Accept wildcard characters: False Resource location. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -160,7 +176,7 @@ Accept wildcard characters: False The name of the NSP profile. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: ProfileName @@ -173,10 +189,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityNetworkSecurityPerimeter Aliases: @@ -189,10 +204,9 @@ Accept wildcard characters: False ### -Parameter The network security perimeter profile resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml -Type: INspProfile +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile Parameter Sets: CreateViaIdentityNetworkSecurityPerimeter, Create Aliases: @@ -207,7 +221,7 @@ Accept wildcard characters: False Resource ID. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: Id @@ -218,11 +232,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: @@ -237,7 +266,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: NetworkSecurityPerimeterName, NSPName @@ -253,13 +282,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: CreateExpanded, CreateViaJsonString, CreateViaJsonFilePath, Create Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -268,7 +297,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: CreateExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityExpanded Aliases: @@ -283,7 +312,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -299,7 +328,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -316,49 +345,13 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. - -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -PARAMETER \: The network security perimeter profile resource - \[Id \\]: Resource ID. - \[Location \\]: Resource location. - \[Tag \\]: Resource tags. - \[(Any) \\]: This indicates any property can be added to this object. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterprofile](https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterprofile) - diff --git a/src/Network/Network/help/New-AzNetworkSecurityRuleConfig.md b/src/Network/Network/help/New-AzNetworkSecurityRuleConfig.md index 5efa2b60688f..f3aea452fff4 100644 --- a/src/Network/Network/help/New-AzNetworkSecurityRuleConfig.md +++ b/src/Network/Network/help/New-AzNetworkSecurityRuleConfig.md @@ -19,7 +19,8 @@ New-AzNetworkSecurityRuleConfig -Name [-Description ] [-Protoco [-SourcePortRange ] [-DestinationPortRange ] [-SourceAddressPrefix ] [-DestinationAddressPrefix ] [-SourceApplicationSecurityGroup ] [-DestinationApplicationSecurityGroup ] [-Access ] [-Priority ] - [-Direction ] [-DefaultProfile ] [] + [-Direction ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResourceId @@ -28,7 +29,8 @@ New-AzNetworkSecurityRuleConfig -Name [-Description ] [-Protoco [-SourcePortRange ] [-DestinationPortRange ] [-SourceAddressPrefix ] [-DestinationAddressPrefix ] [-SourceApplicationSecurityGroupId ] [-DestinationApplicationSecurityGroupId ] [-Access ] [-Priority ] - [-Direction ] [-DefaultProfile ] [] + [-Direction ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -222,6 +224,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the network protocol that a new rule configuration applies to. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/New-AzNetworkVirtualAppliance.md b/src/Network/Network/help/New-AzNetworkVirtualAppliance.md index 1c41a2d875e0..0bf66912716d 100644 --- a/src/Network/Network/help/New-AzNetworkVirtualAppliance.md +++ b/src/Network/Network/help/New-AzNetworkVirtualAppliance.md @@ -18,9 +18,10 @@ New-AzNetworkVirtualAppliance -Name -ResourceGroupName -Locati -VirtualHubId -Sku -VirtualApplianceAsn [-Identity ] [-BootStrapConfigurationBlob ] [-CloudInitConfigurationBlob ] [-CloudInitConfiguration ] [-Tag ] [-Force] - [-AsJob] [-AdditionalNic ] [-InternetIngressIp ] + [-AsJob] [-AdditionalNic ] + [-InternetIngressIp ] [-NetworkProfile ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceIdParameterSet @@ -29,9 +30,10 @@ New-AzNetworkVirtualAppliance -ResourceId -Location -VirtualHu -Sku -VirtualApplianceAsn [-Identity ] [-BootStrapConfigurationBlob ] [-CloudInitConfigurationBlob ] [-CloudInitConfiguration ] [-Tag ] [-Force] [-AsJob] - [-AdditionalNic ] [-InternetIngressIp ] + [-AdditionalNic ] + [-InternetIngressIp ] [-NetworkProfile ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -73,6 +75,7 @@ $id2 = $pip2.Id $IngressIps=New-AzVirtualApplianceInternetIngressIpsProperty -InternetIngressPublicIpId $id1, $id2 $nva=New-AzNetworkVirtualAppliance -ResourceGroupName testrg -Name nva -Location eastus2 -VirtualApplianceAsn 65222 -VirtualHubId $hub.Id -Sku $sku -CloudInitConfiguration "echo Hello World!" -InternetIngressIp $IngressIps ``` + Creates a new Network Virtual Appliance resource in resource group: testrg with 2 Internet Ingress Public IPs attached to it. ### Example 4 @@ -231,28 +234,28 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` -### -NetworkProfile -The Network Profile to be attached to the Virtual Appliance. +### -Location +The public IP address location. ```yaml -Type: Microsoft.Azure.Commands.Network.Models.PSVirtualApplianceNetworkProfile +Type: System.String Parameter Sets: (All) Aliases: -Required: False +Required: True Position: Named Default value: None Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` -### -Location -The public IP address location. +### -Name +The resource name. ```yaml Type: System.String -Parameter Sets: (All) -Aliases: +Parameter Sets: ResourceNameParameterSet +Aliases: ResourceName Required: True Position: Named @@ -261,21 +264,36 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` -### -Name -The resource name. +### -NetworkProfile +The Network Profile to be attached to the Virtual Appliance. ```yaml -Type: System.String -Parameter Sets: ResourceNameParameterSet -Aliases: ResourceName +Type: Microsoft.Azure.Commands.Network.Models.PSVirtualApplianceNetworkProfile +Parameter Sets: (All) +Aliases: -Required: True +Required: False Position: Named Default value: None Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkWatcher.md b/src/Network/Network/help/New-AzNetworkWatcher.md index 97198ec0512c..6ad2d18d5ece 100644 --- a/src/Network/Network/help/New-AzNetworkWatcher.md +++ b/src/Network/Network/help/New-AzNetworkWatcher.md @@ -14,7 +14,8 @@ Creates a new Network Watcher resource. ``` New-AzNetworkWatcher -Name -ResourceGroupName -Location [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -87,6 +88,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitor.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitor.md index 538030a6c0ec..ea9a56ed040d 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitor.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitor.md @@ -17,8 +17,8 @@ Creates a connection monitor resource. New-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName -Name -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResource @@ -26,8 +26,8 @@ New-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGrou New-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceV2 @@ -35,7 +35,8 @@ New-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name < New-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name -TestGroup [-Output ] [-Note ] [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByNameV2 @@ -43,7 +44,8 @@ New-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name < New-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName -Name -TestGroup [-Output ] [-Note ] [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation @@ -51,7 +53,8 @@ New-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGrou New-AzNetworkWatcherConnectionMonitor -Location -Name -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocationV2 @@ -59,13 +62,15 @@ New-AzNetworkWatcherConnectionMonitor -Location -Name -SourceR New-AzNetworkWatcherConnectionMonitor -Location -Name -TestGroup [-Output ] [-Note ] [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByConnectionMonitorV2Object ``` New-AzNetworkWatcherConnectionMonitor -ConnectionMonitor [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -331,6 +336,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointObject.md index 3e6ffa174329..ffecdde218ac 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointObject.md @@ -15,7 +15,8 @@ Creates connection monitor endpoint. ### AzureVM ``` New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-AzureVM] -ResourceId - [-Address ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Address ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### AzureVNet @@ -23,27 +24,31 @@ New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-AzureVM] -R New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-AzureVNet] -ResourceId [-IncludeItem ] [-ExcludeItem ] [-CoverageLevel ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### AzureSubnet ``` New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-AzureSubnet] -ResourceId [-ExcludeItem ] [-CoverageLevel ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ExternalAddress ``` New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-ExternalAddress] -Address - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### MMAWorkspaceMachine ``` New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-MMAWorkspaceMachine] -ResourceId -Address [-IncludeItem ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### MMAWorkspaceNetwork @@ -51,7 +56,8 @@ New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-MMAWorkspac New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-MMAWorkspaceNetwork] -ResourceId -IncludeItem [-ExcludeItem ] [-CoverageLevel ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### AzureVMSS @@ -59,13 +65,15 @@ New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-MMAWorkspac New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-AzureVMSS] -ResourceId [-IncludeItem ] [-ExcludeItem ] [-CoverageLevel ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### AzureArcVM ``` New-AzNetworkWatcherConnectionMonitorEndpointObject -Name [-AzureArcVM] -ResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -331,6 +339,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Resource ID of the connection monitor endpoint. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointScopeItemObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointScopeItemObject.md index c93c34727e58..42dd7992f935 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointScopeItemObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorEndpointScopeItemObject.md @@ -14,7 +14,7 @@ Creates a connection monitor endpoint scope item. ``` New-AzNetworkWatcherConnectionMonitorEndpointScopeItemObject [-DefaultProfile ] - -Address [-WhatIf] [-Confirm] [] + -Address [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -59,6 +59,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorObject.md index 8d599724e515..0514cdeab161 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorObject.md @@ -17,7 +17,8 @@ Create a connection monitor V2 object. New-AzNetworkWatcherConnectionMonitorObject -NetworkWatcher -Name [-TestGroup ] [-Output ] [-Note ] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByName @@ -25,7 +26,8 @@ New-AzNetworkWatcherConnectionMonitorObject -NetworkWatcher - New-AzNetworkWatcherConnectionMonitorObject -NetworkWatcherName -ResourceGroupName -Name [-TestGroup ] [-Output ] [-Note ] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation @@ -33,7 +35,8 @@ New-AzNetworkWatcherConnectionMonitorObject -NetworkWatcherName -Resour New-AzNetworkWatcherConnectionMonitorObject -Location -Name [-TestGroup ] [-Output ] [-Note ] [-Tag ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -270,6 +273,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorOutputObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorOutputObject.md index ae4a0d0bbd97..b9b806c3d21e 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorOutputObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorOutputObject.md @@ -14,7 +14,8 @@ Create connection monitor output destination object. ``` New-AzNetworkWatcherConnectionMonitorOutputObject [-OutputType ] -WorkspaceResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -66,6 +67,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -WorkspaceResourceId Log analytics workspace resource ID. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject.md index 27f8ead9d789..a57c601cabc8 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject.md @@ -16,20 +16,21 @@ Create protocol configuration used to perform test evaluation over TCP, HTTP or ``` New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject [-TcpProtocol] -Port [-DisableTraceRoute] [-DestinationPortBehavior ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### HTTP ``` New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject [-HttpProtocol] [-Port ] [-Method ] [-Path ] [-RequestHeader ] [-ValidStatusCodeRange ] - [-PreferHTTPS] [-DefaultProfile ] [] + [-PreferHTTPS] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ICMP ``` New-AzNetworkWatcherConnectionMonitorProtocolConfigurationObject [-IcmpProtocol] [-DisableTraceRoute] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -209,6 +210,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RequestHeader The HTTP headers to transmit with the request. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestConfigurationObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestConfigurationObject.md index f418aec237d1..43f788f481b2 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestConfigurationObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestConfigurationObject.md @@ -16,8 +16,8 @@ Create a connection monitor test configuration. New-AzNetworkWatcherConnectionMonitorTestConfigurationObject -Name -TestFrequencySec -ProtocolConfiguration [-SuccessThresholdChecksFailedPercent ] [-SuccessThresholdRoundTripTimeMs ] - [-PreferredIPVersion ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-PreferredIPVersion ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -103,6 +103,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProtocolConfiguration The parameters used to perform test evaluation over some protocol. diff --git a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestGroupObject.md b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestGroupObject.md index ccfb2fa14bc2..4a8cf4aadb40 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestGroupObject.md +++ b/src/Network/Network/help/New-AzNetworkWatcherConnectionMonitorTestGroupObject.md @@ -17,7 +17,8 @@ New-AzNetworkWatcherConnectionMonitorTestGroupObject -Name -TestConfiguration -Source -Destination - [-Disable] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Disable] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -93,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Source List of source endpoints. diff --git a/src/Network/Network/help/New-AzNetworkWatcherFlowLog.md b/src/Network/Network/help/New-AzNetworkWatcherFlowLog.md index 637afd9bca1f..6d17697e59cb 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherFlowLog.md +++ b/src/Network/Network/help/New-AzNetworkWatcherFlowLog.md @@ -17,7 +17,8 @@ Create or update a flow log resource for the specified network security group. New-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -Name -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResource @@ -25,7 +26,8 @@ New-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -Name -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceWithTA @@ -34,7 +36,8 @@ New-AzNetworkWatcherFlowLog -NetworkWatcher -Name -T -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByNameWithTA @@ -43,15 +46,16 @@ New-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` New-AzNetworkWatcherFlowLog -Location -Name -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] - [-FormatVersion ] [-Tag ] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-FormatVersion ] [-Tag ] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByLocationWithTA @@ -60,7 +64,7 @@ New-AzNetworkWatcherFlowLog -Location -Name -TargetResourceId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -308,6 +312,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/New-AzNetworkWatcherNetworkConfigurationDiagnosticProfile.md b/src/Network/Network/help/New-AzNetworkWatcherNetworkConfigurationDiagnosticProfile.md index 35c425d4956e..cfdf8b2f652d 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherNetworkConfigurationDiagnosticProfile.md +++ b/src/Network/Network/help/New-AzNetworkWatcherNetworkConfigurationDiagnosticProfile.md @@ -16,7 +16,7 @@ This object is used to restrict the network configuration during a diagnostic se ``` New-AzNetworkWatcherNetworkConfigurationDiagnosticProfile -Direction -Protocol -Source -Destination -DestinationPort [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -127,6 +127,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol to be verified on. Accepted values are '*', TCP, UDP. diff --git a/src/Network/Network/help/New-AzNetworkWatcherPacketCapture.md b/src/Network/Network/help/New-AzNetworkWatcherPacketCapture.md index 6cb266720010..f13af0efeedb 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherPacketCapture.md +++ b/src/Network/Network/help/New-AzNetworkWatcherPacketCapture.md @@ -18,7 +18,8 @@ New-AzNetworkWatcherPacketCapture -NetworkWatcher -PacketCapt -TargetVirtualMachineId [-StorageAccountId ] [-StoragePath ] [-LocalFilePath ] [-BytesToCapturePerPacket ] [-TotalBytesPerSession ] [-TimeLimitInSeconds ] [-Filter ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByName @@ -27,7 +28,8 @@ New-AzNetworkWatcherPacketCapture -NetworkWatcherName -ResourceGroupNam -PacketCaptureName -TargetVirtualMachineId [-StorageAccountId ] [-StoragePath ] [-LocalFilePath ] [-BytesToCapturePerPacket ] [-TotalBytesPerSession ] [-TimeLimitInSeconds ] [-Filter ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation @@ -36,7 +38,8 @@ New-AzNetworkWatcherPacketCapture -Location -PacketCaptureName -TargetVirtualMachineId [-StorageAccountId ] [-StoragePath ] [-LocalFilePath ] [-BytesToCapturePerPacket ] [-TotalBytesPerSession ] [-TimeLimitInSeconds ] [-Filter ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -198,6 +201,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/New-AzNetworkWatcherPacketCaptureV2.md b/src/Network/Network/help/New-AzNetworkWatcherPacketCaptureV2.md index caef88d11316..e5637d4b2987 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherPacketCaptureV2.md +++ b/src/Network/Network/help/New-AzNetworkWatcherPacketCaptureV2.md @@ -18,7 +18,8 @@ New-AzNetworkWatcherPacketCaptureV2 -NetworkWatcher -Name ] [-StoragePath ] [-LocalFilePath ] [-BytesToCapturePerPacket ] [-TotalBytesPerSession ] [-TimeLimitInSecond ] [-Scope ] [-TargetType ] [-Filter ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByName @@ -27,7 +28,8 @@ New-AzNetworkWatcherPacketCaptureV2 -NetworkWatcherName -ResourceGroupN -TargetId [-StorageAccountId ] [-StoragePath ] [-LocalFilePath ] [-BytesToCapturePerPacket ] [-TotalBytesPerSession ] [-TimeLimitInSecond ] [-Scope ] [-TargetType ] [-Filter ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation @@ -36,7 +38,8 @@ New-AzNetworkWatcherPacketCaptureV2 -Location -Name -TargetId [-StorageAccountId ] [-StoragePath ] [-LocalFilePath ] [-BytesToCapturePerPacket ] [-TotalBytesPerSession ] [-TimeLimitInSecond ] [-Scope ] [-TargetType ] [-Filter ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -344,6 +347,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/New-AzNetworkWatcherProtocolConfiguration.md b/src/Network/Network/help/New-AzNetworkWatcherProtocolConfiguration.md index dcc093b8a373..f22931585544 100644 --- a/src/Network/Network/help/New-AzNetworkWatcherProtocolConfiguration.md +++ b/src/Network/Network/help/New-AzNetworkWatcherProtocolConfiguration.md @@ -14,7 +14,8 @@ Creates a new protocol configuration object. ``` New-AzNetworkWatcherProtocolConfiguration -Protocol [-Method ] [-Header ] - [-ValidStatusCode ] [-DefaultProfile ] [] + [-ValidStatusCode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol type diff --git a/src/Network/Network/help/New-AzO365PolicyProperty.md b/src/Network/Network/help/New-AzO365PolicyProperty.md index 648e4491cfb8..508ec5999f32 100644 --- a/src/Network/Network/help/New-AzO365PolicyProperty.md +++ b/src/Network/Network/help/New-AzO365PolicyProperty.md @@ -14,7 +14,7 @@ Create an office 365 traffic breakout policy object. ``` New-AzO365PolicyProperty [-Allow] [-Optimize] [-Default] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -91,6 +91,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzOffice365PolicyProperty.md b/src/Network/Network/help/New-AzOffice365PolicyProperty.md index 44917a4a2ae8..c980b2b0156f 100644 --- a/src/Network/Network/help/New-AzOffice365PolicyProperty.md +++ b/src/Network/Network/help/New-AzOffice365PolicyProperty.md @@ -14,7 +14,7 @@ Define a new Office 365 traffic breakout policy to be used with a Virtual Applia ``` New-AzOffice365PolicyProperty [-Allow] [-Optimize] [-Default] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -91,6 +91,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzP2sVpnGateway.md b/src/Network/Network/help/New-AzP2sVpnGateway.md index 325d599808b6..66239ca3f7d4 100644 --- a/src/Network/Network/help/New-AzP2sVpnGateway.md +++ b/src/Network/Network/help/New-AzP2sVpnGateway.md @@ -19,8 +19,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubNameByVpnServerConfigurationResourceId @@ -30,7 +30,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByVpnServerConfigurationObject @@ -40,8 +41,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByVpnServerConfigurationResourceId @@ -51,7 +52,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationObject @@ -61,7 +63,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationResourceId @@ -71,7 +74,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -258,6 +262,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/New-AzPacketCaptureFilterConfig.md b/src/Network/Network/help/New-AzPacketCaptureFilterConfig.md index dbc329c31a97..f9a90c05dee1 100644 --- a/src/Network/Network/help/New-AzPacketCaptureFilterConfig.md +++ b/src/Network/Network/help/New-AzPacketCaptureFilterConfig.md @@ -14,7 +14,8 @@ Creates a new packet capture filter object. ``` New-AzPacketCaptureFilterConfig [-Protocol ] [-RemoteIPAddress ] [-LocalIPAddress ] - [-LocalPort ] [-RemotePort ] [-DefaultProfile ] [] + [-LocalPort ] [-RemotePort ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -94,6 +95,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the Protocol to filter on. Acceptable values "TCP","UDP","Any" diff --git a/src/Network/Network/help/New-AzPacketCaptureScopeConfig.md b/src/Network/Network/help/New-AzPacketCaptureScopeConfig.md index 17ab557c48f6..bc46c0a2b186 100644 --- a/src/Network/Network/help/New-AzPacketCaptureScopeConfig.md +++ b/src/Network/Network/help/New-AzPacketCaptureScopeConfig.md @@ -14,7 +14,7 @@ Creates a new packet capture scope object. ``` New-AzPacketCaptureScopeConfig [-Include ] [-Exclude ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -105,6 +105,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzPrivateDnsZoneConfig.md b/src/Network/Network/help/New-AzPrivateDnsZoneConfig.md index 262f6516be19..f7d9a0b3c868 100644 --- a/src/Network/Network/help/New-AzPrivateDnsZoneConfig.md +++ b/src/Network/Network/help/New-AzPrivateDnsZoneConfig.md @@ -14,7 +14,7 @@ Creates DNS zone configuration of the private dns zone group. ``` New-AzPrivateDnsZoneConfig -Name [-PrivateDnsZoneId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzPrivateDnsZoneGroup.md b/src/Network/Network/help/New-AzPrivateDnsZoneGroup.md index 80791ffa3deb..036e64eed862 100644 --- a/src/Network/Network/help/New-AzPrivateDnsZoneGroup.md +++ b/src/Network/Network/help/New-AzPrivateDnsZoneGroup.md @@ -15,7 +15,8 @@ Creates a private DNS zone group in the specified private endpoint. ``` New-AzPrivateDnsZoneGroup -ResourceGroupName -PrivateEndpointName -Name -PrivateDnsZoneConfig - [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -137,6 +138,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. diff --git a/src/Network/Network/help/New-AzPrivateEndpoint.md b/src/Network/Network/help/New-AzPrivateEndpoint.md index cd4bc9f698a6..452a4f87373f 100644 --- a/src/Network/Network/help/New-AzPrivateEndpoint.md +++ b/src/Network/Network/help/New-AzPrivateEndpoint.md @@ -17,7 +17,8 @@ New-AzPrivateEndpoint -Name -ResourceGroupName -Location [-ByManualRequest] [-EdgeZone ] [-Tag ] [-Force] [-AsJob] [-ApplicationSecurityGroup ] [-IpConfiguration ] [-CustomNetworkInterfaceName ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -213,6 +214,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group. diff --git a/src/Network/Network/help/New-AzPrivateEndpointIpConfiguration.md b/src/Network/Network/help/New-AzPrivateEndpointIpConfiguration.md index 5d2ee5065a64..aedb021e0eea 100644 --- a/src/Network/Network/help/New-AzPrivateEndpointIpConfiguration.md +++ b/src/Network/Network/help/New-AzPrivateEndpointIpConfiguration.md @@ -14,7 +14,8 @@ Creates an IpConfiguration object for private endpoint. ``` New-AzPrivateEndpointIpConfiguration -Name [-GroupId ] [-MemberName ] - -PrivateIpAddress [-DefaultProfile ] [] + -PrivateIpAddress [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzPrivateLinkService.md b/src/Network/Network/help/New-AzPrivateLinkService.md index 229dfe26d3b2..f5c3dc0a4f45 100644 --- a/src/Network/Network/help/New-AzPrivateLinkService.md +++ b/src/Network/Network/help/New-AzPrivateLinkService.md @@ -17,7 +17,8 @@ New-AzPrivateLinkService -Name -ResourceGroupName -Location -IpConfiguration [-Visibility ] [-AutoApproval ] [-EnableProxyProtocol] [-EdgeZone ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -192,6 +193,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzPrivateLinkServiceConnection.md b/src/Network/Network/help/New-AzPrivateLinkServiceConnection.md index 0409c7d0a5a8..98cac8670620 100644 --- a/src/Network/Network/help/New-AzPrivateLinkServiceConnection.md +++ b/src/Network/Network/help/New-AzPrivateLinkServiceConnection.md @@ -16,13 +16,14 @@ Creates a private link service connection configuration. ``` New-AzPrivateLinkServiceConnection -Name -PrivateLinkService [-GroupId ] [-RequestMessage ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResourceId ``` New-AzPrivateLinkServiceConnection -Name -PrivateLinkServiceId [-GroupId ] - [-RequestMessage ] [-DefaultProfile ] [] + [-RequestMessage ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -125,6 +126,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RequestMessage The request message. diff --git a/src/Network/Network/help/New-AzPrivateLinkServiceIpConfig.md b/src/Network/Network/help/New-AzPrivateLinkServiceIpConfig.md index 6151f83fd590..211c4b7162d2 100644 --- a/src/Network/Network/help/New-AzPrivateLinkServiceIpConfig.md +++ b/src/Network/Network/help/New-AzPrivateLinkServiceIpConfig.md @@ -15,7 +15,7 @@ Create a private link service ip configuration. ``` New-AzPrivateLinkServiceIpConfig -Name [-PrivateIpAddressVersion ] [-PrivateIpAddress ] [-PublicIpAddress ] [-Subnet ] [-Primary] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -119,6 +119,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress PublicIpAddress diff --git a/src/Network/Network/help/New-AzPublicIpAddress.md b/src/Network/Network/help/New-AzPublicIpAddress.md index 5321c3302e65..5e706bb291af 100644 --- a/src/Network/Network/help/New-AzPublicIpAddress.md +++ b/src/Network/Network/help/New-AzPublicIpAddress.md @@ -19,8 +19,8 @@ New-AzPublicIpAddress [-Name ] -ResourceGroupName -Location ] [-DomainNameLabelScope ] [-IpTag ] [-PublicIpPrefix ] [-DdosProtectionMode ] [-DdosProtectionPlanId ] [-ReverseFqdn ] [-IdleTimeoutInMinutes ] [-Zone ] [-IpAddress ] - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -336,6 +336,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpPrefix Specifies the PSPublicIpPrefix from which to allocate the public IP address. diff --git a/src/Network/Network/help/New-AzPublicIpPrefix.md b/src/Network/Network/help/New-AzPublicIpPrefix.md index 0a88d0b94d45..5afe52991a7c 100644 --- a/src/Network/Network/help/New-AzPublicIpPrefix.md +++ b/src/Network/Network/help/New-AzPublicIpPrefix.md @@ -16,7 +16,8 @@ Creates a Public IP Prefix New-AzPublicIpPrefix -Name -ResourceGroupName -Location [-Sku ] [-Tier ] -PrefixLength [-IpAddressVersion ] [-IpTag ] [-Zone ] [-CustomIpPrefix ] [-EdgeZone ] [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -202,6 +203,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzPublicIpTag.md b/src/Network/Network/help/New-AzPublicIpTag.md index 55be58ea0bea..7bc7c4911f56 100644 --- a/src/Network/Network/help/New-AzPublicIpTag.md +++ b/src/Network/Network/help/New-AzPublicIpTag.md @@ -13,8 +13,8 @@ Creates an IP Tag. ## SYNTAX ``` -New-AzPublicIpTag -IpTagType -Tag [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +New-AzPublicIpTag -IpTagType -Tag [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -63,6 +63,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Tag IpTag value Example:/Sql diff --git a/src/Network/Network/help/New-AzRadiusServer.md b/src/Network/Network/help/New-AzRadiusServer.md index 3df0fba61bf3..a23d4c512fc2 100644 --- a/src/Network/Network/help/New-AzRadiusServer.md +++ b/src/Network/Network/help/New-AzRadiusServer.md @@ -14,7 +14,8 @@ Creates an external radius server configuration ``` New-AzRadiusServer -RadiusServerAddress -RadiusServerSecret - [-RadiusServerScore ] [-DefaultProfile ] [] + [-RadiusServerScore ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -48,6 +49,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RadiusServerAddress External radius server address diff --git a/src/Network/Network/help/New-AzRouteConfig.md b/src/Network/Network/help/New-AzRouteConfig.md index 65d4ab1eecf6..5872c78423c7 100644 --- a/src/Network/Network/help/New-AzRouteConfig.md +++ b/src/Network/Network/help/New-AzRouteConfig.md @@ -15,8 +15,8 @@ Creates a route for a route table. ``` New-AzRouteConfig [-Name ] [-AddressPrefix ] [-NextHopType ] - [-NextHopIpAddress ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-NextHopIpAddress ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -153,6 +153,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzRouteFilter.md b/src/Network/Network/help/New-AzRouteFilter.md index 8d5c8fc31b0c..d0e0fd59d51c 100644 --- a/src/Network/Network/help/New-AzRouteFilter.md +++ b/src/Network/Network/help/New-AzRouteFilter.md @@ -14,8 +14,8 @@ Creates a route filter. ``` New-AzRouteFilter -Name -ResourceGroupName -Location [-Rule ] - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -107,6 +107,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group in which this cmdlet creates a route filter. diff --git a/src/Network/Network/help/New-AzRouteFilterRuleConfig.md b/src/Network/Network/help/New-AzRouteFilterRuleConfig.md index f2d47054bb5c..2be81c1216c2 100644 --- a/src/Network/Network/help/New-AzRouteFilterRuleConfig.md +++ b/src/Network/Network/help/New-AzRouteFilterRuleConfig.md @@ -14,7 +14,8 @@ Creates a route filter rule for a route filter. ``` New-AzRouteFilterRuleConfig [-Force] -Name -Access -RouteFilterRuleType - -CommunityList [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -CommunityList [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilterRuleType Route Filter Rule Type. Valid values are: Community diff --git a/src/Network/Network/help/New-AzRouteMap.md b/src/Network/Network/help/New-AzRouteMap.md index 693feaf6f7c2..d493ead0a6c6 100644 --- a/src/Network/Network/help/New-AzRouteMap.md +++ b/src/Network/Network/help/New-AzRouteMap.md @@ -15,20 +15,22 @@ Create a route map to a VirtualHub. ### ByVirtualHubName (Default) ``` New-AzRouteMap [-ResourceGroupName ] [-VirtualHubName ] [-Name ] - [-RouteMapRule ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-RouteMapRule ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject ``` New-AzRouteMap [-VirtualHubObject ] [-Name ] [-RouteMapRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId ``` New-AzRouteMap [-VirtualHubResourceId ] [-Name ] [-RouteMapRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -206,6 +208,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzRouteMapRule.md b/src/Network/Network/help/New-AzRouteMapRule.md index c2863cac1db9..55010318d50f 100644 --- a/src/Network/Network/help/New-AzRouteMapRule.md +++ b/src/Network/Network/help/New-AzRouteMapRule.md @@ -14,8 +14,8 @@ Create a route map rule. ``` New-AzRouteMapRule [-MatchCriteria ] -RouteMapRuleAction - -NextStepIfMatched -Name [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -NextStepIfMatched -Name [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -124,6 +124,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteMapRuleAction The route map rule actions. diff --git a/src/Network/Network/help/New-AzRouteMapRuleAction.md b/src/Network/Network/help/New-AzRouteMapRuleAction.md index 9adbd268ccd8..bc4532304aeb 100644 --- a/src/Network/Network/help/New-AzRouteMapRuleAction.md +++ b/src/Network/Network/help/New-AzRouteMapRuleAction.md @@ -14,7 +14,8 @@ Create a route map rule action. ``` New-AzRouteMapRuleAction -Type [-Parameter ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -77,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Type The route map rule action type. diff --git a/src/Network/Network/help/New-AzRouteMapRuleActionParameter.md b/src/Network/Network/help/New-AzRouteMapRuleActionParameter.md index 3fe990405c0f..e2eb9f96e92d 100644 --- a/src/Network/Network/help/New-AzRouteMapRuleActionParameter.md +++ b/src/Network/Network/help/New-AzRouteMapRuleActionParameter.md @@ -14,7 +14,8 @@ Create a route map rule action parameter for the rule action. ``` New-AzRouteMapRuleActionParameter [-RoutePrefix ] [-Community ] [-AsPath ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -85,6 +86,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutePrefix Route Prefix diff --git a/src/Network/Network/help/New-AzRouteMapRuleCriterion.md b/src/Network/Network/help/New-AzRouteMapRuleCriterion.md index b3db252afd49..ad97738d69ab 100644 --- a/src/Network/Network/help/New-AzRouteMapRuleCriterion.md +++ b/src/Network/Network/help/New-AzRouteMapRuleCriterion.md @@ -14,7 +14,8 @@ Create a route map rule criterion. ``` New-AzRouteMapRuleCriterion -MatchCondition [-RoutePrefix ] [-Community ] - [-AsPath ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsPath ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -101,6 +102,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutePrefix Route Prefix diff --git a/src/Network/Network/help/New-AzRouteServer.md b/src/Network/Network/help/New-AzRouteServer.md index 74a7b469626a..eb36dc52a31f 100644 --- a/src/Network/Network/help/New-AzRouteServer.md +++ b/src/Network/Network/help/New-AzRouteServer.md @@ -16,7 +16,7 @@ Creates an Azure RouteServer. New-AzRouteServer -ResourceGroupName -RouteServerName -HostedSubnet [-PublicIpAddress ] -Location [-Tag ] [-Force] [-AsJob] [-HubRoutingPreference ] [-AllowBranchToBranchTraffic] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -144,6 +144,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress The public ip address of ip configuration. diff --git a/src/Network/Network/help/New-AzRouteTable.md b/src/Network/Network/help/New-AzRouteTable.md index f6d30c816459..4940c36e0b5f 100644 --- a/src/Network/Network/help/New-AzRouteTable.md +++ b/src/Network/Network/help/New-AzRouteTable.md @@ -15,8 +15,8 @@ Creates a route table. ``` New-AzRouteTable -ResourceGroupName -Name [-DisableBgpRoutePropagation] -Location - [-Tag ] [-Route ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-Tag ] [-Route ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -153,6 +153,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group in which this cmdlet creates a route table. diff --git a/src/Network/Network/help/New-AzRoutingConfiguration.md b/src/Network/Network/help/New-AzRoutingConfiguration.md index 58e48d2a4e25..f8069e0177bf 100644 --- a/src/Network/Network/help/New-AzRoutingConfiguration.md +++ b/src/Network/Network/help/New-AzRoutingConfiguration.md @@ -15,7 +15,8 @@ Creates a RoutingConfiguration object. ``` New-AzRoutingConfiguration -AssociatedRouteTable -Label -Id [-StaticRoute ] [-VnetLocalRouteOverrideCriteria ] [-InboundRouteMap ] - [-OutboundRouteMap ] [-DefaultProfile ] [] + [-OutboundRouteMap ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -155,6 +156,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StaticRoute List of routes that control routing from VirtualHub into a virtual network connection. diff --git a/src/Network/Network/help/New-AzRoutingIntent.md b/src/Network/Network/help/New-AzRoutingIntent.md index e1444652877e..dc338e27cf77 100644 --- a/src/Network/Network/help/New-AzRoutingIntent.md +++ b/src/Network/Network/help/New-AzRoutingIntent.md @@ -15,20 +15,22 @@ Creates a routing intent resource associated with a VirtualHub. ### ByVirtualHubName (Default) ``` New-AzRoutingIntent -ResourceGroupName -ParentResourceName -Name - -RoutingPolicy [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -RoutingPolicy [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject ``` New-AzRoutingIntent -ParentObject -Name -RoutingPolicy [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId ``` New-AzRoutingIntent -ParentResourceId -Name -RoutingPolicy [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -179,6 +181,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzRoutingPolicy.md b/src/Network/Network/help/New-AzRoutingPolicy.md index 56b36dcc019c..34b7a1ebd6bc 100644 --- a/src/Network/Network/help/New-AzRoutingPolicy.md +++ b/src/Network/Network/help/New-AzRoutingPolicy.md @@ -14,7 +14,8 @@ Returns an in-memory routing policy object. ``` New-AzRoutingPolicy -Destination -NextHop -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -100,6 +101,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzSaaSNetworkVirtualAppliance.md b/src/Network/Network/help/New-AzSaaSNetworkVirtualAppliance.md index 8deadeb930bd..fbbd4def4694 100644 --- a/src/Network/Network/help/New-AzSaaSNetworkVirtualAppliance.md +++ b/src/Network/Network/help/New-AzSaaSNetworkVirtualAppliance.md @@ -16,14 +16,15 @@ Create a SaaS Network Virtual Appliance resource. ``` New-AzSaaSNetworkVirtualAppliance -Name -ResourceGroupName -Location -VirtualHubId [-Tag ] [-Force] [-AsJob] -DelegatedServiceName - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceIdParameterSet ``` New-AzSaaSNetworkVirtualAppliance -ResourceId -Location -VirtualHubId [-Tag ] [-Force] [-AsJob] -DelegatedServiceName [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -131,6 +132,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzSecurityPartnerProvider.md b/src/Network/Network/help/New-AzSecurityPartnerProvider.md index f9b899a1c36d..8df36044dc3e 100644 --- a/src/Network/Network/help/New-AzSecurityPartnerProvider.md +++ b/src/Network/Network/help/New-AzSecurityPartnerProvider.md @@ -16,7 +16,7 @@ Creates an Azure SecurityPartnerProvider. New-AzSecurityPartnerProvider -Name -ResourceGroupName -Location -SecurityProviderName [-VirtualHub ] [-VirtualHubId ] [-VirtualHubName ] [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -106,6 +106,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzServiceEndpointPolicy.md b/src/Network/Network/help/New-AzServiceEndpointPolicy.md index f845b1562ca4..7adc7f106007 100644 --- a/src/Network/Network/help/New-AzServiceEndpointPolicy.md +++ b/src/Network/Network/help/New-AzServiceEndpointPolicy.md @@ -15,8 +15,8 @@ Creates a service endpoint policy. ``` New-AzServiceEndpointPolicy -Name [-ServiceEndpointPolicyDefinition ] -ResourceGroupName - -Location [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -Location [-Force] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -93,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzServiceEndpointPolicyDefinition.md b/src/Network/Network/help/New-AzServiceEndpointPolicyDefinition.md index 799aa26a91bf..38cc81d11790 100644 --- a/src/Network/Network/help/New-AzServiceEndpointPolicyDefinition.md +++ b/src/Network/Network/help/New-AzServiceEndpointPolicyDefinition.md @@ -14,7 +14,8 @@ Creates a service endpoint policy definition. ``` New-AzServiceEndpointPolicyDefinition -Name [-Description ] [-ServiceResource ] - [-Service ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Service ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -88,6 +89,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Service Name of the service diff --git a/src/Network/Network/help/New-AzStaticRoute.md b/src/Network/Network/help/New-AzStaticRoute.md index 27c816322d9b..0432806a5e15 100644 --- a/src/Network/Network/help/New-AzStaticRoute.md +++ b/src/Network/Network/help/New-AzStaticRoute.md @@ -14,7 +14,7 @@ Creates a StaticRoute object which can then be added to a RoutingConfiguration o ``` New-AzStaticRoute -Name -AddressPrefix -NextHopIpAddress - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -97,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVHubRoute.md b/src/Network/Network/help/New-AzVHubRoute.md index 01ef2482a6c9..d6923399f0f4 100644 --- a/src/Network/Network/help/New-AzVHubRoute.md +++ b/src/Network/Network/help/New-AzVHubRoute.md @@ -14,7 +14,8 @@ Creates a VHubRoute object which can be passed as parameter to the New-AzVHubRou ``` New-AzVHubRoute -Destination -DestinationType -NextHop -Name - -NextHopType [-DefaultProfile ] [] + -NextHopType [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -222,6 +223,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVHubRouteTable.md b/src/Network/Network/help/New-AzVHubRouteTable.md index d45165cb35a1..652b41439e6c 100644 --- a/src/Network/Network/help/New-AzVHubRouteTable.md +++ b/src/Network/Network/help/New-AzVHubRouteTable.md @@ -15,20 +15,22 @@ Creates a hub route table resource associated with a VirtualHub. ### ByVirtualHubName (Default) ``` New-AzVHubRouteTable -ResourceGroupName -ParentResourceName -Name - -Route -Label [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -Route -Label [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject ``` New-AzVHubRouteTable -ParentObject -Name -Route -Label - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId ``` New-AzVHubRouteTable -ParentResourceId -Name -Route -Label - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -184,6 +186,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVirtualApplianceAdditionalNicProperty.md b/src/Network/Network/help/New-AzVirtualApplianceAdditionalNicProperty.md index 816490ffb2c3..e162bf9f020e 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceAdditionalNicProperty.md +++ b/src/Network/Network/help/New-AzVirtualApplianceAdditionalNicProperty.md @@ -14,7 +14,8 @@ Define a Network Virtual Appliance Additional Nic Property for the resource. ``` New-AzVirtualApplianceAdditionalNicProperty -NicName -HasPublicIP [-AddressFamily ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -92,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/New-AzVirtualApplianceInboundSecurityRulesProperty.md b/src/Network/Network/help/New-AzVirtualApplianceInboundSecurityRulesProperty.md index 5771256687b3..63797fa1bb60 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceInboundSecurityRulesProperty.md +++ b/src/Network/Network/help/New-AzVirtualApplianceInboundSecurityRulesProperty.md @@ -13,9 +13,10 @@ Define Inbound Security Rules Property ## SYNTAX ``` -New-AzVirtualApplianceInboundSecurityRulesProperty -Name [-Protocol ] +New-AzVirtualApplianceInboundSecurityRulesProperty -Name -Protocol -SourceAddressPrefix [-DestinationPortRange ] [-DestinationPortRangeList ] - -AppliesOn [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -AppliesOn [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -115,6 +116,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Rule protocol @@ -122,9 +138,9 @@ Rule protocol Type: System.String Parameter Sets: (All) Aliases: -Accepted values: Tcp, Udp, * +Accepted values: Tcp, Udp -Required: False +Required: True Position: Named Default value: None Accept pipeline input: False diff --git a/src/Network/Network/help/New-AzVirtualApplianceInternetIngressIpsProperty.md b/src/Network/Network/help/New-AzVirtualApplianceInternetIngressIpsProperty.md index b0b9a4ce73ec..6092ff91d804 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceInternetIngressIpsProperty.md +++ b/src/Network/Network/help/New-AzVirtualApplianceInternetIngressIpsProperty.md @@ -13,8 +13,9 @@ Define a Network Virtual Appliance Internet Ingress IPs Property for the resourc ## SYNTAX ``` -New-AzVirtualApplianceInternetIngressIpsProperty -InternetIngressPublicIpId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] +New-AzVirtualApplianceInternetIngressIpsProperty -InternetIngressPublicIpId + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -57,7 +58,7 @@ Accept wildcard characters: False The IDs of the Public IPs which can be given as comma separated input. ```yaml -Type: System.String +Type: System.String[] Parameter Sets: (All) Aliases: @@ -68,6 +69,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. @@ -111,4 +127,6 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## NOTES -## RELATED LINKS \ No newline at end of file +## RELATED LINKS + +## RELATED LINKS diff --git a/src/Network/Network/help/New-AzVirtualApplianceIpConfiguration.md b/src/Network/Network/help/New-AzVirtualApplianceIpConfiguration.md index 306a24cf5166..73831bb9c9f5 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceIpConfiguration.md +++ b/src/Network/Network/help/New-AzVirtualApplianceIpConfiguration.md @@ -14,7 +14,8 @@ Defines an IP configuration for an interface of virtual appliance. ``` New-AzVirtualApplianceIpConfiguration -Name -Primary - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -26,12 +27,14 @@ The New-AzVirtualApplianceIpConfiguration command defines an IP configuration fo ```powershell $ipConfig1 = New-AzVirtualApplianceIpConfiguration -Name "publicnicipconfig" -Primary $true ``` + This command creates a new IP configuration with the name "publicnicipconfig" and sets it as the primary IP configuration. ### Example 2 ```powershell $ipConfig2 = New-AzVirtualApplianceIpConfiguration -Name "publicnicipconfig" -Primary $false ``` + This command creates a new IP configuration with the name "publicnicipconfig" and sets it as the secondary IP configuration. ## PARAMETERS @@ -40,7 +43,7 @@ This command creates a new IP configuration with the name "publicnicipconfig" an The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: IAzureContextContainer +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential @@ -55,7 +58,7 @@ Accept wildcard characters: False The name of the IP configuration. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -70,7 +73,7 @@ Accept wildcard characters: False Indicates whether this IP configuration is the primary one. ```yaml -Type: Boolean +Type: System.Boolean Parameter Sets: (All) Aliases: @@ -81,11 +84,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -101,7 +119,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi diff --git a/src/Network/Network/help/New-AzVirtualApplianceNetworkInterfaceConfiguration.md b/src/Network/Network/help/New-AzVirtualApplianceNetworkInterfaceConfiguration.md index 38fea9df4068..5318c81a3d5c 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceNetworkInterfaceConfiguration.md +++ b/src/Network/Network/help/New-AzVirtualApplianceNetworkInterfaceConfiguration.md @@ -14,8 +14,8 @@ Defines a Interface Configuration for Network Profile of Virtual Appliance. ``` New-AzVirtualApplianceNetworkInterfaceConfiguration -NicType - -IpConfiguration [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -IpConfiguration [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -47,7 +47,7 @@ Creating a new network interface configuration with nicType PrivateNic and IP co The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: IAzureContextContainer +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential @@ -62,7 +62,7 @@ Accept wildcard characters: False The IP configurations of the network interface configuration. ```yaml -Type: PSVirtualApplianceIpConfiguration[] +Type: Microsoft.Azure.Commands.Network.Models.PSVirtualApplianceIpConfiguration[] Parameter Sets: (All) Aliases: @@ -77,7 +77,7 @@ Accept wildcard characters: False The type of the network interface configuration. ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -88,11 +88,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -108,7 +123,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi diff --git a/src/Network/Network/help/New-AzVirtualApplianceNetworkProfile.md b/src/Network/Network/help/New-AzVirtualApplianceNetworkProfile.md index ffe2bec4e5a0..e3d3832b7511 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceNetworkProfile.md +++ b/src/Network/Network/help/New-AzVirtualApplianceNetworkProfile.md @@ -15,7 +15,8 @@ Define a Network Profile for virtual appliance. ``` New-AzVirtualApplianceNetworkProfile -NetworkInterfaceConfiguration - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -44,7 +45,7 @@ Creates a network profile object using two PSVirtualApplianceNetworkInterfaceCon The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: IAzureContextContainer +Type: Microsoft.Azure.Commands.Common.Authentication.Abstractions.Core.IAzureContextContainer Parameter Sets: (All) Aliases: AzContext, AzureRmContext, AzureCredential @@ -59,7 +60,7 @@ Accept wildcard characters: False The network interface configurations of the network profile. ```yaml -Type: PSVirtualApplianceNetworkInterfaceConfiguration[] +Type: Microsoft.Azure.Commands.Network.Models.PSVirtualApplianceNetworkInterfaceConfiguration[] Parameter Sets: (All) Aliases: @@ -70,11 +71,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -90,7 +106,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi diff --git a/src/Network/Network/help/New-AzVirtualApplianceSite.md b/src/Network/Network/help/New-AzVirtualApplianceSite.md index a271136c6e45..2ac785699e45 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceSite.md +++ b/src/Network/Network/help/New-AzVirtualApplianceSite.md @@ -16,14 +16,16 @@ Create a site connected to a Network Virtual Appliance. ``` New-AzVirtualApplianceSite -Name -ResourceGroupName -AddressPrefix -O365Policy -NetworkVirtualApplianceId [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceIdParameterSet ``` New-AzVirtualApplianceSite -ResourceId -AddressPrefix -O365Policy -NetworkVirtualApplianceId [-Tag ] [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -147,6 +149,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVirtualApplianceSkuProperty.md b/src/Network/Network/help/New-AzVirtualApplianceSkuProperty.md index 91c041af93cf..78a630f89e37 100644 --- a/src/Network/Network/help/New-AzVirtualApplianceSkuProperty.md +++ b/src/Network/Network/help/New-AzVirtualApplianceSkuProperty.md @@ -14,7 +14,7 @@ Define a Network Virtual Appliance sku for the resource. ``` New-AzVirtualApplianceSkuProperty -VendorName -BundledScaleUnit -MarketPlaceVersion - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VendorName The name of the vendor. diff --git a/src/Network/Network/help/New-AzVirtualHub.md b/src/Network/Network/help/New-AzVirtualHub.md index 5ac1f14f5401..a7f5550be3f2 100644 --- a/src/Network/Network/help/New-AzVirtualHub.md +++ b/src/Network/Network/help/New-AzVirtualHub.md @@ -19,7 +19,8 @@ New-AzVirtualHub -ResourceGroupName -Name -VirtualWan ] [-Tag ] [-Sku ] [-PreferredRoutingGateway ] [-HubRoutingPreference ] [-VirtualRouterAsn ] [-VirtualRouterAutoScaleConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanResourceId @@ -29,7 +30,8 @@ New-AzVirtualHub -ResourceGroupName -Name -VirtualWanId ] [-Tag ] [-Sku ] [-PreferredRoutingGateway ] [-HubRoutingPreference ] [-VirtualRouterAsn ] [-VirtualRouterAutoScaleConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -276,6 +278,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVirtualHubBgpConnection.md b/src/Network/Network/help/New-AzVirtualHubBgpConnection.md index 794035d9837a..24db57265662 100644 --- a/src/Network/Network/help/New-AzVirtualHubBgpConnection.md +++ b/src/Network/Network/help/New-AzVirtualHubBgpConnection.md @@ -16,42 +16,48 @@ The New-AzVirtualHubBgpConnection cmdlet creates a HubBgpConnection resource tha ``` New-AzVirtualHubBgpConnection -ResourceGroupName -VirtualHubName -PeerIp -PeerAsn -Name -VirtualHubVnetConnection [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubNameByHubVirtualNetworkConnectionResourceId ``` New-AzVirtualHubBgpConnection -ResourceGroupName -VirtualHubName -PeerIp -PeerAsn -Name -VirtualHubVnetConnectionId [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByHubVirtualNetworkConnectionObject ``` New-AzVirtualHubBgpConnection -PeerIp -PeerAsn -Name -VirtualHubVnetConnection -VirtualHub [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByHubVirtualNetworkConnectionObject ``` New-AzVirtualHubBgpConnection -PeerIp -PeerAsn -Name -VirtualHubVnetConnection -VirtualHubId [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByHubVirtualNetworkConnectionResourceId ``` New-AzVirtualHubBgpConnection -PeerIp -PeerAsn -Name -VirtualHubVnetConnectionId -VirtualHub [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByHubVirtualNetworkConnectionResourceId ``` New-AzVirtualHubBgpConnection -PeerIp -PeerAsn -Name -VirtualHubVnetConnectionId -VirtualHubId [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -174,6 +180,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVirtualHubRoute.md b/src/Network/Network/help/New-AzVirtualHubRoute.md index 547b91d19409..ee9bd01a33d2 100644 --- a/src/Network/Network/help/New-AzVirtualHubRoute.md +++ b/src/Network/Network/help/New-AzVirtualHubRoute.md @@ -14,7 +14,7 @@ Creates an Azure Virtual Hub Route object. ``` New-AzVirtualHubRoute -AddressPrefix -NextHopIpAddress - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVirtualHubRouteTable.md b/src/Network/Network/help/New-AzVirtualHubRouteTable.md index df9b217c50cd..873ccbe93e6b 100644 --- a/src/Network/Network/help/New-AzVirtualHubRouteTable.md +++ b/src/Network/Network/help/New-AzVirtualHubRouteTable.md @@ -14,7 +14,7 @@ Creates an Azure Virtual Hub Route Table object. ``` New-AzVirtualHubRouteTable -Route [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -67,6 +67,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Route List of virtual hub routes. diff --git a/src/Network/Network/help/New-AzVirtualHubVnetConnection.md b/src/Network/Network/help/New-AzVirtualHubVnetConnection.md index d4b32c8d38d9..a305abbd3692 100644 --- a/src/Network/Network/help/New-AzVirtualHubVnetConnection.md +++ b/src/Network/Network/help/New-AzVirtualHubVnetConnection.md @@ -16,48 +16,48 @@ The New-AzVirtualHubVnetConnection cmdlet creates a HubVirtualNetworkConnection ``` New-AzVirtualHubVnetConnection -ResourceGroupName -ParentResourceName -Name -RemoteVirtualNetwork [-EnableInternetSecurity] [-EnableInternetSecurityFlag ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubNameByRemoteVirtualNetworkResourceId ``` New-AzVirtualHubVnetConnection -ResourceGroupName -ParentResourceName -Name -RemoteVirtualNetworkId [-EnableInternetSecurity] [-EnableInternetSecurityFlag ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByRemoteVirtualNetworkObject ``` New-AzVirtualHubVnetConnection -ParentObject -Name -RemoteVirtualNetwork [-EnableInternetSecurity] [-EnableInternetSecurityFlag ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByRemoteVirtualNetworkResourceId ``` New-AzVirtualHubVnetConnection -ParentObject -Name -RemoteVirtualNetworkId [-EnableInternetSecurity] [-EnableInternetSecurityFlag ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubResourceIdByRemoteVirtualNetworkObject ``` New-AzVirtualHubVnetConnection -ParentResourceId -Name -RemoteVirtualNetwork [-EnableInternetSecurity] [-EnableInternetSecurityFlag ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubResourceIdByRemoteVirtualNetworkResourceId ``` New-AzVirtualHubVnetConnection -ParentResourceId -Name -RemoteVirtualNetworkId [-EnableInternetSecurity] [-EnableInternetSecurityFlag ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -279,6 +279,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RemoteVirtualNetwork The remote virtual network to which this hub virtual network connection is connected. diff --git a/src/Network/Network/help/New-AzVirtualNetwork.md b/src/Network/Network/help/New-AzVirtualNetwork.md index 5bd15d13ff8b..01bb09306888 100644 --- a/src/Network/Network/help/New-AzVirtualNetwork.md +++ b/src/Network/Network/help/New-AzVirtualNetwork.md @@ -18,8 +18,8 @@ New-AzVirtualNetwork -Name -ResourceGroupName -Location ] [-FlowTimeout ] [-Subnet ] [-BgpCommunity ] [-EnableEncryption ] [-EncryptionEnforcementPolicy ] [-Tag ] [-EnableDdosProtection] [-DdosProtectionPlanId ] [-IpAllocation ] - [-EdgeZone ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-EdgeZone ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -300,6 +300,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of a resource group to contain the virtual network. diff --git a/src/Network/Network/help/New-AzVirtualNetworkGateway.md b/src/Network/Network/help/New-AzVirtualNetworkGateway.md index dee2a2cee02c..fe069739a755 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkGateway.md +++ b/src/Network/Network/help/New-AzVirtualNetworkGateway.md @@ -29,8 +29,8 @@ New-AzVirtualNetworkGateway -Name -ResourceGroupName -Location [-AadTenantUri ] [-AadAudienceId ] [-AadIssuerUri ] [-CustomRoute ] [-VpnGatewayGeneration ] [-VirtualNetworkGatewayPolicyGroup ] [-ClientConnectionConfiguration ] [-AsJob] [-AdminState ] - [-MinScaleUnit ] [-MaxScaleUnit ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-MinScaleUnit ] [-MaxScaleUnit ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -595,6 +595,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RadiusServerAddress P2S External Radius server address. diff --git a/src/Network/Network/help/New-AzVirtualNetworkGatewayConnection.md b/src/Network/Network/help/New-AzVirtualNetworkGatewayConnection.md index 7d55dcb7fbe3..967b2ff89773 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkGatewayConnection.md +++ b/src/Network/Network/help/New-AzVirtualNetworkGatewayConnection.md @@ -24,8 +24,8 @@ New-AzVirtualNetworkGatewayConnection -Name -ResourceGroupName [-TrafficSelectorPolicy ] [-ConnectionProtocol ] [-IngressNatRule ] [-EgressNatRule ] [-GatewayCustomBgpIpAddress ] [-AsJob] [-ExpressRouteGatewayBypass] - [-EnablePrivateLinkFastPath] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-EnablePrivateLinkFastPath] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### SetByResourceId @@ -39,8 +39,8 @@ New-AzVirtualNetworkGatewayConnection -Name -ResourceGroupName [-TrafficSelectorPolicy ] [-ConnectionProtocol ] [-IngressNatRule ] [-EgressNatRule ] [-GatewayCustomBgpIpAddress ] [-AsJob] [-ExpressRouteGatewayBypass] - [-EnablePrivateLinkFastPath] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-EnablePrivateLinkFastPath] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -387,6 +387,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVirtualNetworkGatewayIpConfig.md b/src/Network/Network/help/New-AzVirtualNetworkGatewayIpConfig.md index 14c448912195..8d2358cf90b5 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkGatewayIpConfig.md +++ b/src/Network/Network/help/New-AzVirtualNetworkGatewayIpConfig.md @@ -16,13 +16,15 @@ Creates an IP Configuration for a Virtual Network Gateway ### SetByResourceId ``` New-AzVirtualNetworkGatewayIpConfig -Name [-PrivateIpAddress ] [-SubnetId ] - [-PublicIpAddressId ] [-DefaultProfile ] [] + [-PublicIpAddressId ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResource ``` New-AzVirtualNetworkGatewayIpConfig -Name [-PrivateIpAddress ] [-Subnet ] - [-PublicIpAddress ] [-DefaultProfile ] [] + [-PublicIpAddress ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress ```yaml Type: Microsoft.Azure.Commands.Network.Models.PSPublicIpAddress diff --git a/src/Network/Network/help/New-AzVirtualNetworkGatewayNatRule.md b/src/Network/Network/help/New-AzVirtualNetworkGatewayNatRule.md index 57053310796d..6d5d70f66d2f 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkGatewayNatRule.md +++ b/src/Network/Network/help/New-AzVirtualNetworkGatewayNatRule.md @@ -15,8 +15,8 @@ Creates the virtual network gateway natRule object. ``` New-AzVirtualNetworkGatewayNatRule -Name -Type -Mode -InternalMapping -ExternalMapping [-InternalPortRange ] [-ExternalPortRange ] - [-IpConfigurationId ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-IpConfigurationId ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -173,6 +173,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Type The type of NAT rule for VPN NAT diff --git a/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroup.md b/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroup.md index 69fae6820b54..866a75da1486 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroup.md +++ b/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroup.md @@ -15,7 +15,7 @@ Create a Virtual Network Gateway Policy Group ``` New-AzVirtualNetworkGatewayPolicyGroup -Name -Priority [-DefaultPolicyGroup] -PolicyMember [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -126,6 +126,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroupMember.md b/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroupMember.md index aee7fad52f7d..5937e9a5a0be 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroupMember.md +++ b/src/Network/Network/help/New-AzVirtualNetworkGatewayPolicyGroupMember.md @@ -14,7 +14,7 @@ Create a Virtual Network Gateway Policy Group Member ``` New-AzVirtualNetworkGatewayPolicyGroupMember -Name -AttributeType -AttributeValue - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVirtualNetworkSubnetConfig.md b/src/Network/Network/help/New-AzVirtualNetworkSubnetConfig.md index 96afaebfb967..99eb42fbbb7d 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkSubnetConfig.md +++ b/src/Network/Network/help/New-AzVirtualNetworkSubnetConfig.md @@ -20,7 +20,8 @@ New-AzVirtualNetworkSubnetConfig -Name -AddressPrefix [-ServiceEndpoint ] [-ServiceEndpointPolicy ] [-Delegation ] [-PrivateEndpointNetworkPoliciesFlag ] [-PrivateLinkServiceNetworkPoliciesFlag ] [-IpAllocation ] - [-DefaultOutboundAccess ] [-DefaultProfile ] [] + [-DefaultOutboundAccess ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResourceId @@ -30,7 +31,7 @@ New-AzVirtualNetworkSubnetConfig -Name -AddressPrefix [-Netw [-ServiceEndpointPolicy ] [-Delegation ] [-PrivateEndpointNetworkPoliciesFlag ] [-PrivateLinkServiceNetworkPoliciesFlag ] [-IpAllocation ] [-DefaultOutboundAccess ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -243,6 +244,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Specifies the Id of NAT Gateway resource associated with the subnet configuration. diff --git a/src/Network/Network/help/New-AzVirtualNetworkTap.md b/src/Network/Network/help/New-AzVirtualNetworkTap.md index f749027df2d9..4e6c663332a9 100644 --- a/src/Network/Network/help/New-AzVirtualNetworkTap.md +++ b/src/Network/Network/help/New-AzVirtualNetworkTap.md @@ -18,7 +18,8 @@ New-AzVirtualNetworkTap -ResourceGroupName -Name [-Destination [-Location ] [-Tag ] [-DestinationNetworkInterfaceIPConfiguration ] [-DestinationLoadBalancerFrontEndIPConfiguration ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -26,7 +27,8 @@ New-AzVirtualNetworkTap -ResourceGroupName -Name [-Destination New-AzVirtualNetworkTap -ResourceGroupName -Name [-DestinationPort ] [-Location ] [-Tag ] [-DestinationNetworkInterfaceIPConfigurationId ] [-DestinationLoadBalancerFrontEndIPConfigurationId ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -204,6 +206,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual network tap. diff --git a/src/Network/Network/help/New-AzVirtualRouter.md b/src/Network/Network/help/New-AzVirtualRouter.md index 1c5a54ca31df..01c0b6395c5a 100644 --- a/src/Network/Network/help/New-AzVirtualRouter.md +++ b/src/Network/Network/help/New-AzVirtualRouter.md @@ -14,8 +14,8 @@ Creates an Azure VirtualRouter. ``` New-AzVirtualRouter -ResourceGroupName -Name -HostedSubnet -Location - [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -123,6 +123,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router. diff --git a/src/Network/Network/help/New-AzVirtualRouterAutoScaleConfiguration.md b/src/Network/Network/help/New-AzVirtualRouterAutoScaleConfiguration.md index a09cc4272867..04713ff88996 100644 --- a/src/Network/Network/help/New-AzVirtualRouterAutoScaleConfiguration.md +++ b/src/Network/Network/help/New-AzVirtualRouterAutoScaleConfiguration.md @@ -14,7 +14,7 @@ Create a VirtualRouterAutoScaleConfiguration object for a Virtual Hub. ``` New-AzVirtualRouterAutoScaleConfiguration -MinCapacity [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -68,6 +68,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVirtualWan.md b/src/Network/Network/help/New-AzVirtualWan.md index 4d6b628865d6..1a31c8a8024e 100644 --- a/src/Network/Network/help/New-AzVirtualWan.md +++ b/src/Network/Network/help/New-AzVirtualWan.md @@ -15,7 +15,8 @@ Creates an Azure Virtual WAN. ``` New-AzVirtualWan -ResourceGroupName -Name -Location [-AllowVnetToVnetTraffic] [-AllowBranchToBranchTraffic] [-Tag ] [-VirtualWANType ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -146,6 +147,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVpnClientConfiguration.md b/src/Network/Network/help/New-AzVpnClientConfiguration.md index ac934df3eadf..d70ac2ec95a4 100644 --- a/src/Network/Network/help/New-AzVpnClientConfiguration.md +++ b/src/Network/Network/help/New-AzVpnClientConfiguration.md @@ -15,8 +15,8 @@ This command allows the users to create the Vpn profile package based on pre-con ``` New-AzVpnClientConfiguration [-Name ] -ResourceGroupName [-ProcessorArchitecture ] [-AuthenticationMethod ] [-RadiusRootCertificateFile ] - [-ClientRootCertificateFileList ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-ClientRootCertificateFileList ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -111,6 +111,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RadiusRootCertificateFile Radius server root certificate path. This is a mandatory parameter that has to be specified when EAP-TLS with RADIUS authentication is used. This is the full path name of .cer file containing the RADIUS root certificate that the client uses to validates the RADIUS server during authentication. diff --git a/src/Network/Network/help/New-AzVpnClientConnectionConfiguration.md b/src/Network/Network/help/New-AzVpnClientConnectionConfiguration.md index fddb52519e0a..7106dd882f4f 100644 --- a/src/Network/Network/help/New-AzVpnClientConnectionConfiguration.md +++ b/src/Network/Network/help/New-AzVpnClientConnectionConfiguration.md @@ -15,7 +15,7 @@ Create Virtual Network Gateway Connection configuration ``` New-AzVpnClientConnectionConfiguration -Name -VirtualNetworkGatewayPolicyGroup -VpnClientAddressPool - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -82,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkGatewayPolicyGroup Virtual Network Gateway Policy Groups diff --git a/src/Network/Network/help/New-AzVpnClientIpsecParameter.md b/src/Network/Network/help/New-AzVpnClientIpsecParameter.md index 1cfa3aef3f22..4222af93d0de 100644 --- a/src/Network/Network/help/New-AzVpnClientIpsecParameter.md +++ b/src/Network/Network/help/New-AzVpnClientIpsecParameter.md @@ -15,7 +15,8 @@ This command allows the users to create the Vpn ipsec parameters object specifyi ``` New-AzVpnClientIpsecParameter [-SALifeTime ] [-SADataSize ] [-IpsecEncryption ] [-IpsecIntegrity ] [-IkeEncryption ] [-IkeIntegrity ] [-DhGroup ] - [-PfsGroup ] [-DefaultProfile ] [] + [-PfsGroup ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -145,6 +146,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SADataSize The VpnClient IPSec Security Association (also called Quick Mode or Phase 2 SA) payload size in KB diff --git a/src/Network/Network/help/New-AzVpnClientIpsecPolicy.md b/src/Network/Network/help/New-AzVpnClientIpsecPolicy.md index c828b8a2e8f9..fc67cde7a925 100644 --- a/src/Network/Network/help/New-AzVpnClientIpsecPolicy.md +++ b/src/Network/Network/help/New-AzVpnClientIpsecPolicy.md @@ -15,7 +15,8 @@ This command allows the users to create the Vpn ipsec policy object specifying o ``` New-AzVpnClientIpsecPolicy [-SALifeTime ] [-SADataSize ] [-IpsecEncryption ] [-IpsecIntegrity ] [-IkeEncryption ] [-IkeIntegrity ] [-DhGroup ] - [-PfsGroup ] [-DefaultProfile ] [] + [-PfsGroup ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -164,6 +165,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SADataSize The VpnClient IPSec Security Association (also called Quick Mode or Phase 2 SA) payload size in KB diff --git a/src/Network/Network/help/New-AzVpnClientRevokedCertificate.md b/src/Network/Network/help/New-AzVpnClientRevokedCertificate.md index 227f41b4c578..9511d1d7c46b 100644 --- a/src/Network/Network/help/New-AzVpnClientRevokedCertificate.md +++ b/src/Network/Network/help/New-AzVpnClientRevokedCertificate.md @@ -15,7 +15,7 @@ Creates a new VPN client-revocation certificate. ``` New-AzVpnClientRevokedCertificate -Name -Thumbprint - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +71,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Thumbprint Specifies the unique identifier of the certificate being added. You can return thumbprint information for your certificates by using a Windows PowerShell command similar to this: diff --git a/src/Network/Network/help/New-AzVpnClientRootCertificate.md b/src/Network/Network/help/New-AzVpnClientRootCertificate.md index 0172d3217247..31774663cdf2 100644 --- a/src/Network/Network/help/New-AzVpnClientRootCertificate.md +++ b/src/Network/Network/help/New-AzVpnClientRootCertificate.md @@ -15,7 +15,7 @@ Creates a new VPN client root certificate. ``` New-AzVpnClientRootCertificate -Name -PublicCertData - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicCertData Specifies a text representation of the root certificate to be added. To obtain the text representation, export your certificate in .cer format (using Base64 encoding), then open the resulting file in a text editor. diff --git a/src/Network/Network/help/New-AzVpnConnection.md b/src/Network/Network/help/New-AzVpnConnection.md index b7e5754dd662..97ac95d2762e 100644 --- a/src/Network/Network/help/New-AzVpnConnection.md +++ b/src/Network/Network/help/New-AzVpnConnection.md @@ -20,7 +20,7 @@ New-AzVpnConnection -ResourceGroupName -ParentResourceName -Na [-UsePolicyBasedTrafficSelectors] [-VpnSiteLinkConnection ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-TrafficSelectorPolicy ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnGatewayNameByVpnSiteResourceId @@ -30,7 +30,8 @@ New-AzVpnConnection -ResourceGroupName -ParentResourceName -Na [-VpnConnectionProtocolType ] [-EnableBgp] [-UseLocalAzureIpAddress] [-UsePolicyBasedTrafficSelectors] [-VpnSiteLinkConnection ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-TrafficSelectorPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObjectByVpnSiteObject @@ -40,7 +41,8 @@ New-AzVpnConnection -ParentObject -Name -VpnSite ] [-EnableBgp] [-UseLocalAzureIpAddress] [-UsePolicyBasedTrafficSelectors] [-VpnSiteLinkConnection ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-TrafficSelectorPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObjectByVpnSiteResourceId @@ -50,7 +52,8 @@ New-AzVpnConnection -ParentObject -Name -VpnSiteId ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-TrafficSelectorPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayResourceIdByVpnSiteObject @@ -60,7 +63,8 @@ New-AzVpnConnection -ParentResourceId -Name -VpnSite ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-TrafficSelectorPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayResourceIdByVpnSiteResourceId @@ -70,7 +74,8 @@ New-AzVpnConnection -ParentResourceId -Name -VpnSiteId ] [-EnableInternetSecurity] [-RoutingConfiguration ] [-TrafficSelectorPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -311,6 +316,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVpnGateway.md b/src/Network/Network/help/New-AzVpnGateway.md index 020967fdbe78..c7dd8fd41dc7 100644 --- a/src/Network/Network/help/New-AzVpnGateway.md +++ b/src/Network/Network/help/New-AzVpnGateway.md @@ -17,7 +17,8 @@ Creates a Scalable VPN Gateway. New-AzVpnGateway -ResourceGroupName -Name -VpnGatewayScaleUnit -VirtualHubName [-VpnConnection ] [-EnableRoutingPreferenceInternetFlag] [-EnableBgpRouteTranslationForNat] [-VpnGatewayNatRule ] [-Tag ] - [-Asn ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Asn ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject @@ -25,7 +26,8 @@ New-AzVpnGateway -ResourceGroupName -Name -VpnGatewayScaleUnit New-AzVpnGateway -ResourceGroupName -Name -VpnGatewayScaleUnit -VirtualHub [-VpnConnection ] [-EnableRoutingPreferenceInternetFlag] [-EnableBgpRouteTranslationForNat] [-VpnGatewayNatRule ] [-Tag ] - [-Asn ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Asn ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubResourceId @@ -33,7 +35,8 @@ New-AzVpnGateway -ResourceGroupName -Name -VpnGatewayScaleUnit New-AzVpnGateway -ResourceGroupName -Name -VpnGatewayScaleUnit -VirtualHubId [-VpnConnection ] [-EnableRoutingPreferenceInternetFlag] [-EnableBgpRouteTranslationForNat] [-VpnGatewayNatRule ] [-Tag ] - [-Asn ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Asn ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -164,6 +167,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/New-AzVpnGatewayNatRule.md b/src/Network/Network/help/New-AzVpnGatewayNatRule.md index 81f6faab35ab..96902c48c6b8 100644 --- a/src/Network/Network/help/New-AzVpnGatewayNatRule.md +++ b/src/Network/Network/help/New-AzVpnGatewayNatRule.md @@ -17,7 +17,8 @@ Creates a NAT rule on a VpnGateway which can be associated with VpnSiteLinkConne New-AzVpnGatewayNatRule -ResourceGroupName -ParentResourceName -Name [-Type ] [-Mode ] -InternalMapping -ExternalMapping [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObject @@ -25,7 +26,8 @@ New-AzVpnGatewayNatRule -ResourceGroupName -ParentResourceName New-AzVpnGatewayNatRule -ParentObject -Name [-Type ] [-Mode ] -InternalMapping -ExternalMapping [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayResourceId @@ -33,7 +35,8 @@ New-AzVpnGatewayNatRule -ParentObject -Name [-Type -Name [-Type ] [-Mode ] -InternalMapping -ExternalMapping [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -255,6 +258,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/New-AzVpnServerConfiguration.md b/src/Network/Network/help/New-AzVpnServerConfiguration.md index 82ded579b2a5..e61d230f59c4 100644 --- a/src/Network/Network/help/New-AzVpnServerConfiguration.md +++ b/src/Network/Network/help/New-AzVpnServerConfiguration.md @@ -20,7 +20,8 @@ New-AzVpnServerConfiguration -ResourceGroupName -Name -Locatio [-RadiusServerRootCertificateFilesList ] [-RadiusClientRootCertificateFilesList ] [-AadTenant ] [-AadAudience ] [-AadIssuer ] [-VpnClientIpsecPolicy ] [-ConfigurationPolicyGroup ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -195,6 +196,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RadiusClientRootCertificateFilesList A list of RadiusClientRootCertificate files' paths diff --git a/src/Network/Network/help/New-AzVpnServerConfigurationPolicyGroup.md b/src/Network/Network/help/New-AzVpnServerConfigurationPolicyGroup.md index cf3ad5ced070..a117b7b1493c 100644 --- a/src/Network/Network/help/New-AzVpnServerConfigurationPolicyGroup.md +++ b/src/Network/Network/help/New-AzVpnServerConfigurationPolicyGroup.md @@ -19,8 +19,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubNameByVpnServerConfigurationResourceId @@ -30,7 +30,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByVpnServerConfigurationObject @@ -40,8 +41,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByVpnServerConfigurationResourceId @@ -51,7 +52,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationObject @@ -61,7 +63,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationResourceId @@ -71,7 +74,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -258,6 +262,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/New-AzVpnSite.md b/src/Network/Network/help/New-AzVpnSite.md index b0a0e036d0da..38b893e6d6b6 100644 --- a/src/Network/Network/help/New-AzVpnSite.md +++ b/src/Network/Network/help/New-AzVpnSite.md @@ -20,7 +20,7 @@ New-AzVpnSite -ResourceGroupName -Name -Location [-DeviceModel ] [-DeviceVendor ] [-IsSecuritySite] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualWanNameByVpnSiteLinkObject @@ -29,7 +29,7 @@ New-AzVpnSite -ResourceGroupName -Name -Location -VirtualWanResourceGroupName -VirtualWanName [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-IsSecuritySite] -VpnSiteLink [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualWanObjectByVpnSiteIpAddress @@ -38,7 +38,8 @@ New-AzVpnSite -ResourceGroupName -Name -Location -Vir -IpAddress [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-IsSecuritySite] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-O365Policy ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanObjectByVpnSiteLinkObject @@ -46,7 +47,8 @@ New-AzVpnSite -ResourceGroupName -Name -Location -Vir New-AzVpnSite -ResourceGroupName -Name -Location -VirtualWan [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-IsSecuritySite] -VpnSiteLink [-O365Policy ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanResourceIdByVpnSiteIpAddress @@ -55,7 +57,8 @@ New-AzVpnSite -ResourceGroupName -Name -Location -Vir -IpAddress [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-IsSecuritySite] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-O365Policy ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanResourceIdByVpnSiteLinkObject @@ -63,7 +66,8 @@ New-AzVpnSite -ResourceGroupName -Name -Location -Vir New-AzVpnSite -ResourceGroupName -Name -Location -VirtualWanId [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-IsSecuritySite] -VpnSiteLink [-O365Policy ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -342,6 +346,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/New-AzVpnSiteLink.md b/src/Network/Network/help/New-AzVpnSiteLink.md index 0bd01303b718..164762f55a0e 100644 --- a/src/Network/Network/help/New-AzVpnSiteLink.md +++ b/src/Network/Network/help/New-AzVpnSiteLink.md @@ -16,14 +16,14 @@ Creates an Azure VpnSiteLink object. ``` New-AzVpnSiteLink -Name -IPAddress [-LinkProviderName ] [-LinkSpeedInMbps ] [-BGPAsn ] [-BGPPeeringAddress ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### ByVpnSiteLinkFqdn ``` New-AzVpnSiteLink -Name -Fqdn [-LinkProviderName ] [-LinkSpeedInMbps ] [-BGPAsn ] [-BGPPeeringAddress ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -178,6 +178,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/New-AzVpnSiteLinkConnection.md b/src/Network/Network/help/New-AzVpnSiteLinkConnection.md index 7bca2d4530ff..e95d6e74a5e8 100644 --- a/src/Network/Network/help/New-AzVpnSiteLinkConnection.md +++ b/src/Network/Network/help/New-AzVpnSiteLinkConnection.md @@ -18,7 +18,7 @@ New-AzVpnSiteLinkConnection -Name -VpnSiteLink [-Shared [-VpnConnectionProtocolType ] [-EnableBgp] [-UseLocalAzureIpAddress] [-UsePolicyBasedTrafficSelectors] [-IngressNatRule ] [-EgressNatRule ] [-VpnGatewayCustomBgpAddress ] [-VpnLinkConnectionMode ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -175,6 +175,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutingWeight Routing Weight diff --git a/src/Network/Network/help/Remove-AzApplicationGateway.md b/src/Network/Network/help/Remove-AzApplicationGateway.md index e7e236e671cd..a4b2acb02286 100644 --- a/src/Network/Network/help/Remove-AzApplicationGateway.md +++ b/src/Network/Network/help/Remove-AzApplicationGateway.md @@ -15,7 +15,8 @@ Removes an application gateway. ``` Remove-AzApplicationGateway -Name -ResourceGroupName [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -93,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group name that the application gateway belongs to. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayAuthenticationCertificate.md b/src/Network/Network/help/Remove-AzApplicationGatewayAuthenticationCertificate.md index 52745346d2ae..c9f8b6c2fbd9 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayAuthenticationCertificate.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayAuthenticationCertificate.md @@ -15,7 +15,8 @@ Removes an authentication certificate from an application gateway. ``` Remove-AzApplicationGatewayAuthenticationCertificate -Name -ApplicationGateway - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -81,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayAutoscaleConfiguration.md b/src/Network/Network/help/Remove-AzApplicationGatewayAutoscaleConfiguration.md index fe8394933226..e681f64fd60a 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayAutoscaleConfiguration.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayAutoscaleConfiguration.md @@ -14,7 +14,8 @@ Removes Autoscale Configuration from an application gateway. ``` Remove-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -80,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayBackendAddressPool.md b/src/Network/Network/help/Remove-AzApplicationGatewayBackendAddressPool.md index 5e15ff360276..048b59e10ed0 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayBackendAddressPool.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayBackendAddressPool.md @@ -15,7 +15,8 @@ Removes a back-end address pool from an application gateway. ``` Remove-AzApplicationGatewayBackendAddressPool -Name -ApplicationGateway - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -80,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayBackendHttpSetting.md b/src/Network/Network/help/Remove-AzApplicationGatewayBackendHttpSetting.md index ea6cb0902db2..ea6edeacb409 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayBackendHttpSetting.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayBackendHttpSetting.md @@ -14,7 +14,7 @@ Removes back-end HTTP settings from an application gateway. ``` Remove-AzApplicationGatewayBackendHttpSetting -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayBackendSetting.md b/src/Network/Network/help/Remove-AzApplicationGatewayBackendSetting.md index bfca3165f798..c1c77f1a68f2 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayBackendSetting.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayBackendSetting.md @@ -14,7 +14,7 @@ Removes back-end TCP\TLS settings from an application gateway. ``` Remove-AzApplicationGatewayBackendSetting -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayClientAuthConfiguration.md b/src/Network/Network/help/Remove-AzApplicationGatewayClientAuthConfiguration.md index 7770ecd4a669..4e744946d9da 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayClientAuthConfiguration.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayClientAuthConfiguration.md @@ -14,7 +14,7 @@ Removes the client authentication configuration of a SSL profile object. ``` Remove-AzApplicationGatewayClientAuthConfiguration -SslProfile - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -49,6 +49,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslProfile The ssl profile diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayConnectionDraining.md b/src/Network/Network/help/Remove-AzApplicationGatewayConnectionDraining.md index 0595657f8cc8..eb9289ccc59f 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayConnectionDraining.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayConnectionDraining.md @@ -14,7 +14,7 @@ Removes the connection draining configuration of a back-end HTTP settings object ``` Remove-AzApplicationGatewayConnectionDraining -BackendHttpSettings - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -66,6 +66,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayCustomError.md b/src/Network/Network/help/Remove-AzApplicationGatewayCustomError.md index d62e802ecd83..c8020e992eca 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayCustomError.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayCustomError.md @@ -14,7 +14,7 @@ Removes a custom error from an application gateway. ``` Remove-AzApplicationGatewayCustomError -StatusCode -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -65,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayFirewallCustomRule.md b/src/Network/Network/help/Remove-AzApplicationGatewayFirewallCustomRule.md index 3c008ee767d8..875fa87b6be3 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayFirewallCustomRule.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayFirewallCustomRule.md @@ -14,7 +14,8 @@ Removes an application gateway firewall custom rule. ``` Remove-AzApplicationGatewayFirewallCustomRule -Name -ResourceGroupName -PolicyName - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -107,6 +108,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayFirewallPolicy.md b/src/Network/Network/help/Remove-AzApplicationGatewayFirewallPolicy.md index 8ff6bdae5d96..b99c82c37620 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayFirewallPolicy.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayFirewallPolicy.md @@ -15,20 +15,22 @@ Removes an application gateway firewall policy. ### ByFactoryName (Default) ``` Remove-AzApplicationGatewayFirewallPolicy -Name -ResourceGroupName [-Force] [-PassThru] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByFactoryObject ``` Remove-AzApplicationGatewayFirewallPolicy -InputObject - [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` Remove-AzApplicationGatewayFirewallPolicy -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -136,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayFrontendIPConfig.md b/src/Network/Network/help/Remove-AzApplicationGatewayFrontendIPConfig.md index e9d828f332e9..4c22b908e4ce 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayFrontendIPConfig.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayFrontendIPConfig.md @@ -15,7 +15,7 @@ Removes a front-end IP configuration from an application gateway. ``` Remove-AzApplicationGatewayFrontendIPConfig -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayFrontendPort.md b/src/Network/Network/help/Remove-AzApplicationGatewayFrontendPort.md index b5c29a423841..4da473d45151 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayFrontendPort.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayFrontendPort.md @@ -15,7 +15,7 @@ Removes a front-end port from an application gateway. ``` Remove-AzApplicationGatewayFrontendPort -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayHttpListener.md b/src/Network/Network/help/Remove-AzApplicationGatewayHttpListener.md index e971308ae89f..1d77f2aa3b94 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayHttpListener.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayHttpListener.md @@ -15,7 +15,7 @@ Removes an HTTP listener from an application gateway. ``` Remove-AzApplicationGatewayHttpListener -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayHttpListenerCustomError.md b/src/Network/Network/help/Remove-AzApplicationGatewayHttpListenerCustomError.md index 210217dd61f0..551b497e3bd3 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayHttpListenerCustomError.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayHttpListenerCustomError.md @@ -15,7 +15,7 @@ Removes a custom error from a http listener of an application gateway. ``` Remove-AzApplicationGatewayHttpListenerCustomError -StatusCode -HttpListener [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayIPConfiguration.md b/src/Network/Network/help/Remove-AzApplicationGatewayIPConfiguration.md index 2d7fbbb2fc0e..04b26eec8ba5 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayIPConfiguration.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayIPConfiguration.md @@ -15,7 +15,7 @@ Removes an IP configuration from an application gateway. ``` Remove-AzApplicationGatewayIPConfiguration -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayIdentity.md b/src/Network/Network/help/Remove-AzApplicationGatewayIdentity.md index 7a279d41b8df..5cac24c3efbf 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayIdentity.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayIdentity.md @@ -14,7 +14,8 @@ Removes a identity from an application gateway. ``` Remove-AzApplicationGatewayIdentity -ApplicationGateway - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -63,6 +64,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayListener.md b/src/Network/Network/help/Remove-AzApplicationGatewayListener.md index 5936edb24773..38d9e7b17c3b 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayListener.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayListener.md @@ -14,7 +14,7 @@ Removes a TCP\TLS listener from an application gateway. ``` Remove-AzApplicationGatewayListener -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayPrivateLinkConfiguration.md b/src/Network/Network/help/Remove-AzApplicationGatewayPrivateLinkConfiguration.md index 534891f12010..0b5ea3eb30da 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayPrivateLinkConfiguration.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayPrivateLinkConfiguration.md @@ -14,7 +14,7 @@ Removes a privateLink configuration from an application gateway. ``` Remove-AzApplicationGatewayPrivateLinkConfiguration -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayProbeConfig.md b/src/Network/Network/help/Remove-AzApplicationGatewayProbeConfig.md index 4cdda9a80f44..ec4fa7822d80 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayProbeConfig.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayProbeConfig.md @@ -14,7 +14,7 @@ Removes a health probe from an existing application gateway. ``` Remove-AzApplicationGatewayProbeConfig -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayRedirectConfiguration.md b/src/Network/Network/help/Remove-AzApplicationGatewayRedirectConfiguration.md index e3bb6d714200..a240c92c02e6 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayRedirectConfiguration.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayRedirectConfiguration.md @@ -14,7 +14,7 @@ Removes a redirect configuration from an existing Application Gateway. ``` Remove-AzApplicationGatewayRedirectConfiguration -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayRequestRoutingRule.md b/src/Network/Network/help/Remove-AzApplicationGatewayRequestRoutingRule.md index 9a44b099690b..7e76ff4ab5a2 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayRequestRoutingRule.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayRequestRoutingRule.md @@ -15,7 +15,7 @@ Removes a request routing rule from an application gateway. ``` Remove-AzApplicationGatewayRequestRoutingRule -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayRewriteRuleSet.md b/src/Network/Network/help/Remove-AzApplicationGatewayRewriteRuleSet.md index ca361e39e5a1..3d727419762a 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayRewriteRuleSet.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayRewriteRuleSet.md @@ -14,7 +14,7 @@ Removes a rewrite rule set from an application gateway. ``` Remove-AzApplicationGatewayRewriteRuleSet -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayRoutingRule.md b/src/Network/Network/help/Remove-AzApplicationGatewayRoutingRule.md index 30885de798e6..756b9186a213 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayRoutingRule.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayRoutingRule.md @@ -14,7 +14,7 @@ Removes a routing rule from an application gateway. ``` Remove-AzApplicationGatewayRoutingRule -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -80,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewaySslCertificate.md b/src/Network/Network/help/Remove-AzApplicationGatewaySslCertificate.md index 3fc3e0da5f97..578d0e83c68b 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewaySslCertificate.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewaySslCertificate.md @@ -15,7 +15,7 @@ Removes an SSL certificate from an Azure application gateway. ``` Remove-AzApplicationGatewaySslCertificate -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewaySslPolicy.md b/src/Network/Network/help/Remove-AzApplicationGatewaySslPolicy.md index 7b9d26c41ad2..0ffc6db3bb65 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewaySslPolicy.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewaySslPolicy.md @@ -15,7 +15,8 @@ Removes an SSL policy from an Azure application gateway. ``` Remove-AzApplicationGatewaySslPolicy -ApplicationGateway [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -81,6 +82,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewaySslProfile.md b/src/Network/Network/help/Remove-AzApplicationGatewaySslProfile.md index d48dff8b0a6c..6e8d2ea2d32f 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewaySslProfile.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewaySslProfile.md @@ -14,7 +14,7 @@ Removes the ssl profile from an application gateway. ``` Remove-AzApplicationGatewaySslProfile -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewaySslProfilePolicy.md b/src/Network/Network/help/Remove-AzApplicationGatewaySslProfilePolicy.md index 20219e9cd10b..e68a69b1261b 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewaySslProfilePolicy.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewaySslProfilePolicy.md @@ -14,7 +14,7 @@ Removes an SSL policy from an Azure application gateway SSL profile. ``` Remove-AzApplicationGatewaySslProfilePolicy -SslProfile - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -48,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslProfile The applicationGateway SSL profile diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayTrustedClientCertificate.md b/src/Network/Network/help/Remove-AzApplicationGatewayTrustedClientCertificate.md index afcce570c54e..c9dde28f88c7 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayTrustedClientCertificate.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayTrustedClientCertificate.md @@ -14,7 +14,7 @@ Removes the trusted client CA certificate chain object from an application gatew ``` Remove-AzApplicationGatewayTrustedClientCertificate -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayTrustedRootCertificate.md b/src/Network/Network/help/Remove-AzApplicationGatewayTrustedRootCertificate.md index ccc8f164db72..494cb26940c9 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayTrustedRootCertificate.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayTrustedRootCertificate.md @@ -14,7 +14,8 @@ Removes a Trusted Root Certificate from an application gateway. ``` Remove-AzApplicationGatewayTrustedRootCertificate -Name -ApplicationGateway - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -80,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzApplicationGatewayUrlPathMapConfig.md b/src/Network/Network/help/Remove-AzApplicationGatewayUrlPathMapConfig.md index 4965e70be153..86e2a71073d8 100644 --- a/src/Network/Network/help/Remove-AzApplicationGatewayUrlPathMapConfig.md +++ b/src/Network/Network/help/Remove-AzApplicationGatewayUrlPathMapConfig.md @@ -15,7 +15,7 @@ Removes URL path mappings to a backend server pool. ``` Remove-AzApplicationGatewayUrlPathMapConfig -Name -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzApplicationSecurityGroup.md b/src/Network/Network/help/Remove-AzApplicationSecurityGroup.md index 65913d89f22c..f447d5b3ac57 100644 --- a/src/Network/Network/help/Remove-AzApplicationSecurityGroup.md +++ b/src/Network/Network/help/Remove-AzApplicationSecurityGroup.md @@ -14,7 +14,8 @@ Removes an application security group. ``` Remove-AzApplicationSecurityGroup -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the application security group. diff --git a/src/Network/Network/help/Remove-AzBastion.md b/src/Network/Network/help/Remove-AzBastion.md index 9265db8e698c..dfb5caa3d6c4 100644 --- a/src/Network/Network/help/Remove-AzBastion.md +++ b/src/Network/Network/help/Remove-AzBastion.md @@ -15,19 +15,20 @@ Removes a bastion resource. ### ByResourceGroupName (Default) ``` Remove-AzBastion -ResourceGroupName -Name [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByInputObject ``` Remove-AzBastion -InputObject [-PassThru] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` -Remove-AzBastion -ResourceId [-PassThru] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Remove-AzBastion -ResourceId [-PassThru] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -128,6 +129,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name where bastion exists. diff --git a/src/Network/Network/help/Remove-AzCustomIpPrefix.md b/src/Network/Network/help/Remove-AzCustomIpPrefix.md index ef4c54e11842..a43b9c9198b4 100644 --- a/src/Network/Network/help/Remove-AzCustomIpPrefix.md +++ b/src/Network/Network/help/Remove-AzCustomIpPrefix.md @@ -15,19 +15,22 @@ Removes a CustomIpPrefix ### DeleteByNameParameterSet (Default) ``` Remove-AzCustomIpPrefix -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzCustomIpPrefix -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzCustomIpPrefix -InputObject [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -135,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzDdosProtectionPlan.md b/src/Network/Network/help/Remove-AzDdosProtectionPlan.md index d4e178d4a5a3..5910807b71f7 100644 --- a/src/Network/Network/help/Remove-AzDdosProtectionPlan.md +++ b/src/Network/Network/help/Remove-AzDdosProtectionPlan.md @@ -14,7 +14,8 @@ Removes a DDoS protection plan. ``` Remove-AzDdosProtectionPlan -ResourceGroupName -Name [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -130,6 +131,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the resource group of the DDoS protection plan to be removed. diff --git a/src/Network/Network/help/Remove-AzDelegation.md b/src/Network/Network/help/Remove-AzDelegation.md index 33e708665f37..fdeae0b2f05f 100644 --- a/src/Network/Network/help/Remove-AzDelegation.md +++ b/src/Network/Network/help/Remove-AzDelegation.md @@ -14,7 +14,7 @@ Removes a service delegation from the provided subnet. ``` Remove-AzDelegation -Name -Subnet [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +71,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet The subnet from which to remove the delegation diff --git a/src/Network/Network/help/Remove-AzExpressRouteCircuit.md b/src/Network/Network/help/Remove-AzExpressRouteCircuit.md index 8742ebd50662..7a2343fafa2a 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteCircuit.md +++ b/src/Network/Network/help/Remove-AzExpressRouteCircuit.md @@ -15,7 +15,8 @@ Removes an ExpressRoute circuit. ``` Remove-AzExpressRouteCircuit -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -111,6 +112,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that this ExpressRoute circuit belongs to. diff --git a/src/Network/Network/help/Remove-AzExpressRouteCircuitAuthorization.md b/src/Network/Network/help/Remove-AzExpressRouteCircuitAuthorization.md index e0a744597025..43dd7467db52 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteCircuitAuthorization.md +++ b/src/Network/Network/help/Remove-AzExpressRouteCircuitAuthorization.md @@ -15,7 +15,7 @@ Removes an existing ExpressRoute configuration authorization. ``` Remove-AzExpressRouteCircuitAuthorization [-Name ] -ExpressRouteCircuit - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -92,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzExpressRouteCircuitConnectionConfig.md b/src/Network/Network/help/Remove-AzExpressRouteCircuitConnectionConfig.md index 2e02188c53b0..c9105844b9ee 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteCircuitConnectionConfig.md +++ b/src/Network/Network/help/Remove-AzExpressRouteCircuitConnectionConfig.md @@ -15,8 +15,8 @@ Removes an ExpressRoute circuit connection configuration. ``` Remove-AzExpressRouteCircuitConnectionConfig [-Name] [-ExpressRouteCircuit] - [-AddressPrefixType ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-AddressPrefixType ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -112,6 +112,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzExpressRouteCircuitPeeringConfig.md b/src/Network/Network/help/Remove-AzExpressRouteCircuitPeeringConfig.md index 49d333bb2a9b..0eb5029fcaa6 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteCircuitPeeringConfig.md +++ b/src/Network/Network/help/Remove-AzExpressRouteCircuitPeeringConfig.md @@ -15,7 +15,8 @@ Removes an ExpressRoute circuit peering configuration. ``` Remove-AzExpressRouteCircuitPeeringConfig [-Name ] -ExpressRouteCircuit - [-PeerAddressType ] [-DefaultProfile ] [] + [-PeerAddressType ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -94,6 +95,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzExpressRouteConnection.md b/src/Network/Network/help/Remove-AzExpressRouteConnection.md index 12b464db31e0..a5f708e253dc 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteConnection.md +++ b/src/Network/Network/help/Remove-AzExpressRouteConnection.md @@ -15,19 +15,22 @@ Removes a ExpressRouteConnection. ### ByExpressRouteConnectionName (Default) ``` Remove-AzExpressRouteConnection -ResourceGroupName -ExpressRouteGatewayName -Name - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByExpressRouteConnectionResourceId ``` Remove-AzExpressRouteConnection -ResourceId [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteConnectionObject ``` Remove-AzExpressRouteConnection -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -168,6 +171,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzExpressRouteCrossConnectionPeering.md b/src/Network/Network/help/Remove-AzExpressRouteCrossConnectionPeering.md index 9dc035c0742a..d4b943cb1350 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteCrossConnectionPeering.md +++ b/src/Network/Network/help/Remove-AzExpressRouteCrossConnectionPeering.md @@ -15,8 +15,8 @@ Removes an ExpressRoute cross connection peering configuration. ``` Remove-AzExpressRouteCrossConnectionPeering -ExpressRouteCrossConnection - [-Name ] [-PeerAddressType ] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-Name ] [-PeerAddressType ] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -110,6 +110,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzExpressRouteGateway.md b/src/Network/Network/help/Remove-AzExpressRouteGateway.md index 9f833f7d4375..6aa91dd50c2c 100644 --- a/src/Network/Network/help/Remove-AzExpressRouteGateway.md +++ b/src/Network/Network/help/Remove-AzExpressRouteGateway.md @@ -15,19 +15,22 @@ The Remove-AzExpressRouteGateway cmdlet removes an Azure ExpressRoute gateway. T ### ByExpressRouteGatewayName (Default) ``` Remove-AzExpressRouteGateway -ResourceGroupName -Name [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteGatewayObject ``` Remove-AzExpressRouteGateway -InputObject [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteGatewayResourceId ``` Remove-AzExpressRouteGateway -ResourceId [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -142,6 +145,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzExpressRoutePort.md b/src/Network/Network/help/Remove-AzExpressRoutePort.md index 718a75c743fc..75c120ddc80c 100644 --- a/src/Network/Network/help/Remove-AzExpressRoutePort.md +++ b/src/Network/Network/help/Remove-AzExpressRoutePort.md @@ -15,19 +15,22 @@ Removes an ExpressRoutePort. ### ResourceNameParameterSet (Default) ``` Remove-AzExpressRoutePort -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### InputObjectParameterSet ``` Remove-AzExpressRoutePort -InputObject [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceIdParameterSet ``` Remove-AzExpressRoutePort -ResourceId [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -149,6 +152,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ExpressRoutePort. diff --git a/src/Network/Network/help/Remove-AzExpressRoutePortAuthorization.md b/src/Network/Network/help/Remove-AzExpressRoutePortAuthorization.md index cba37ba94bbd..ae6e040693c9 100644 --- a/src/Network/Network/help/Remove-AzExpressRoutePortAuthorization.md +++ b/src/Network/Network/help/Remove-AzExpressRoutePortAuthorization.md @@ -14,7 +14,8 @@ Removes an existing ExpressRoutePort authorization. ``` Remove-AzExpressRoutePortAuthorization -Name -ExpressRoutePortObject [-Force] - [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -191,6 +192,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzExpressRoutePortIdentity.md b/src/Network/Network/help/Remove-AzExpressRoutePortIdentity.md index 3fff77e732b0..b787e9a6caf2 100644 --- a/src/Network/Network/help/Remove-AzExpressRoutePortIdentity.md +++ b/src/Network/Network/help/Remove-AzExpressRoutePortIdentity.md @@ -14,7 +14,7 @@ Removes a identity from an ExpressRoutePort. ``` Remove-AzExpressRoutePortIdentity -ExpressRoutePort - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -59,6 +59,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzFirewall.md b/src/Network/Network/help/Remove-AzFirewall.md index a998126a850c..d231e19dd685 100644 --- a/src/Network/Network/help/Remove-AzFirewall.md +++ b/src/Network/Network/help/Remove-AzFirewall.md @@ -15,7 +15,8 @@ Remove a Firewall. ``` Remove-AzFirewall -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -116,6 +117,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the firewall that this cmdlet removes. diff --git a/src/Network/Network/help/Remove-AzFirewallPolicy.md b/src/Network/Network/help/Remove-AzFirewallPolicy.md index fc5dbb319574..73c09ed07cab 100644 --- a/src/Network/Network/help/Remove-AzFirewallPolicy.md +++ b/src/Network/Network/help/Remove-AzFirewallPolicy.md @@ -15,19 +15,22 @@ Removes an Azure Firewall Policy ### RemoveByNameParameterSet (Default) ``` Remove-AzFirewallPolicy -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RemoveByResourceIdParameterSet ``` Remove-AzFirewallPolicy [-Force] [-PassThru] [-AsJob] -ResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RemoveByInputObjectParameterSet ``` Remove-AzFirewallPolicy [-Force] [-PassThru] [-AsJob] -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -149,6 +152,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzFirewallPolicyRuleCollectionGroup.md b/src/Network/Network/help/Remove-AzFirewallPolicyRuleCollectionGroup.md index 0ee1d233e04b..23eb70f818f2 100644 --- a/src/Network/Network/help/Remove-AzFirewallPolicyRuleCollectionGroup.md +++ b/src/Network/Network/help/Remove-AzFirewallPolicyRuleCollectionGroup.md @@ -16,27 +16,28 @@ Removes a Azure Firewall Policy Rule Collection Group in a Azure firewall policy ``` Remove-AzFirewallPolicyRuleCollectionGroup -Name -ResourceGroupName -AzureFirewallPolicyName [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### RemoveByParentInputObjectParameterSet ``` Remove-AzFirewallPolicyRuleCollectionGroup -Name -FirewallPolicyObject - [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### RemoveByInputObjectParameterSet ``` Remove-AzFirewallPolicyRuleCollectionGroup -InputObject - [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### RemoveByResourceIdParameterSet ``` Remove-AzFirewallPolicyRuleCollectionGroup -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -193,6 +194,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzIpAllocation.md b/src/Network/Network/help/Remove-AzIpAllocation.md index 352181343677..f89ec598d2fc 100644 --- a/src/Network/Network/help/Remove-AzIpAllocation.md +++ b/src/Network/Network/help/Remove-AzIpAllocation.md @@ -15,19 +15,22 @@ Deletes an Azure IpAllocation. ### DeleteByNameParameterSet ``` Remove-AzIpAllocation -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzIpAllocation -InputObject [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzIpAllocation -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -133,6 +136,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzIpGroup.md b/src/Network/Network/help/Remove-AzIpGroup.md index 53f4d7eaa55f..7e6c6f64a98f 100644 --- a/src/Network/Network/help/Remove-AzIpGroup.md +++ b/src/Network/Network/help/Remove-AzIpGroup.md @@ -15,19 +15,20 @@ Deletes an Azure IpGroup. ### IpGroupNameParameterSet (Default) ``` Remove-AzIpGroup -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### IpGroupInputObjectParameterSet ``` Remove-AzIpGroup -IpGroup [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### IpGroupResourceIdParameterSet ``` Remove-AzIpGroup -ResourceId [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -144,6 +145,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ipgroup. diff --git a/src/Network/Network/help/Remove-AzLoadBalancer.md b/src/Network/Network/help/Remove-AzLoadBalancer.md index e5c7d705b1b5..e1ba8fe7fc98 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancer.md +++ b/src/Network/Network/help/Remove-AzLoadBalancer.md @@ -15,7 +15,8 @@ Removes a load balancer. ``` Remove-AzLoadBalancer -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the load balancer to remove. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPool.md b/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPool.md index 1b18a7e54a25..c0c9b329c680 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPool.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPool.md @@ -15,26 +15,29 @@ Removes a backend pool from a load balancer ### DeleteByNameParameterSet (Default) ``` Remove-AzLoadBalancerBackendAddressPool -ResourceGroupName -Name [-LoadBalancerName ] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### DeleteByParentObjectParameterSet ``` Remove-AzLoadBalancerBackendAddressPool -Name [-LoadBalancerName ] - -LoadBalancer [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -LoadBalancer [-PassThru] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzLoadBalancerBackendAddressPool [-LoadBalancerName ] -InputObject - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzLoadBalancerBackendAddressPool [-LoadBalancerName ] -ResourceId [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -152,6 +155,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the load balancer. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPoolConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPoolConfig.md index aeef4aa66060..25b015609f8d 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPoolConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerBackendAddressPoolConfig.md @@ -15,7 +15,8 @@ Removes a backend address pool configuration from a load balancer. ``` Remove-AzLoadBalancerBackendAddressPoolConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -79,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerFrontendIpConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerFrontendIpConfig.md index 2771bfa10c50..3e6a05c9503e 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerFrontendIpConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerFrontendIpConfig.md @@ -15,7 +15,8 @@ Removes a front-end IP configuration from a load balancer. ``` Remove-AzLoadBalancerFrontendIpConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -79,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerInboundNatPoolConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerInboundNatPoolConfig.md index a13c38958da5..f941d383072d 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerInboundNatPoolConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerInboundNatPoolConfig.md @@ -15,7 +15,8 @@ Removes an inbound NAT pool configuration from a load balancer. ``` Remove-AzLoadBalancerInboundNatPoolConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -72,6 +73,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerInboundNatRuleConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerInboundNatRuleConfig.md index f3a9c4d10627..e952fe05857a 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerInboundNatRuleConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerInboundNatRuleConfig.md @@ -15,7 +15,8 @@ Removes an inbound NAT rule configuration from a load balancer. ``` Remove-AzLoadBalancerInboundNatRuleConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -80,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerOutboundRuleConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerOutboundRuleConfig.md index 76e35f214ba9..b47cf6384bb4 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerOutboundRuleConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerOutboundRuleConfig.md @@ -14,7 +14,8 @@ Removes an outbound rule configuration from a load balancer. ``` Remove-AzLoadBalancerOutboundRuleConfig -LoadBalancer -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -80,6 +81,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerProbeConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerProbeConfig.md index e7689fcae498..43290cede9d7 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerProbeConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerProbeConfig.md @@ -15,7 +15,8 @@ Removes a probe configuration from a load balancer. ``` Remove-AzLoadBalancerProbeConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -79,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLoadBalancerRuleConfig.md b/src/Network/Network/help/Remove-AzLoadBalancerRuleConfig.md index bd56cb5322ae..f6f4a05894a2 100644 --- a/src/Network/Network/help/Remove-AzLoadBalancerRuleConfig.md +++ b/src/Network/Network/help/Remove-AzLoadBalancerRuleConfig.md @@ -15,7 +15,8 @@ Removes a rule configuration for a load balancer. ``` Remove-AzLoadBalancerRuleConfig -LoadBalancer [-Name ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -79,6 +80,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzLocalNetworkGateway.md b/src/Network/Network/help/Remove-AzLocalNetworkGateway.md index 1d78464832b3..fc858c3b95cd 100644 --- a/src/Network/Network/help/Remove-AzLocalNetworkGateway.md +++ b/src/Network/Network/help/Remove-AzLocalNetworkGateway.md @@ -15,7 +15,8 @@ Deletes a Local Network Gateway ``` Remove-AzLocalNetworkGateway -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -110,6 +111,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the local network gateway. diff --git a/src/Network/Network/help/Remove-AzNatGateway.md b/src/Network/Network/help/Remove-AzNatGateway.md index 1ee6977206b9..8b151cce0e61 100644 --- a/src/Network/Network/help/Remove-AzNatGateway.md +++ b/src/Network/Network/help/Remove-AzNatGateway.md @@ -15,19 +15,22 @@ Remove Nat Gateway resource. ### DeleteByNameParameterSet (Default) ``` Remove-AzNatGateway -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzNatGateway -InputObject [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzNatGateway -ResourceId [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -135,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Name of the Resource Group. diff --git a/src/Network/Network/help/Remove-AzNetworkInterface.md b/src/Network/Network/help/Remove-AzNetworkInterface.md index 2b6db0377109..06615644a3a6 100644 --- a/src/Network/Network/help/Remove-AzNetworkInterface.md +++ b/src/Network/Network/help/Remove-AzNetworkInterface.md @@ -15,7 +15,8 @@ Removes a network interface. ``` Remove-AzNetworkInterface -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -117,6 +118,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of a resource group that contains the network interface that this cmdlet removes. diff --git a/src/Network/Network/help/Remove-AzNetworkInterfaceIpConfig.md b/src/Network/Network/help/Remove-AzNetworkInterfaceIpConfig.md index f99c5ea6d821..3d9300dedfd5 100644 --- a/src/Network/Network/help/Remove-AzNetworkInterfaceIpConfig.md +++ b/src/Network/Network/help/Remove-AzNetworkInterfaceIpConfig.md @@ -15,7 +15,7 @@ Removes a network interface IP configuration from a network interface. ``` Remove-AzNetworkInterfaceIpConfig -Name -NetworkInterface - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -83,6 +83,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzNetworkInterfaceTapConfig.md b/src/Network/Network/help/Remove-AzNetworkInterfaceTapConfig.md index eba4933ee8fe..dd3120a6c09b 100644 --- a/src/Network/Network/help/Remove-AzNetworkInterfaceTapConfig.md +++ b/src/Network/Network/help/Remove-AzNetworkInterfaceTapConfig.md @@ -15,19 +15,22 @@ Removes a tap configuration from given network interface ### RemoveByNameParameterSet (Default) ``` Remove-AzNetworkInterfaceTapConfig -ResourceGroupName -NetworkInterfaceName -Name - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzNetworkInterfaceTapConfig -ResourceId [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzNetworkInterfaceTapConfig -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -144,6 +147,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManager.md b/src/Network/Network/help/Remove-AzNetworkManager.md index 4aac1fce51f4..ec7e8d196b8c 100644 --- a/src/Network/Network/help/Remove-AzNetworkManager.md +++ b/src/Network/Network/help/Remove-AzNetworkManager.md @@ -14,7 +14,8 @@ Removes a network manager. ``` Remove-AzNetworkManager -Name -ResourceGroupName [-ForceDelete] [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -122,6 +123,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerConnectivityConfiguration.md b/src/Network/Network/help/Remove-AzNetworkManagerConnectivityConfiguration.md index 7882280ccc96..6db08866dffb 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerConnectivityConfiguration.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerConnectivityConfiguration.md @@ -15,7 +15,8 @@ Removes a connectivity configuration. ``` Remove-AzNetworkManagerConnectivityConfiguration -Name -NetworkManagerName -ResourceGroupName [-ForceDelete] [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -138,6 +139,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerGroup.md b/src/Network/Network/help/Remove-AzNetworkManagerGroup.md index b2d3db11040e..d0c2c99287fd 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerGroup.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerGroup.md @@ -14,8 +14,8 @@ Removes a network Group. ``` Remove-AzNetworkManagerGroup -Name -NetworkManagerName -ResourceGroupName - [-ForceDelete] [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-ForceDelete] [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -138,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerManagementGroupConnection.md b/src/Network/Network/help/Remove-AzNetworkManagerManagementGroupConnection.md index ab2f4144f2a3..2b16f5821292 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerManagementGroupConnection.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerManagementGroupConnection.md @@ -14,7 +14,8 @@ Removes a network manager management group connection. ``` Remove-AzNetworkManagerManagementGroupConnection -ManagementGroupId -Name [-Force] - [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -121,6 +122,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/Remove-AzNetworkManagerScopeConnection.md index 45c552be16e2..8738787e52b1 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerScopeConnection.md @@ -14,8 +14,8 @@ Removes a network manager scope connection. ``` Remove-AzNetworkManagerScopeConnection -Name -NetworkManagerName -ResourceGroupName - [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -122,6 +122,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminConfiguration.md b/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminConfiguration.md index 2d1617b54d27..ea53e6ba8a5e 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminConfiguration.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminConfiguration.md @@ -15,7 +15,8 @@ Removes a security admin configuration. ``` Remove-AzNetworkManagerSecurityAdminConfiguration -Name -NetworkManagerName -ResourceGroupName [-ForceDelete] [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -138,6 +139,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRule.md b/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRule.md index 33e480ca509e..d81da349ef55 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRule.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRule.md @@ -15,8 +15,8 @@ Removes a security admin rule. ``` Remove-AzNetworkManagerSecurityAdminRule -Name -RuleCollectionName -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName - [-ForceDelete] [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-ForceDelete] [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -139,6 +139,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRuleCollection.md b/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRuleCollection.md index 6ff3454dd319..97280c971952 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRuleCollection.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerSecurityAdminRuleCollection.md @@ -15,7 +15,8 @@ Removes a security admin rule collection. ``` Remove-AzNetworkManagerSecurityAdminRuleCollection -Name -SecurityAdminConfigurationName -NetworkManagerName -ResourceGroupName [-ForceDelete] [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -138,6 +139,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerStaticMember.md b/src/Network/Network/help/Remove-AzNetworkManagerStaticMember.md index ac32635c6571..dca12cb1a883 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerStaticMember.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerStaticMember.md @@ -14,8 +14,8 @@ Removes a network manager static member. ``` Remove-AzNetworkManagerStaticMember -Name -NetworkGroupName -NetworkManagerName - -ResourceGroupName [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -ResourceGroupName [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -137,6 +137,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkManagerSubscriptionConnection.md b/src/Network/Network/help/Remove-AzNetworkManagerSubscriptionConnection.md index a16cc9da8352..fb6bd6b5731c 100644 --- a/src/Network/Network/help/Remove-AzNetworkManagerSubscriptionConnection.md +++ b/src/Network/Network/help/Remove-AzNetworkManagerSubscriptionConnection.md @@ -14,7 +14,8 @@ Remove a network manager subscription connection. ``` Remove-AzNetworkManagerSubscriptionConnection -Name [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Remove-AzNetworkProfile.md b/src/Network/Network/help/Remove-AzNetworkProfile.md index d019aaeec90c..321d9d77226a 100644 --- a/src/Network/Network/help/Remove-AzNetworkProfile.md +++ b/src/Network/Network/help/Remove-AzNetworkProfile.md @@ -15,19 +15,22 @@ Removes a network profile. ### RemoveByNameParameterSet (Default) ``` Remove-AzNetworkProfile -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RemoveByResourceIdParameterSet ``` Remove-AzNetworkProfile -ResourceId [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RemoveByInputObjectParameterSet ``` Remove-AzNetworkProfile -InputObject [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -134,6 +137,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the network profile. diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityGroup.md b/src/Network/Network/help/Remove-AzNetworkSecurityGroup.md index ff50f4f15808..b807cb66a7c4 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityGroup.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityGroup.md @@ -15,7 +15,8 @@ Removes a network security group. ``` Remove-AzNetworkSecurityGroup -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of a resource group that this cmdlet removes a network security group from. diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeter.md b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeter.md index 100df88a5fb6..a7747628de22 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeter.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeter.md @@ -15,13 +15,14 @@ Deletes a network security perimeter. ### Delete (Default) ``` Remove-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] - [-DefaultProfile ] [-PassThru] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteViaIdentity ``` Remove-AzNetworkSecurityPerimeter -InputObject [-DefaultProfile ] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -29,17 +30,21 @@ Deletes a network security perimeter. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Deletes a NetworkSecurityPerimeter by Name +```powershell Remove-AzNetworkSecurityPerimeter -Name nsp5 -ResourceGroupName ResourceGroup-1 ``` -### EXAMPLE 2 -``` +Deletes a NetworkSecurityPerimeter by Name + +### Example 2: Deletes a NetworkSecurityPerimeter by identity (using pipe) +```powershell $nspObj = Get-AzNetworkSecurityPerimeter -Name nsp6 -ResourceGroupName ResourceGroup-1 -Remove-AzNetworkSecurityPerimeter -InputObject $nspObj + Remove-AzNetworkSecurityPerimeter -InputObject $nspObj ``` +Deletes a NetworkSecurityPerimeter by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -47,7 +52,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -60,10 +65,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -78,7 +82,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: NetworkSecurityPerimeterName, SecurityPerimeterName, NSPName @@ -93,13 +97,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -108,7 +127,7 @@ Accept wildcard characters: False The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -124,13 +143,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -139,7 +158,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -155,7 +174,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -172,29 +191,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### System.Boolean + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeter](https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeter) - diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAccessRule.md index 381946c3f1de..4758ba5d6fb3 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAccessRule.md @@ -15,28 +15,29 @@ Deletes an NSP access rule. ### Delete (Default) ``` Remove-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName - -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-PassThru] [-WhatIf] - [-Confirm] [] + -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-PassThru] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentityProfile ``` Remove-AzNetworkSecurityPerimeterAccessRule -Name - -ProfileInputObject [-DefaultProfile ] [-PassThru] [-WhatIf] - [-Confirm] [] + -ProfileInputObject [-DefaultProfile ] [-PassThru] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentityNetworkSecurityPerimeter ``` Remove-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzNetworkSecurityPerimeterAccessRule -InputObject - [-DefaultProfile ] [-PassThru] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -44,17 +45,21 @@ Deletes an NSP access rule. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Deletes a NetworkSecurityPerimeterAccessRule by Name +```powershell Remove-AzNetworkSecurityPerimeterAccessRule -Name ar5 -ProfileName profile4 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp4 ``` -### EXAMPLE 2 -``` +Deletes a NetworkSecurityPerimeterAccessRule by Name + +### Example 2: Deletes a NetworkSecurityPerimeterAccessRule by identity (using pipe) +```powershell $accessRuleObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar6 -ProfileName profile4 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp4 -Remove-AzNetworkSecurityPerimeterAccessRule -InputObject $accessRuleObj + Remove-AzNetworkSecurityPerimeterAccessRule -InputObject $accessRuleObj ``` +Deletes a NetworkSecurityPerimeterAccessRule by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -62,7 +67,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -75,10 +80,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -93,7 +97,7 @@ Accept wildcard characters: False The name of the NSP access rule. ```yaml -Type: String +Type: System.String Parameter Sets: Delete, DeleteViaIdentityProfile, DeleteViaIdentityNetworkSecurityPerimeter Aliases: AccessRuleName @@ -106,10 +110,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentityNetworkSecurityPerimeter Aliases: @@ -124,23 +127,22 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` ### -ProfileInputObject Identity Parameter -To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentityProfile Aliases: @@ -155,7 +157,7 @@ Accept wildcard characters: False The name of the NSP profile. ```yaml -Type: String +Type: System.String Parameter Sets: Delete, DeleteViaIdentityNetworkSecurityPerimeter Aliases: SecurityPerimeterProfileName, NSPProfileName @@ -166,11 +168,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -185,7 +202,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: NetworkSecurityPerimeterName, NSPName @@ -201,13 +218,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -216,7 +233,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -232,7 +249,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -249,55 +266,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### System.Boolean -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. - -PROFILEINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeteraccessrule](https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeteraccessrule) - diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAssociation.md b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAssociation.md index 69fa184bd044..8a47b1c28be6 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterAssociation.md @@ -16,20 +16,21 @@ Deletes an NSP association resource. ``` Remove-AzNetworkSecurityPerimeterAssociation -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentityNetworkSecurityPerimeter ``` Remove-AzNetworkSecurityPerimeterAssociation -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] [-AsJob] - [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzNetworkSecurityPerimeterAssociation -InputObject - [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -37,30 +38,34 @@ Deletes an NSP association resource. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Deletes a NetworkSecurityPerimeterAccessAssociation by Name +```powershell Remove-AzNetworkSecurityPerimeterAssociation -Name association4 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp4 ``` -### EXAMPLE 2 -``` +Deletes a NetworkSecurityPerimeterAccessAssociation by Name + +### Example 2: Deletes a NetworkSecurityPerimeterAccessAssociation by identity (using pipe) +```powershell $associationObj = Get-AzNetworkSecurityPerimeterAssociation -Name association5 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp4 -Remove-AzNetworkSecurityPerimeterAssociation -InputObject $associationObj + Remove-AzNetworkSecurityPerimeterAssociation -InputObject $associationObj ``` +Deletes a NetworkSecurityPerimeterAccessAssociation by identity (using pipe) + ## PARAMETERS ### -AsJob Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -70,7 +75,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -83,10 +88,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -101,7 +105,7 @@ Accept wildcard characters: False The name of the NSP association. ```yaml -Type: String +Type: System.String Parameter Sets: Delete, DeleteViaIdentityNetworkSecurityPerimeter Aliases: AssociationName @@ -114,10 +118,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentityNetworkSecurityPerimeter Aliases: @@ -132,13 +135,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -147,13 +150,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -162,7 +180,7 @@ Accept wildcard characters: False The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -177,7 +195,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: NetworkSecurityPerimeterName, NSPName @@ -193,13 +211,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -208,7 +226,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -224,7 +242,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -241,42 +259,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### System.Boolean -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterassociation](https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterassociation) - diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLink.md b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLink.md index 587450acd0eb..e199694687a4 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLink.md @@ -16,20 +16,21 @@ Deletes an NSP Link resource. ``` Remove-AzNetworkSecurityPerimeterLink -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentityNetworkSecurityPerimeter ``` Remove-AzNetworkSecurityPerimeterLink -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] [-AsJob] - [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzNetworkSecurityPerimeterLink -InputObject - [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -37,30 +38,34 @@ Deletes an NSP Link resource. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Remove network security perimeter link +```powershell Remove-AzNetworkSecurityPerimeterLink -Name t-linkD3 -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp8 ``` -### EXAMPLE 2 -``` +Remove network security perimeter link + +### Example 2: Remove network security perimeter link via identity +```powershell $linkObj = Get-AzNetworkSecurityPerimeterLink -Name t-linkD4 -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp10 Remove-AzNetworkSecurityPerimeterLink -InputObject $linkObj ``` +Remove network security perimeter link via identity + ## PARAMETERS ### -AsJob Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -70,7 +75,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -83,10 +88,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -101,7 +105,7 @@ Accept wildcard characters: False The name of the NSP link. ```yaml -Type: String +Type: System.String Parameter Sets: Delete, DeleteViaIdentityNetworkSecurityPerimeter Aliases: LinkName @@ -114,10 +118,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentityNetworkSecurityPerimeter Aliases: @@ -132,13 +135,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -147,13 +150,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -162,7 +180,7 @@ Accept wildcard characters: False The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -177,7 +195,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: NetworkSecurityPerimeterName, NSPName @@ -193,13 +211,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -208,7 +226,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -224,7 +242,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -241,42 +259,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### System.Boolean -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterlink](https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterlink) - diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLinkReference.md b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLinkReference.md index 7ede664055b5..c5d87913feb5 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLinkReference.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterLinkReference.md @@ -16,20 +16,21 @@ Deletes an NSP LinkReference resource. ``` Remove-AzNetworkSecurityPerimeterLinkReference -Name -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentityNetworkSecurityPerimeter ``` Remove-AzNetworkSecurityPerimeterLinkReference -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] [-AsJob] - [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzNetworkSecurityPerimeterLinkReference -InputObject - [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-AsJob] [-NoWait] [-PassThru] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -37,30 +38,34 @@ Deletes an NSP LinkReference resource. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Removes a network security perimeter link reference +```powershell Remove-AzNetworkSecurityPerimeterLinkReference -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp3 -Name Ref-from-t-link1-1738a5f3-78f8-4f1b-8f30-ffe0eaa74495 ``` -### EXAMPLE 2 -``` +Removes a network security perimeter link reference + +### Example 2: Removes a network security perimeter link reference via identity +```powershell $linkRefObj = Get-AzNetworkSecurityPerimeterLinkReference -ResourceGroupName psrg_Ex -SecurityPerimeterName ext-nsp11 -Name Ref-from-t-linkD4-902f9e36-84c2-43d6-983d-677f70568a30 -Remove-AzNetworkSecurityPerimeterLinkReference -InputObject $linkRefObj + Remove-AzNetworkSecurityPerimeterLinkReference -InputObject $linkRefObj ``` +Removes a network security perimeter link reference via identity + ## PARAMETERS ### -AsJob Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -70,7 +75,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -83,10 +88,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -101,7 +105,7 @@ Accept wildcard characters: False The name of the NSP linkReference. ```yaml -Type: String +Type: System.String Parameter Sets: Delete, DeleteViaIdentityNetworkSecurityPerimeter Aliases: LinkReferenceName @@ -114,10 +118,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentityNetworkSecurityPerimeter Aliases: @@ -132,13 +135,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -147,13 +150,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -162,7 +180,7 @@ Accept wildcard characters: False The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -177,7 +195,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: NetworkSecurityPerimeterName, NSPName @@ -193,13 +211,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -208,7 +226,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -224,7 +242,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -241,42 +259,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### System.Boolean -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterlinkreference](https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterlinkreference) - diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterProfile.md b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterProfile.md index c5ef198fc503..a7d8a0c687af 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterProfile.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityPerimeterProfile.md @@ -15,21 +15,22 @@ Deletes an NSP profile. ### Delete (Default) ``` Remove-AzNetworkSecurityPerimeterProfile -Name -ResourceGroupName - -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-PassThru] [-WhatIf] - [-Confirm] [] + -SecurityPerimeterName [-SubscriptionId ] [-DefaultProfile ] [-PassThru] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentityNetworkSecurityPerimeter ``` Remove-AzNetworkSecurityPerimeterProfile -Name -NetworkSecurityPerimeterInputObject [-DefaultProfile ] - [-PassThru] [-WhatIf] [-Confirm] [] + [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### DeleteViaIdentity ``` Remove-AzNetworkSecurityPerimeterProfile -InputObject - [-DefaultProfile ] [-PassThru] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-PassThru] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -37,17 +38,21 @@ Deletes an NSP profile. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Deletes a NetworkSecurityPerimeterProfile by Name +```powershell Remove-AzNetworkSecurityPerimeterProfile -Name profile6 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp4 ``` -### EXAMPLE 2 -``` +Deletes a NetworkSecurityPerimeterProfile by Name + +### Example 2: Deletes a NetworkSecurityPerimeterProfile by identity (using pipe) +```powershell $profileObj = Get-AzNetworkSecurityPerimeterProfile -Name profile7 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp4 -Remove-AzNetworkSecurityPerimeterProfile -InputObject $profileObj + Remove-AzNetworkSecurityPerimeterProfile -InputObject $profileObj ``` +Deletes a NetworkSecurityPerimeterProfile by identity (using pipe) + ## PARAMETERS ### -DefaultProfile @@ -55,7 +60,7 @@ The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -68,10 +73,9 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentity Aliases: @@ -86,7 +90,7 @@ Accept wildcard characters: False The name of the NSP profile. ```yaml -Type: String +Type: System.String Parameter Sets: Delete, DeleteViaIdentityNetworkSecurityPerimeter Aliases: ProfileName @@ -99,10 +103,9 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: DeleteViaIdentityNetworkSecurityPerimeter Aliases: @@ -117,13 +120,28 @@ Accept wildcard characters: False Returns true when the command succeeds ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -132,7 +150,7 @@ Accept wildcard characters: False The name of the resource group. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: @@ -147,7 +165,7 @@ Accept wildcard characters: False The name of the network security perimeter. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: NetworkSecurityPerimeterName, NSPName @@ -163,13 +181,13 @@ The subscription credentials which uniquely identify the Microsoft Azure subscri The subscription ID forms part of the URI for every service call. ```yaml -Type: String +Type: System.String Parameter Sets: Delete Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -178,7 +196,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -194,7 +212,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -211,42 +229,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### System.Boolean -## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. -NETWORKSECURITYPERIMETERINPUTOBJECT \: Identity Parameter - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. +## NOTES ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterprofile](https://learn.microsoft.com/powershell/module/az.network/remove-aznetworksecurityperimeterprofile) - diff --git a/src/Network/Network/help/Remove-AzNetworkSecurityRuleConfig.md b/src/Network/Network/help/Remove-AzNetworkSecurityRuleConfig.md index 72c511a81843..1ad778d9833d 100644 --- a/src/Network/Network/help/Remove-AzNetworkSecurityRuleConfig.md +++ b/src/Network/Network/help/Remove-AzNetworkSecurityRuleConfig.md @@ -15,7 +15,7 @@ Removes a network security rule from a network security group. ``` Remove-AzNetworkSecurityRuleConfig [-Name ] -NetworkSecurityGroup - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -84,6 +84,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Remove-AzNetworkVirtualAppliance.md b/src/Network/Network/help/Remove-AzNetworkVirtualAppliance.md index ad488ee043e9..3a5227c9fb38 100644 --- a/src/Network/Network/help/Remove-AzNetworkVirtualAppliance.md +++ b/src/Network/Network/help/Remove-AzNetworkVirtualAppliance.md @@ -15,19 +15,22 @@ Remove a Network Virtual Appliance resource. ### ResourceNameParameterSet (Default) ``` Remove-AzNetworkVirtualAppliance -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceIdParameterSet ``` Remove-AzNetworkVirtualAppliance -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceObjectParameterSet ``` Remove-AzNetworkVirtualAppliance -NetworkVirtualAppliance [-Force] [-PassThru] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -134,6 +137,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkWatcher.md b/src/Network/Network/help/Remove-AzNetworkWatcher.md index 93036ab8d428..d36cf7b1271b 100644 --- a/src/Network/Network/help/Remove-AzNetworkWatcher.md +++ b/src/Network/Network/help/Remove-AzNetworkWatcher.md @@ -15,19 +15,21 @@ Removes a Network Watcher. ### SetByResource ``` Remove-AzNetworkWatcher -NetworkWatcher [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByName ``` Remove-AzNetworkWatcher -Name -ResourceGroupName [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` Remove-AzNetworkWatcher -Location [-PassThru] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -137,6 +139,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzNetworkWatcherConnectionMonitor.md b/src/Network/Network/help/Remove-AzNetworkWatcherConnectionMonitor.md index 423c3f47f8ab..8a1b41549d3f 100644 --- a/src/Network/Network/help/Remove-AzNetworkWatcherConnectionMonitor.md +++ b/src/Network/Network/help/Remove-AzNetworkWatcherConnectionMonitor.md @@ -15,32 +15,36 @@ Remove connection monitor. ### SetByName (Default) ``` Remove-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName - -Name [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -Name [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResource ``` Remove-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` Remove-AzNetworkWatcherConnectionMonitor -Location -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` Remove-AzNetworkWatcherConnectionMonitor -ResourceId [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObject ``` Remove-AzNetworkWatcherConnectionMonitor -InputObject [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -188,6 +192,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Remove-AzNetworkWatcherFlowLog.md b/src/Network/Network/help/Remove-AzNetworkWatcherFlowLog.md index 5bb07aaf414b..a4a9ba09997a 100644 --- a/src/Network/Network/help/Remove-AzNetworkWatcherFlowLog.md +++ b/src/Network/Network/help/Remove-AzNetworkWatcherFlowLog.md @@ -15,31 +15,36 @@ Deletes the specified flow log resource. ### SetByName (Default) ``` Remove-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -Name - [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByResource ``` Remove-AzNetworkWatcherFlowLog -NetworkWatcher -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` Remove-AzNetworkWatcherFlowLog -Location -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` Remove-AzNetworkWatcherFlowLog -ResourceId [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObject ``` Remove-AzNetworkWatcherFlowLog -InputObject [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -174,6 +179,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Remove-AzNetworkWatcherPacketCapture.md b/src/Network/Network/help/Remove-AzNetworkWatcherPacketCapture.md index 57ad21e379d2..ce7af683e676 100644 --- a/src/Network/Network/help/Remove-AzNetworkWatcherPacketCapture.md +++ b/src/Network/Network/help/Remove-AzNetworkWatcherPacketCapture.md @@ -15,20 +15,22 @@ Removes a packet capture resource. ### SetByResource (Default) ``` Remove-AzNetworkWatcherPacketCapture -NetworkWatcher -PacketCaptureName [-PassThru] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByName ``` Remove-AzNetworkWatcherPacketCapture -NetworkWatcherName -ResourceGroupName - -PacketCaptureName [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -PacketCaptureName [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByLocation ``` Remove-AzNetworkWatcherPacketCapture -Location -PacketCaptureName [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -152,6 +154,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Remove-AzP2sVpnGateway.md b/src/Network/Network/help/Remove-AzP2sVpnGateway.md index 7a866db1b3a7..ce19e87fc9a3 100644 --- a/src/Network/Network/help/Remove-AzP2sVpnGateway.md +++ b/src/Network/Network/help/Remove-AzP2sVpnGateway.md @@ -15,19 +15,21 @@ Removes an existing P2SVpnGateway. ### ByP2SVpnGatewayName (Default) ``` Remove-AzP2sVpnGateway -ResourceGroupName -Name [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByP2SVpnGatewayObject ``` Remove-AzP2sVpnGateway -InputObject [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByP2SVpnGatewayResourceId ``` Remove-AzP2sVpnGateway -ResourceId [-PassThru] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -119,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzPrivateDnsZoneGroup.md b/src/Network/Network/help/Remove-AzPrivateDnsZoneGroup.md index 98741921b218..0acee4db8bd2 100644 --- a/src/Network/Network/help/Remove-AzPrivateDnsZoneGroup.md +++ b/src/Network/Network/help/Remove-AzPrivateDnsZoneGroup.md @@ -14,7 +14,8 @@ Removes a DNS zone group. ``` Remove-AzPrivateDnsZoneGroup -ResourceGroupName -PrivateEndpointName -Name [-Force] - [-AsJob] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -121,6 +122,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. diff --git a/src/Network/Network/help/Remove-AzPrivateEndpoint.md b/src/Network/Network/help/Remove-AzPrivateEndpoint.md index cee6aa7ef8d0..81fc3e0ba3cd 100644 --- a/src/Network/Network/help/Remove-AzPrivateEndpoint.md +++ b/src/Network/Network/help/Remove-AzPrivateEndpoint.md @@ -14,7 +14,8 @@ Removes a private endpoint. ``` Remove-AzPrivateEndpoint -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -107,6 +108,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the private endpoint. diff --git a/src/Network/Network/help/Remove-AzPrivateEndpointConnection.md b/src/Network/Network/help/Remove-AzPrivateEndpointConnection.md index 0e83b9e2b0a9..2ae81e12eefe 100644 --- a/src/Network/Network/help/Remove-AzPrivateEndpointConnection.md +++ b/src/Network/Network/help/Remove-AzPrivateEndpointConnection.md @@ -15,14 +15,16 @@ Removes a private endpoint connection. ### ByResourceId (Default) ``` Remove-AzPrivateEndpointConnection [-Description ] [-Force] [-AsJob] [-PassThru] -ResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResource ``` Remove-AzPrivateEndpointConnection -Name [-Description ] [-Force] [-AsJob] [-PassThru] - -ResourceGroupName -ServiceName [-DefaultProfile ] [-WhatIf] - [-Confirm] -PrivateLinkResourceType [] + -ResourceGroupName -ServiceName [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] -PrivateLinkResourceType + [] ``` ## DESCRIPTION @@ -146,6 +148,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the private endpoint connection. diff --git a/src/Network/Network/help/Remove-AzPrivateLinkService.md b/src/Network/Network/help/Remove-AzPrivateLinkService.md index 59f44ad685d1..25c90634b489 100644 --- a/src/Network/Network/help/Remove-AzPrivateLinkService.md +++ b/src/Network/Network/help/Remove-AzPrivateLinkService.md @@ -14,7 +14,8 @@ Removes a private link service ``` Remove-AzPrivateLinkService -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -107,6 +108,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the private link service. diff --git a/src/Network/Network/help/Remove-AzPublicIpAddress.md b/src/Network/Network/help/Remove-AzPublicIpAddress.md index 4a152e05b62b..c314508796d4 100644 --- a/src/Network/Network/help/Remove-AzPublicIpAddress.md +++ b/src/Network/Network/help/Remove-AzPublicIpAddress.md @@ -15,7 +15,8 @@ Removes a public IP address. ``` Remove-AzPublicIpAddress -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the public IP address that this cmdlet removes. diff --git a/src/Network/Network/help/Remove-AzPublicIpPrefix.md b/src/Network/Network/help/Remove-AzPublicIpPrefix.md index e096da9e3154..41eeb6625ebc 100644 --- a/src/Network/Network/help/Remove-AzPublicIpPrefix.md +++ b/src/Network/Network/help/Remove-AzPublicIpPrefix.md @@ -15,19 +15,22 @@ Removes a public IP prefix ### RemoveByNameParameterSet (Default) ``` Remove-AzPublicIpPrefix -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzPublicIpPrefix -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzPublicIpPrefix -InputObject [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -135,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzRouteConfig.md b/src/Network/Network/help/Remove-AzRouteConfig.md index 62db6d1f1c7c..d563feff3805 100644 --- a/src/Network/Network/help/Remove-AzRouteConfig.md +++ b/src/Network/Network/help/Remove-AzRouteConfig.md @@ -15,7 +15,7 @@ Removes a route from a route table. ``` Remove-AzRouteConfig -RouteTable [-Name ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -89,6 +89,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteTable Specifies the route table that contains the route that this cmdlet deletes. diff --git a/src/Network/Network/help/Remove-AzRouteFilter.md b/src/Network/Network/help/Remove-AzRouteFilter.md index 7ed25e299afd..2e193aa2cc0d 100644 --- a/src/Network/Network/help/Remove-AzRouteFilter.md +++ b/src/Network/Network/help/Remove-AzRouteFilter.md @@ -14,7 +14,8 @@ Removes a route filter. ``` Remove-AzRouteFilter -Name -ResourceGroupName [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -91,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzRouteFilterRuleConfig.md b/src/Network/Network/help/Remove-AzRouteFilterRuleConfig.md index 919b86bfeaeb..841ba4bd2df2 100644 --- a/src/Network/Network/help/Remove-AzRouteFilterRuleConfig.md +++ b/src/Network/Network/help/Remove-AzRouteFilterRuleConfig.md @@ -14,7 +14,8 @@ Removes a route filter rule from a route filter. ``` Remove-AzRouteFilterRuleConfig -Name -RouteFilter [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -78,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter The RouteFilter diff --git a/src/Network/Network/help/Remove-AzRouteMap.md b/src/Network/Network/help/Remove-AzRouteMap.md index 932076ce69c0..e99e822aec92 100644 --- a/src/Network/Network/help/Remove-AzRouteMap.md +++ b/src/Network/Network/help/Remove-AzRouteMap.md @@ -15,25 +15,29 @@ Remove a route map from a VirtualHub. ### ByRouteMapName (Default) ``` Remove-AzRouteMap [-ResourceGroupName ] [-VirtualHubName ] [-Name ] [-AsJob] [-Force] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVirtualHubObject ``` Remove-AzRouteMap [-Name ] [-VirtualHubObject ] [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRouteMapObject ``` Remove-AzRouteMap [-InputObject ] [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRouteMapResourceId ``` Remove-AzRouteMap [-ResourceId ] [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -157,6 +161,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzRouteServer.md b/src/Network/Network/help/Remove-AzRouteServer.md index bc9ad7fae816..7cffbf143153 100644 --- a/src/Network/Network/help/Remove-AzRouteServer.md +++ b/src/Network/Network/help/Remove-AzRouteServer.md @@ -15,19 +15,22 @@ Deletes an Azure RouteServer. ### RouteServerNameParameterSet (Default) ``` Remove-AzRouteServer -ResourceGroupName -RouteServerName [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RouteServerInputObjectParameterSet ``` Remove-AzRouteServer -InputObject [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RouteServerResourceIdParameterSet ``` Remove-AzRouteServer -ResourceId [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -129,6 +132,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server. diff --git a/src/Network/Network/help/Remove-AzRouteServerPeer.md b/src/Network/Network/help/Remove-AzRouteServerPeer.md index b7a4de101300..d816658574ac 100644 --- a/src/Network/Network/help/Remove-AzRouteServerPeer.md +++ b/src/Network/Network/help/Remove-AzRouteServerPeer.md @@ -15,19 +15,21 @@ Removes a Peer from an Azure RouteServer ### RouteServerNPeerNameParameterSet (Default) ``` Remove-AzRouteServerPeer -ResourceGroupName -PeerName -RouteServerName [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RouteServerNPeerInputObjectParameterSet ``` Remove-AzRouteServerPeer -InputObject [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RouteServerNPeerResourceIdParameterSet ``` Remove-AzRouteServerPeer -ResourceId [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -129,6 +131,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server/peer. diff --git a/src/Network/Network/help/Remove-AzRouteTable.md b/src/Network/Network/help/Remove-AzRouteTable.md index b40669544944..81e3c42ac59c 100644 --- a/src/Network/Network/help/Remove-AzRouteTable.md +++ b/src/Network/Network/help/Remove-AzRouteTable.md @@ -15,7 +15,8 @@ Removes a route table. ``` Remove-AzRouteTable -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -115,6 +116,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the route table that this cmdlet removes. diff --git a/src/Network/Network/help/Remove-AzRoutingIntent.md b/src/Network/Network/help/Remove-AzRoutingIntent.md index 74dce8968f19..246aea2eea30 100644 --- a/src/Network/Network/help/Remove-AzRoutingIntent.md +++ b/src/Network/Network/help/Remove-AzRoutingIntent.md @@ -15,25 +15,29 @@ Delete a routing intent resource associated with a VirtualHub. ### ByRoutingIntentName (Default) ``` Remove-AzRoutingIntent -ResourceGroupName -ParentResourceName -Name [-AsJob] - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVirtualHubObject ``` Remove-AzRoutingIntent -Name -ParentObject [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRoutingIntentObject ``` Remove-AzRoutingIntent -InputObject [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRoutingIntentResourceId ``` Remove-AzRoutingIntent -ResourceId [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -171,6 +175,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzRoutingPolicy.md b/src/Network/Network/help/Remove-AzRoutingPolicy.md index a6b8c4d9e059..c125afc6c072 100644 --- a/src/Network/Network/help/Remove-AzRoutingPolicy.md +++ b/src/Network/Network/help/Remove-AzRoutingPolicy.md @@ -14,7 +14,8 @@ Removes the specified routing policy from a routing intent resource associated w ``` Remove-AzRoutingPolicy -RoutingIntent -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -98,6 +99,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutingIntent The routing intent object from which this rouing policy has to be removed. diff --git a/src/Network/Network/help/Remove-AzSecurityPartnerProvider.md b/src/Network/Network/help/Remove-AzSecurityPartnerProvider.md index ed6151b87367..d43ad36beb4f 100644 --- a/src/Network/Network/help/Remove-AzSecurityPartnerProvider.md +++ b/src/Network/Network/help/Remove-AzSecurityPartnerProvider.md @@ -15,19 +15,22 @@ Deletes an Azure SecurityPartnerProvider. ### SecurityPartnerProviderNameParameterSet (Default) ``` Remove-AzSecurityPartnerProvider -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SecurityPartnerProviderInputObjectParameterSet ``` Remove-AzSecurityPartnerProvider -SecurityPartnerProvider [-Force] [-PassThru] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SecurityPartnerProviderResourceIdParameterSet ``` Remove-AzSecurityPartnerProvider -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -117,6 +120,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzServiceEndpointPolicy.md b/src/Network/Network/help/Remove-AzServiceEndpointPolicy.md index 88463085e144..f9c6b80687ca 100644 --- a/src/Network/Network/help/Remove-AzServiceEndpointPolicy.md +++ b/src/Network/Network/help/Remove-AzServiceEndpointPolicy.md @@ -15,19 +15,22 @@ Removes a service endpoint policy. ### RemoveByNameParameterSet (Default) ``` Remove-AzServiceEndpointPolicy -Name -ResourceGroupName [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzServiceEndpointPolicy -ResourceId [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzServiceEndpointPolicy -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -126,6 +129,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzServiceEndpointPolicyDefinition.md b/src/Network/Network/help/Remove-AzServiceEndpointPolicyDefinition.md index 2677030bba8c..1e125c3a2ccb 100644 --- a/src/Network/Network/help/Remove-AzServiceEndpointPolicyDefinition.md +++ b/src/Network/Network/help/Remove-AzServiceEndpointPolicyDefinition.md @@ -15,20 +15,22 @@ Removes a service endpoint policy definition. ### RemoveByNameParameterSet (Default) ``` Remove-AzServiceEndpointPolicyDefinition [-Name ] -ServiceEndpointPolicy - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzServiceEndpointPolicyDefinition -ResourceId -ServiceEndpointPolicy - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzServiceEndpointPolicyDefinition -InputObject - -ServiceEndpointPolicy [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -ServiceEndpointPolicy [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -90,6 +92,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId The ID of the service endpoint definition. diff --git a/src/Network/Network/help/Remove-AzVHubRouteTable.md b/src/Network/Network/help/Remove-AzVHubRouteTable.md index 4a117cbf5935..4e84c609fcea 100644 --- a/src/Network/Network/help/Remove-AzVHubRouteTable.md +++ b/src/Network/Network/help/Remove-AzVHubRouteTable.md @@ -15,25 +15,29 @@ Delete a hub route table resource associated with a VirtualHub. ### ByVHubRouteTableName (Default) ``` Remove-AzVHubRouteTable -ResourceGroupName -ParentResourceName -Name [-AsJob] - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVirtualHubObject ``` Remove-AzVHubRouteTable -Name -ParentObject [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVHubRouteTableObject ``` Remove-AzVHubRouteTable -InputObject [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVHubRouteTableResourceId ``` Remove-AzVHubRouteTable -ResourceId [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -171,6 +175,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualApplianceSite.md b/src/Network/Network/help/Remove-AzVirtualApplianceSite.md index 89153156f3a6..a723e4d3f222 100644 --- a/src/Network/Network/help/Remove-AzVirtualApplianceSite.md +++ b/src/Network/Network/help/Remove-AzVirtualApplianceSite.md @@ -15,20 +15,22 @@ Remove a virtual appliance site from a Network Virtual Appliance resource. ### ResourceNameParameterSet (Default) ``` Remove-AzVirtualApplianceSite -Name -NetworkVirtualApplianceId -ResourceGroupName - [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Force] [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ResourceIdParameterSet ``` Remove-AzVirtualApplianceSite -ResourceId [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceObjectParameterSet ``` Remove-AzVirtualApplianceSite -VirtualApplianceSite [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -135,6 +137,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualHub.md b/src/Network/Network/help/Remove-AzVirtualHub.md index f7dcb3f933ca..53a321811423 100644 --- a/src/Network/Network/help/Remove-AzVirtualHub.md +++ b/src/Network/Network/help/Remove-AzVirtualHub.md @@ -15,19 +15,22 @@ Removes an Azure VirtualHub resource. ### ByVirtualHubName (Default) ``` Remove-AzVirtualHub -ResourceGroupName -Name [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId ``` Remove-AzVirtualHub -ResourceId [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObject ``` Remove-AzVirtualHub -InputObject [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -167,6 +170,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualHubBgpConnection.md b/src/Network/Network/help/Remove-AzVirtualHubBgpConnection.md index f01091826acb..d41c615408ca 100644 --- a/src/Network/Network/help/Remove-AzVirtualHubBgpConnection.md +++ b/src/Network/Network/help/Remove-AzVirtualHubBgpConnection.md @@ -15,25 +15,29 @@ The Remove-AzVirtualHubBgpConnection cmdlet removes a HubBgpConnection resource ### ByVirtualHubName (Default) ``` Remove-AzVirtualHubBgpConnection -ResourceGroupName -VirtualHubName -Name [-AsJob] - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVirtualHubObject ``` Remove-AzVirtualHubBgpConnection -Name -VirtualHub [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubBgpConnectionObject ``` Remove-AzVirtualHubBgpConnection -InputObject [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubBgpConnectionResourceId ``` Remove-AzVirtualHubBgpConnection -ResourceId [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -155,6 +159,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualHubRouteTable.md b/src/Network/Network/help/Remove-AzVirtualHubRouteTable.md index 5259d000e9a5..98b55bd94098 100644 --- a/src/Network/Network/help/Remove-AzVirtualHubRouteTable.md +++ b/src/Network/Network/help/Remove-AzVirtualHubRouteTable.md @@ -15,25 +15,29 @@ Delete a virtual hub route table resource associated with a virtual hub. ### ByVirtualHubRouteTableName (Default) ``` Remove-AzVirtualHubRouteTable -ResourceGroupName -HubName -Name [-AsJob] [-Force] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVirtualHubObject ``` Remove-AzVirtualHubRouteTable -Name -VirtualHub [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubRouteTableObject ``` Remove-AzVirtualHubRouteTable [-InputObject ] [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubRouteTableResourceId ``` Remove-AzVirtualHubRouteTable -ResourceId [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -155,6 +159,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualHubVnetConnection.md b/src/Network/Network/help/Remove-AzVirtualHubVnetConnection.md index 9fd7020eba17..06f82b9da59a 100644 --- a/src/Network/Network/help/Remove-AzVirtualHubVnetConnection.md +++ b/src/Network/Network/help/Remove-AzVirtualHubVnetConnection.md @@ -15,20 +15,22 @@ The Remove-AzVirtualHubVnetConnection cmdlet removes an Azure Virtual Network Co ### ByHubVirtualNetworkConnectionName (Default) ``` Remove-AzVirtualHubVnetConnection -ResourceGroupName -ParentResourceName -Name - [-AsJob] [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-AsJob] [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByHubVirtualNetworkConnectionObject ``` Remove-AzVirtualHubVnetConnection [-InputObject ] [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubVirtualNetworkConnectionResourceId ``` Remove-AzVirtualHubVnetConnection -ResourceId [-AsJob] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -178,6 +180,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualNetwork.md b/src/Network/Network/help/Remove-AzVirtualNetwork.md index c085345da7cd..4c644cb7955a 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetwork.md +++ b/src/Network/Network/help/Remove-AzVirtualNetwork.md @@ -15,7 +15,8 @@ Removes a virtual network. ``` Remove-AzVirtualNetwork -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -114,6 +115,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the virtual network that this cmdlet removes. diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkGateway.md b/src/Network/Network/help/Remove-AzVirtualNetworkGateway.md index 48c1797f2e81..12f238cf7ebf 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkGateway.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkGateway.md @@ -15,7 +15,8 @@ Deletes a Virtual Network Gateway ``` Remove-AzVirtualNetworkGateway -Name -ResourceGroupName [-Force] [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -110,6 +111,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the virtual network gateway. diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayConnection.md b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayConnection.md index b2889f4a904b..ca0ec8ca6c87 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayConnection.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayConnection.md @@ -15,7 +15,8 @@ Deletes a Virtual Network Gateway Connection ``` Remove-AzVirtualNetworkGatewayConnection -Name -ResourceGroupName [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -94,6 +95,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that contains the virtual network gateway connection. diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayDefaultSite.md b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayDefaultSite.md index 21a4f2e49cca..7ffef2d6847c 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayDefaultSite.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayDefaultSite.md @@ -15,7 +15,7 @@ Removes the default site from a virtual network gateway. ``` Remove-AzVirtualNetworkGatewayDefaultSite -VirtualNetworkGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -54,6 +54,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkGateway Specifies an object reference to the virtual network gateway containing the default site to be removed. You can create an object reference to a virtual network gateway by using the Get-AzVirtualNetworkGateway and specifying the name of the gateway. diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayIpConfig.md b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayIpConfig.md index f8090ed8290c..a4a8aeb27a9c 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayIpConfig.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayIpConfig.md @@ -15,7 +15,8 @@ Removes an IP Configuration from a Virtual Network Gateway ``` Remove-AzVirtualNetworkGatewayIpConfig -VirtualNetworkGateway -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -103,6 +104,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkGateway ```yaml Type: Microsoft.Azure.Commands.Network.Models.PSVirtualNetworkGateway diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayNatRule.md b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayNatRule.md index 29cb55bd2bd9..b196de25cf60 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkGatewayNatRule.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkGatewayNatRule.md @@ -15,19 +15,22 @@ Removes or Delete a Virtual Network Gateway NatRule. ### ByVirtualNetworkGatewayNatRuleName (Default) ``` Remove-AzVirtualNetworkGatewayNatRule -ResourceGroupName -ParentResourceName -Name - [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVirtualNetworkGatewayNatRuleResourceId ``` Remove-AzVirtualNetworkGatewayNatRule -ResourceId [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualNetworkGatewayNatRuleObject ``` Remove-AzVirtualNetworkGatewayNatRule -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -138,6 +141,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkPeering.md b/src/Network/Network/help/Remove-AzVirtualNetworkPeering.md index f57b9e687a40..49efae42c7a1 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkPeering.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkPeering.md @@ -15,7 +15,8 @@ Removes a virtual network peering. ``` Remove-AzVirtualNetworkPeering -VirtualNetworkName -Name -ResourceGroupName [-Force] - [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -108,6 +109,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkSubnetConfig.md b/src/Network/Network/help/Remove-AzVirtualNetworkSubnetConfig.md index f61c35d573b1..6b9e0c1a4856 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkSubnetConfig.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkSubnetConfig.md @@ -15,7 +15,7 @@ Removes a subnet configuration from a virtual network. ``` Remove-AzVirtualNetworkSubnetConfig [-Name ] -VirtualNetwork - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -73,6 +73,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetwork Specifies the **VirtualNetwork** object that contains the subnet configuration to remove. diff --git a/src/Network/Network/help/Remove-AzVirtualNetworkTap.md b/src/Network/Network/help/Remove-AzVirtualNetworkTap.md index 994d0c758545..e875c49bc3e4 100644 --- a/src/Network/Network/help/Remove-AzVirtualNetworkTap.md +++ b/src/Network/Network/help/Remove-AzVirtualNetworkTap.md @@ -15,19 +15,22 @@ Removes a virtual network tap. ### RemoveByNameParameterSet (Default) ``` Remove-AzVirtualNetworkTap -ResourceGroupName -Name [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByResourceIdParameterSet ``` Remove-AzVirtualNetworkTap -ResourceId [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### DeleteByInputObjectParameterSet ``` Remove-AzVirtualNetworkTap -InputObject [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -136,6 +139,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual network tap. diff --git a/src/Network/Network/help/Remove-AzVirtualRouter.md b/src/Network/Network/help/Remove-AzVirtualRouter.md index c8c34e1607a1..a9cbed13bbac 100644 --- a/src/Network/Network/help/Remove-AzVirtualRouter.md +++ b/src/Network/Network/help/Remove-AzVirtualRouter.md @@ -15,19 +15,22 @@ Deletes an Azure VirtualRouter. ### VirtualRouterNameParameterSet (Default) ``` Remove-AzVirtualRouter -ResourceGroupName -RouterName [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### VirtualRouterInputObjectParameterSet ``` Remove-AzVirtualRouter -InputObject [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### VirtualRouterResourceIdParameterSet ``` Remove-AzVirtualRouter -ResourceId [-Force] [-AsJob] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -129,6 +132,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router. diff --git a/src/Network/Network/help/Remove-AzVirtualRouterPeer.md b/src/Network/Network/help/Remove-AzVirtualRouterPeer.md index 2d2fe88e1ea1..73e5ecd23f39 100644 --- a/src/Network/Network/help/Remove-AzVirtualRouterPeer.md +++ b/src/Network/Network/help/Remove-AzVirtualRouterPeer.md @@ -15,19 +15,21 @@ Removes a Peer from an Azure VirtualRouter ### VirtualRouterPeerNameParameterSet (Default) ``` Remove-AzVirtualRouterPeer -ResourceGroupName -PeerName -VirtualRouterName [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### VirtualRouterPeerObjectParameterSet ``` Remove-AzVirtualRouterPeer -InputObject [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### VirtualRouterPeerResourceIdParameterSet ``` Remove-AzVirtualRouterPeer -ResourceId [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -129,6 +131,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router/peer. diff --git a/src/Network/Network/help/Remove-AzVirtualWan.md b/src/Network/Network/help/Remove-AzVirtualWan.md index 039e0d692dd7..2efce1f49efe 100644 --- a/src/Network/Network/help/Remove-AzVirtualWan.md +++ b/src/Network/Network/help/Remove-AzVirtualWan.md @@ -15,19 +15,20 @@ Removes an Azure Virtual WAN. ### ByVirtualWanName (Default) ``` Remove-AzVirtualWan -ResourceGroupName -Name [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanObject ``` Remove-AzVirtualWan -InputObject [-Force] [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualWanResourceId ``` Remove-AzVirtualWan -ResourceId [-Force] [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -146,6 +147,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVpnClientIpsecParameter.md b/src/Network/Network/help/Remove-AzVpnClientIpsecParameter.md index f07f6c7c60ca..28e52587fb75 100644 --- a/src/Network/Network/help/Remove-AzVpnClientIpsecParameter.md +++ b/src/Network/Network/help/Remove-AzVpnClientIpsecParameter.md @@ -15,19 +15,21 @@ Removes Vpn custom ipsec policy set on Virtual Network Gateway resource. ### ByFactoryName (Default) ``` Remove-AzVpnClientIpsecParameter -VirtualNetworkGatewayName -ResourceGroupName - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByFactoryObject ``` Remove-AzVpnClientIpsecParameter -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId ``` -Remove-AzVpnClientIpsecParameter -ResourceId [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Remove-AzVpnClientIpsecParameter -ResourceId [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -76,6 +78,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVpnClientRevokedCertificate.md b/src/Network/Network/help/Remove-AzVpnClientRevokedCertificate.md index 4a3b00bc18cd..66fbb5a9afc3 100644 --- a/src/Network/Network/help/Remove-AzVpnClientRevokedCertificate.md +++ b/src/Network/Network/help/Remove-AzVpnClientRevokedCertificate.md @@ -16,7 +16,7 @@ Removes a VPN client-revocation certificate. ``` Remove-AzVpnClientRevokedCertificate -VpnClientRevokedCertificateName -VirtualNetworkGatewayName -ResourceGroupName -Thumbprint - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -51,6 +51,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that the virtual network gateway is assigned to. Resource groups categorize items to help simplify inventory management and general Azure administration. diff --git a/src/Network/Network/help/Remove-AzVpnClientRootCertificate.md b/src/Network/Network/help/Remove-AzVpnClientRootCertificate.md index 9f7ab161c44d..2df98374ae12 100644 --- a/src/Network/Network/help/Remove-AzVpnClientRootCertificate.md +++ b/src/Network/Network/help/Remove-AzVpnClientRootCertificate.md @@ -16,7 +16,7 @@ Removes an existing VPN client root certificate. ``` Remove-AzVpnClientRootCertificate -VpnClientRootCertificateName -VirtualNetworkGatewayName -ResourceGroupName -PublicCertData [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -58,6 +58,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicCertData Specifies the text representation of the root certificate to be removed. To obtain the text representation, export your certificate in .cer format (using Base64) encoding, then open the resulting file in a text editor. diff --git a/src/Network/Network/help/Remove-AzVpnConnection.md b/src/Network/Network/help/Remove-AzVpnConnection.md index 8f53c6539848..a5994cc4a0c7 100644 --- a/src/Network/Network/help/Remove-AzVpnConnection.md +++ b/src/Network/Network/help/Remove-AzVpnConnection.md @@ -15,19 +15,21 @@ Removes a VpnConnection. ### ByVpnConnectionName (Default) ``` Remove-AzVpnConnection -ResourceGroupName -ParentResourceName -Name [-Force] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVpnConnectionResourceId ``` Remove-AzVpnConnection -ResourceId [-Force] [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnConnectionObject ``` Remove-AzVpnConnection -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -174,6 +176,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVpnGateway.md b/src/Network/Network/help/Remove-AzVpnGateway.md index e09b54673730..7b29e0fde4e0 100644 --- a/src/Network/Network/help/Remove-AzVpnGateway.md +++ b/src/Network/Network/help/Remove-AzVpnGateway.md @@ -15,19 +15,20 @@ The Remove-AzVpnGateway cmdlet removes an Azure VPN gateway. This is a gateway s ### ByVpnGatewayName (Default) ``` Remove-AzVpnGateway -ResourceGroupName -Name [-PassThru] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObject ``` Remove-AzVpnGateway -InputObject [-PassThru] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnGatewayResourceId ``` Remove-AzVpnGateway -ResourceId [-PassThru] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -142,6 +143,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVpnGatewayNatRule.md b/src/Network/Network/help/Remove-AzVpnGatewayNatRule.md index f5a73ee2fc58..372fd8ca865a 100644 --- a/src/Network/Network/help/Remove-AzVpnGatewayNatRule.md +++ b/src/Network/Network/help/Remove-AzVpnGatewayNatRule.md @@ -15,19 +15,21 @@ Removes a NAT rule associated with VpnGateway. ### ByVpnGatewayNatRuleName (Default) ``` Remove-AzVpnGatewayNatRule -ResourceGroupName -ParentResourceName -Name [-Force] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### ByVpnGatewayNatRuleResourceId ``` Remove-AzVpnGatewayNatRule -ResourceId [-Force] [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnGatewayNatRuleObject ``` Remove-AzVpnGatewayNatRule -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -142,6 +144,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVpnServerConfiguration.md b/src/Network/Network/help/Remove-AzVpnServerConfiguration.md index cfd1ccb3d361..5f33f3a7664f 100644 --- a/src/Network/Network/help/Remove-AzVpnServerConfiguration.md +++ b/src/Network/Network/help/Remove-AzVpnServerConfiguration.md @@ -15,19 +15,22 @@ Removes an existing VpnServerConfiguration. ### ByVpnServerConfigurationName (Default) ``` Remove-AzVpnServerConfiguration -ResourceGroupName -Name [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnServerConfigurationObject ``` Remove-AzVpnServerConfiguration -InputObject [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnServerConfigurationResourceId ``` Remove-AzVpnServerConfiguration -ResourceId [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -119,6 +122,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Remove-AzVpnServerConfigurationPolicyGroup.md b/src/Network/Network/help/Remove-AzVpnServerConfigurationPolicyGroup.md index cbeca3995a8f..356e525c5db2 100644 --- a/src/Network/Network/help/Remove-AzVpnServerConfigurationPolicyGroup.md +++ b/src/Network/Network/help/Remove-AzVpnServerConfigurationPolicyGroup.md @@ -19,8 +19,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubNameByVpnServerConfigurationResourceId @@ -30,7 +30,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByVpnServerConfigurationObject @@ -40,8 +41,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByVpnServerConfigurationResourceId @@ -51,7 +52,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationObject @@ -61,7 +63,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationResourceId @@ -71,7 +74,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -258,6 +262,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/Remove-AzVpnSite.md b/src/Network/Network/help/Remove-AzVpnSite.md index 0e6733af14ab..016706924bfd 100644 --- a/src/Network/Network/help/Remove-AzVpnSite.md +++ b/src/Network/Network/help/Remove-AzVpnSite.md @@ -15,19 +15,20 @@ Removes an Azure VpnSite resource. ### ByVpnSiteName (Default) ``` Remove-AzVpnSite -ResourceGroupName -Name [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnSiteObject ``` Remove-AzVpnSite -InputObject [-Force] [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteResourceId ``` -Remove-AzVpnSite -ResourceId [-Force] [-PassThru] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Remove-AzVpnSite -ResourceId [-Force] [-PassThru] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -144,6 +145,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Reset-AzHubRouter.md b/src/Network/Network/help/Reset-AzHubRouter.md index 1352378e2c25..cfce4f6df685 100644 --- a/src/Network/Network/help/Reset-AzHubRouter.md +++ b/src/Network/Network/help/Reset-AzHubRouter.md @@ -14,20 +14,21 @@ Resets the RoutingState of a VirtualHub resource. ### ByVirtualHubObject (Default) ``` -Reset-AzHubRouter -InputObject [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Reset-AzHubRouter -InputObject [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubName ``` Reset-AzHubRouter -ResourceGroupName -Name [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId ``` -Reset-AzHubRouter -ResourceId [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] +Reset-AzHubRouter -ResourceId [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -129,6 +130,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Reset-AzP2sVpnGateway.md b/src/Network/Network/help/Reset-AzP2sVpnGateway.md index da324777e482..0bebcf89af2a 100644 --- a/src/Network/Network/help/Reset-AzP2sVpnGateway.md +++ b/src/Network/Network/help/Reset-AzP2sVpnGateway.md @@ -16,19 +16,20 @@ Resets the scalable P2S VPN gateway. ### ByP2SVpnGatewayName (Default) ``` Reset-AzP2sVpnGateway -ResourceGroupName -Name [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByP2SVpnGatewayObject ``` Reset-AzP2sVpnGateway -InputObject [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayResourceId ``` -Reset-AzP2sVpnGateway -ResourceId [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Reset-AzP2sVpnGateway -ResourceId [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -104,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Reset-AzVirtualNetworkGateway.md b/src/Network/Network/help/Reset-AzVirtualNetworkGateway.md index 8aa5a946aec6..1dd3fc2911c7 100644 --- a/src/Network/Network/help/Reset-AzVirtualNetworkGateway.md +++ b/src/Network/Network/help/Reset-AzVirtualNetworkGateway.md @@ -15,7 +15,7 @@ Resets the Virtual Network Gateway ``` Reset-AzVirtualNetworkGateway -VirtualNetworkGateway [-GatewayVip ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkGateway ```yaml Type: Microsoft.Azure.Commands.Network.Models.PSVirtualNetworkGateway diff --git a/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnection.md b/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnection.md index 2c36a8066fc6..6d9c6ff75da2 100644 --- a/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnection.md +++ b/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnection.md @@ -15,19 +15,22 @@ Reset a Virtual Network Gateway Connection ### ByName (Default) ``` Reset-AzVirtualNetworkGatewayConnection -Name -ResourceGroupName [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByInputObject ``` Reset-AzVirtualNetworkGatewayConnection -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId ``` Reset-AzVirtualNetworkGatewayConnection -ResourceId [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -104,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnectionSharedKey.md b/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnectionSharedKey.md index 98685c2a5745..f02abf4a67cb 100644 --- a/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnectionSharedKey.md +++ b/src/Network/Network/help/Reset-AzVirtualNetworkGatewayConnectionSharedKey.md @@ -15,7 +15,8 @@ Resets the shared key of the virtual network gateway connection. ``` Reset-AzVirtualNetworkGatewayConnectionSharedKey -Name -ResourceGroupName -KeyLength - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -91,6 +92,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName ```yaml Type: System.String diff --git a/src/Network/Network/help/Reset-AzVpnGateway.md b/src/Network/Network/help/Reset-AzVpnGateway.md index c715aa32148a..dc3586035694 100644 --- a/src/Network/Network/help/Reset-AzVpnGateway.md +++ b/src/Network/Network/help/Reset-AzVpnGateway.md @@ -16,19 +16,22 @@ Resets the scalable VPN gateway. ### ByVpnGatewayName (Default) ``` Reset-AzVpnGateway -ResourceGroupName -Name [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObject ``` Reset-AzVpnGateway -InputObject [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayResourceId ``` Reset-AzVpnGateway -ResourceId [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -119,6 +122,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Reset-AzVpnSiteLinkConnection.md b/src/Network/Network/help/Reset-AzVpnSiteLinkConnection.md index 2b93976df08c..0450f6b73f0e 100644 --- a/src/Network/Network/help/Reset-AzVpnSiteLinkConnection.md +++ b/src/Network/Network/help/Reset-AzVpnSiteLinkConnection.md @@ -15,19 +15,21 @@ Reset a VPN Site Link Connection ### ByName (Default) ``` Reset-AzVpnSiteLinkConnection -ResourceGroupName -VpnGatewayName -VpnConnectionName - -Name [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -Name [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByInputObject ``` Reset-AzVpnSiteLinkConnection -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId ``` Reset-AzVpnSiteLinkConnection -ResourceId [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -104,6 +106,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Resize-AzVirtualNetworkGateway.md b/src/Network/Network/help/Resize-AzVirtualNetworkGateway.md index b0fafe1d3e5d..954270ca8a5e 100644 --- a/src/Network/Network/help/Resize-AzVirtualNetworkGateway.md +++ b/src/Network/Network/help/Resize-AzVirtualNetworkGateway.md @@ -15,7 +15,7 @@ Resizes an existing virtual network gateway. ``` Resize-AzVirtualNetworkGateway -VirtualNetworkGateway -GatewaySku - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -84,6 +84,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkGateway Specifies an object reference to the virtual network gateway to be resized. You can create this object reference by using the Get-AzVirtualNetworkGateway and specifying the name of the gateway. diff --git a/src/Network/Network/help/Set-AzApplicationGateway.md b/src/Network/Network/help/Set-AzApplicationGateway.md index 29b80708ac2a..143630e27937 100644 --- a/src/Network/Network/help/Set-AzApplicationGateway.md +++ b/src/Network/Network/help/Set-AzApplicationGateway.md @@ -15,7 +15,7 @@ Updates an application gateway. ``` Set-AzApplicationGateway -ApplicationGateway [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewayAuthenticationCertificate.md b/src/Network/Network/help/Set-AzApplicationGatewayAuthenticationCertificate.md index 387f9e449b00..5a7f0a229852 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayAuthenticationCertificate.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayAuthenticationCertificate.md @@ -15,7 +15,8 @@ Updates an authentication certificate for an application gateway. ``` Set-AzApplicationGatewayAuthenticationCertificate -ApplicationGateway -Name - -CertificateFile [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -CertificateFile [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -96,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayAutoscaleConfiguration.md b/src/Network/Network/help/Set-AzApplicationGatewayAutoscaleConfiguration.md index 1ff9513f0c21..1f7dd09f97ba 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayAutoscaleConfiguration.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayAutoscaleConfiguration.md @@ -14,7 +14,8 @@ Updates Autoscale Configuration of an application gateway. ``` Set-AzApplicationGatewayAutoscaleConfiguration -ApplicationGateway -MinCapacity - [-MaxCapacity ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-MaxCapacity ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -106,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayBackendAddressPool.md b/src/Network/Network/help/Set-AzApplicationGatewayBackendAddressPool.md index cb4e86b7a75f..bac81431b29d 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayBackendAddressPool.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayBackendAddressPool.md @@ -16,7 +16,7 @@ Updates a back-end address pool for an application gateway. ``` Set-AzApplicationGatewayBackendAddressPool -ApplicationGateway -Name [-BackendIPAddresses ] [-BackendFqdns ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -121,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayBackendHttpSetting.md b/src/Network/Network/help/Set-AzApplicationGatewayBackendHttpSetting.md index 3a75b5ef59cc..f17c23758ac8 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayBackendHttpSetting.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayBackendHttpSetting.md @@ -20,7 +20,7 @@ Set-AzApplicationGatewayBackendHttpSetting -ApplicationGateway ] [-TrustedRootCertificate ] [-PickHostNameFromBackendAddress] [-HostName ] [-AffinityCookieName ] [-Path ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -249,6 +249,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol to use for communication between the application gateway and back-end servers. The acceptable values for this parameter are: Http and Https. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayBackendSetting.md b/src/Network/Network/help/Set-AzApplicationGatewayBackendSetting.md index 698eca0c4715..9712fd568f47 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayBackendSetting.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayBackendSetting.md @@ -16,7 +16,8 @@ Updates back-end TCP\TLS settings for an application gateway. Set-AzApplicationGatewayBackendSetting -ApplicationGateway -Name -Port -Protocol [-Timeout ] [-ProbeId ] [-Probe ] [-TrustedRootCertificate ] [-PickHostNameFromBackendAddress] - [-HostName ] [-DefaultProfile ] [] + [-HostName ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -156,6 +157,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol diff --git a/src/Network/Network/help/Set-AzApplicationGatewayClientAuthConfiguration.md b/src/Network/Network/help/Set-AzApplicationGatewayClientAuthConfiguration.md index 0ef54d51f6a6..5ec3929f443d 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayClientAuthConfiguration.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayClientAuthConfiguration.md @@ -15,7 +15,7 @@ Modifies the client auth configuration of a ssl profile object. ``` Set-AzApplicationGatewayClientAuthConfiguration -SslProfile [-VerifyClientCertIssuerDN] [-VerifyClientRevocation ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -49,6 +49,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslProfile The ssl profile diff --git a/src/Network/Network/help/Set-AzApplicationGatewayConnectionDraining.md b/src/Network/Network/help/Set-AzApplicationGatewayConnectionDraining.md index 06ca5dfe57b6..09326020a8b4 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayConnectionDraining.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayConnectionDraining.md @@ -14,7 +14,8 @@ Modifies the connection draining configuration of a back-end HTTP settings objec ``` Set-AzApplicationGatewayConnectionDraining -BackendHttpSettings - -Enabled -DrainTimeoutInSec [-DefaultProfile ] [] + -Enabled -DrainTimeoutInSec [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -96,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewayCustomError.md b/src/Network/Network/help/Set-AzApplicationGatewayCustomError.md index 9c89410165b4..2f974fdf0d10 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayCustomError.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayCustomError.md @@ -14,7 +14,8 @@ Updates a custom error in an application gateway. ``` Set-AzApplicationGatewayCustomError -ApplicationGateway -StatusCode - -CustomErrorPageUrl [-DefaultProfile ] [] + -CustomErrorPageUrl [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -77,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayFirewallPolicy.md b/src/Network/Network/help/Set-AzApplicationGatewayFirewallPolicy.md index 19539a6103d9..35ad418ad7d0 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayFirewallPolicy.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayFirewallPolicy.md @@ -18,7 +18,8 @@ Set-AzApplicationGatewayFirewallPolicy -InputObject ] [-PolicySetting ] [-ManagedRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByFactoryName @@ -27,7 +28,8 @@ Set-AzApplicationGatewayFirewallPolicy -Name -ResourceGroupName ] [-PolicySetting ] [-ManagedRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId @@ -36,7 +38,8 @@ Set-AzApplicationGatewayFirewallPolicy -ResourceId [-CustomRule ] [-PolicySetting ] [-ManagedRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -158,6 +161,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayFrontendIPConfig.md b/src/Network/Network/help/Set-AzApplicationGatewayFrontendIPConfig.md index b0c85eda453e..a724716e9553 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayFrontendIPConfig.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayFrontendIPConfig.md @@ -17,7 +17,8 @@ Modifies a front-end IP address configuration. ``` Set-AzApplicationGatewayFrontendIPConfig -ApplicationGateway -Name [-PrivateIPAddress ] [-SubnetId ] [-PublicIPAddressId ] - [-PrivateLinkConfigurationId ] [-DefaultProfile ] [] + [-PrivateLinkConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResource @@ -25,7 +26,7 @@ Set-AzApplicationGatewayFrontendIPConfig -ApplicationGateway -Name [-PrivateIPAddress ] [-Subnet ] [-PublicIPAddress ] [-PrivateLinkConfiguration ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -168,6 +169,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIPAddress Specifies the public IP address. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayFrontendPort.md b/src/Network/Network/help/Set-AzApplicationGatewayFrontendPort.md index e7f01cf3a323..cd30d62e0ea2 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayFrontendPort.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayFrontendPort.md @@ -15,7 +15,7 @@ Modifies a front-end port for an application gateway. ``` Set-AzApplicationGatewayFrontendPort -ApplicationGateway -Name -Port - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -97,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewayHttpListener.md b/src/Network/Network/help/Set-AzApplicationGatewayHttpListener.md index e86142869d1d..6ae204659548 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayHttpListener.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayHttpListener.md @@ -20,7 +20,7 @@ Set-AzApplicationGatewayHttpListener -ApplicationGateway [-FirewallPolicyId ] [-SslProfileId ] [-HostName ] [-HostNames ] [-RequireServerNameIndication ] -Protocol [-CustomErrorConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### SetByResource @@ -32,7 +32,7 @@ Set-AzApplicationGatewayHttpListener -ApplicationGateway [-SslCertificate ] [-SslProfile ] [-HostName ] [-HostNames ] [-RequireServerNameIndication ] -Protocol [-CustomErrorConfiguration ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -240,6 +240,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that the HTTP listener uses. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/Set-AzApplicationGatewayHttpListenerCustomError.md b/src/Network/Network/help/Set-AzApplicationGatewayHttpListenerCustomError.md index c5a30d7447d3..7dab18f82550 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayHttpListenerCustomError.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayHttpListenerCustomError.md @@ -15,7 +15,7 @@ Updates a custom error in a http listener of an application gateway. ``` Set-AzApplicationGatewayHttpListenerCustomError -HttpListener -StatusCode -CustomErrorPageUrl [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -StatusCode Status code of the application gateway customer error. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayIPConfiguration.md b/src/Network/Network/help/Set-AzApplicationGatewayIPConfiguration.md index b07079dfaf3a..7ad6e3d71857 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayIPConfiguration.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayIPConfiguration.md @@ -16,13 +16,15 @@ Modifies an IP configuration for an application gateway. ### SetByResourceId ``` Set-AzApplicationGatewayIPConfiguration -ApplicationGateway -Name - [-SubnetId ] [-DefaultProfile ] [] + [-SubnetId ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResource ``` Set-AzApplicationGatewayIPConfiguration -ApplicationGateway -Name - [-Subnet ] [-DefaultProfile ] [] + [-Subnet ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -91,6 +93,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subnet Specifies the subnet. This is the subnet in which the application gateway is deployed. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayIdentity.md b/src/Network/Network/help/Set-AzApplicationGatewayIdentity.md index bab36cb23289..8a1063fbfeaa 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayIdentity.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayIdentity.md @@ -14,7 +14,8 @@ Updates a identity assigned to the application gateway. ``` Set-AzApplicationGatewayIdentity -ApplicationGateway -UserAssignedIdentityId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -65,6 +66,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -UserAssignedIdentityId ResourceId of the user assigned identity to be assigned to Application Gateway. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayListener.md b/src/Network/Network/help/Set-AzApplicationGatewayListener.md index 455888534dff..4e287987c769 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayListener.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayListener.md @@ -18,7 +18,7 @@ Set-AzApplicationGatewayListener -ApplicationGateway -Nam [-FrontendIPConfiguration ] [-FrontendPort ] [-SslCertificate ] [-SslProfile ] -Protocol [-HostNames ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId @@ -26,7 +26,7 @@ Set-AzApplicationGatewayListener -ApplicationGateway -Nam Set-AzApplicationGatewayListener -ApplicationGateway -Name [-FrontendIPConfigurationId ] [-FrontendPortId ] [-SslCertificateId ] [-SslProfileId ] -Protocol [-HostNames ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -174,6 +174,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol diff --git a/src/Network/Network/help/Set-AzApplicationGatewayPrivateLinkConfiguration.md b/src/Network/Network/help/Set-AzApplicationGatewayPrivateLinkConfiguration.md index 32c84c1aff03..9162da5131a7 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayPrivateLinkConfiguration.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayPrivateLinkConfiguration.md @@ -15,7 +15,7 @@ Modifies an PrivateLink Configuration for an application gateway. ``` Set-AzApplicationGatewayPrivateLinkConfiguration -ApplicationGateway -Name -IpConfiguration [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -94,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewayProbeConfig.md b/src/Network/Network/help/Set-AzApplicationGatewayProbeConfig.md index 505e811420b9..569bc8b0caf7 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayProbeConfig.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayProbeConfig.md @@ -17,7 +17,7 @@ Set-AzApplicationGatewayProbeConfig -ApplicationGateway - -Protocol [-HostName ] [-Path ] -Interval -Timeout -UnhealthyThreshold [-PickHostNameFromBackendHttpSettings] [-MinServers ] [-Port ] [-Match ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -203,6 +203,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol used to send probe. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayRedirectConfiguration.md b/src/Network/Network/help/Set-AzApplicationGatewayRedirectConfiguration.md index e0ec22b7f20e..aee9ad19c8a4 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayRedirectConfiguration.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayRedirectConfiguration.md @@ -16,21 +16,22 @@ Sets the redirect configuration on an existing Application Gateway. ``` Set-AzApplicationGatewayRedirectConfiguration -ApplicationGateway -Name -RedirectType [-TargetListenerID ] [-IncludePath ] [-IncludeQueryString ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResource ``` Set-AzApplicationGatewayRedirectConfiguration -ApplicationGateway -Name -RedirectType [-TargetListener ] [-IncludePath ] - [-IncludeQueryString ] [-DefaultProfile ] [] + [-IncludeQueryString ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByURL ``` Set-AzApplicationGatewayRedirectConfiguration -ApplicationGateway -Name -RedirectType [-TargetUrl ] [-IncludePath ] [-IncludeQueryString ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -137,6 +138,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectType The type of redirect diff --git a/src/Network/Network/help/Set-AzApplicationGatewayRequestRoutingRule.md b/src/Network/Network/help/Set-AzApplicationGatewayRequestRoutingRule.md index 8dfd952c2f5f..c5e23bcc7cd0 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayRequestRoutingRule.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayRequestRoutingRule.md @@ -18,7 +18,8 @@ Modifies a request routing rule for an application gateway. Set-AzApplicationGatewayRequestRoutingRule -ApplicationGateway -Name -RuleType [-Priority ] [-BackendHttpSettingsId ] [-HttpListenerId ] [-BackendAddressPoolId ] [-UrlPathMapId ] [-RewriteRuleSetId ] - [-RedirectConfigurationId ] [-DefaultProfile ] [] + [-RedirectConfigurationId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResource @@ -29,7 +30,7 @@ Set-AzApplicationGatewayRequestRoutingRule -ApplicationGateway ] [-UrlPathMap ] [-RewriteRuleSet ] [-RedirectConfiguration ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -198,6 +199,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RedirectConfiguration Application gateway RedirectConfiguration diff --git a/src/Network/Network/help/Set-AzApplicationGatewayRewriteRuleSet.md b/src/Network/Network/help/Set-AzApplicationGatewayRewriteRuleSet.md index e85efce12322..b24eb0cb502c 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayRewriteRuleSet.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayRewriteRuleSet.md @@ -15,7 +15,7 @@ Modifies a rewrite rule set for an application gateway. ``` Set-AzApplicationGatewayRewriteRuleSet -ApplicationGateway -Name -RewriteRule - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -79,6 +79,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RewriteRule List of rewrite rules diff --git a/src/Network/Network/help/Set-AzApplicationGatewayRoutingRule.md b/src/Network/Network/help/Set-AzApplicationGatewayRoutingRule.md index 72a9d1bd8a87..8a0bb570fb4a 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayRoutingRule.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayRoutingRule.md @@ -17,14 +17,15 @@ Modifies a routing rule for an application gateway. Set-AzApplicationGatewayRoutingRule -ApplicationGateway -Name -RuleType -Priority [-BackendSettings ] [-Listener ] [-BackendAddressPool ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId ``` Set-AzApplicationGatewayRoutingRule -ApplicationGateway -Name -RuleType -Priority [-BackendSettingsId ] [-ListenerId ] - [-BackendAddressPoolId ] [-DefaultProfile ] [] + [-BackendAddressPoolId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -193,6 +194,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RuleType The type of rule diff --git a/src/Network/Network/help/Set-AzApplicationGatewaySku.md b/src/Network/Network/help/Set-AzApplicationGatewaySku.md index 92823fa8f55b..fac77c01a33d 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewaySku.md +++ b/src/Network/Network/help/Set-AzApplicationGatewaySku.md @@ -15,7 +15,8 @@ Modifies the SKU of an application gateway. ``` Set-AzApplicationGatewaySku -ApplicationGateway -Name -Tier - [-Capacity ] [-DefaultProfile ] [] + [-Capacity ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -101,6 +102,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Tier Specifies the tier of the application gateway. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/Set-AzApplicationGatewaySslCertificate.md b/src/Network/Network/help/Set-AzApplicationGatewaySslCertificate.md index ed4754f87b94..f744d690da86 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewaySslCertificate.md +++ b/src/Network/Network/help/Set-AzApplicationGatewaySslCertificate.md @@ -16,7 +16,7 @@ Updates an SSL certificate for an application gateway. ``` Set-AzApplicationGatewaySslCertificate -ApplicationGateway -Name [-CertificateFile ] [-Password ] [-KeyVaultSecretId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -144,6 +144,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewaySslPolicy.md b/src/Network/Network/help/Set-AzApplicationGatewaySslPolicy.md index 50cd1d7f16b0..a6de6884ad79 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewaySslPolicy.md +++ b/src/Network/Network/help/Set-AzApplicationGatewaySslPolicy.md @@ -16,7 +16,8 @@ Modifies the SSL policy of an application gateway. ``` Set-AzApplicationGatewaySslPolicy -ApplicationGateway [-DisabledSslProtocols ] [-PolicyType ] [-PolicyName ] [-CipherSuite ] [-MinProtocolVersion ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -158,6 +159,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzApplicationGatewaySslProfile.md b/src/Network/Network/help/Set-AzApplicationGatewaySslProfile.md index 9353006ba0d0..c171ae2487fc 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewaySslProfile.md +++ b/src/Network/Network/help/Set-AzApplicationGatewaySslProfile.md @@ -17,7 +17,7 @@ Set-AzApplicationGatewaySslProfile -ApplicationGateway -N [-SslPolicy ] [-ClientAuthConfiguration ] [-TrustedClientCertificates ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -95,6 +95,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslPolicy SSL policy diff --git a/src/Network/Network/help/Set-AzApplicationGatewaySslProfilePolicy.md b/src/Network/Network/help/Set-AzApplicationGatewaySslProfilePolicy.md index f12f62344233..41ed456106e9 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewaySslProfilePolicy.md +++ b/src/Network/Network/help/Set-AzApplicationGatewaySslProfilePolicy.md @@ -15,7 +15,8 @@ Modifies the SSL policy of an application gateway SSL profile. ``` Set-AzApplicationGatewaySslProfilePolicy -SslProfile [-DisabledSslProtocols ] [-PolicyType ] [-PolicyName ] [-CipherSuite ] - [-MinProtocolVersion ] [-DefaultProfile ] [] + [-MinProtocolVersion ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -127,6 +128,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SslProfile The application gateway SSL profile diff --git a/src/Network/Network/help/Set-AzApplicationGatewayTrustedClientCertificate.md b/src/Network/Network/help/Set-AzApplicationGatewayTrustedClientCertificate.md index 79416cacf1e6..e5b9fc831c9a 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayTrustedClientCertificate.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayTrustedClientCertificate.md @@ -14,7 +14,8 @@ Modifies the trusted client CA certificate chain of an application gateway. ``` Set-AzApplicationGatewayTrustedClientCertificate -ApplicationGateway -Name - -CertificateFile [-DefaultProfile ] [] + -CertificateFile [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -93,6 +94,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewayTrustedRootCertificate.md b/src/Network/Network/help/Set-AzApplicationGatewayTrustedRootCertificate.md index e89112e1d094..05d43edafcad 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayTrustedRootCertificate.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayTrustedRootCertificate.md @@ -14,7 +14,8 @@ Updates a Trusted Root Certificate of an application gateway. ``` Set-AzApplicationGatewayTrustedRootCertificate -ApplicationGateway -Name - -CertificateFile [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -CertificateFile [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -96,6 +97,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzApplicationGatewayUrlPathMapConfig.md b/src/Network/Network/help/Set-AzApplicationGatewayUrlPathMapConfig.md index 315dd9046890..225caecf29c2 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayUrlPathMapConfig.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayUrlPathMapConfig.md @@ -20,7 +20,7 @@ Set-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -DefaultBackendHttpSettings [-DefaultRewriteRuleSet ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ### BackendSetByResourceId @@ -28,7 +28,7 @@ Set-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -Name -PathRules -DefaultBackendAddressPoolId -DefaultBackendHttpSettingsId [-DefaultRewriteRuleSetId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RedirectSetByResource @@ -36,14 +36,15 @@ Set-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -Name -PathRules [-DefaultRewriteRuleSet ] -DefaultRedirectConfiguration - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### RedirectSetByResourceId ``` Set-AzApplicationGatewayUrlPathMapConfig -ApplicationGateway -Name -PathRules [-DefaultRewriteRuleSetId ] - -DefaultRedirectConfigurationId [-DefaultProfile ] [] + -DefaultRedirectConfigurationId [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -245,6 +246,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzApplicationGatewayWebApplicationFirewallConfiguration.md b/src/Network/Network/help/Set-AzApplicationGatewayWebApplicationFirewallConfiguration.md index 0c075249a900..51692dd9f3ad 100644 --- a/src/Network/Network/help/Set-AzApplicationGatewayWebApplicationFirewallConfiguration.md +++ b/src/Network/Network/help/Set-AzApplicationGatewayWebApplicationFirewallConfiguration.md @@ -18,8 +18,8 @@ Set-AzApplicationGatewayWebApplicationFirewallConfiguration -ApplicationGateway -Enabled -FirewallMode [-RuleSetType ] [-RuleSetVersion ] [-DisabledRuleGroup ] [-RequestBodyCheck ] [-MaxRequestBodySizeInKb ] [-FileUploadLimitInMb ] - [-Exclusion ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-Exclusion ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -163,6 +163,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RequestBodyCheck Whether request body is checked or not. diff --git a/src/Network/Network/help/Set-AzBastion.md b/src/Network/Network/help/Set-AzBastion.md index 1419ee1e5246..1ba6e8844dbf 100644 --- a/src/Network/Network/help/Set-AzBastion.md +++ b/src/Network/Network/help/Set-AzBastion.md @@ -16,7 +16,8 @@ Updates the Bastion Resource. Set-AzBastion -InputObject [-Sku ] [-ScaleUnit ] [-EnableKerberos ] [-DisableCopyPaste ] [-EnableTunneling ] [-EnableIpConnect ] [-EnableShareableLink ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -277,6 +278,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ScaleUnit The Bastion Scale Units diff --git a/src/Network/Network/help/Set-AzExpressRouteCircuit.md b/src/Network/Network/help/Set-AzExpressRouteCircuit.md index ae2097510182..30c8ed089a5b 100644 --- a/src/Network/Network/help/Set-AzExpressRouteCircuit.md +++ b/src/Network/Network/help/Set-AzExpressRouteCircuit.md @@ -15,7 +15,7 @@ Modifies an ExpressRoute circuit. ``` Set-AzExpressRouteCircuit -ExpressRouteCircuit [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -77,6 +77,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzExpressRouteCircuitConnectionConfig.md b/src/Network/Network/help/Set-AzExpressRouteCircuitConnectionConfig.md index a78c8a7b0caf..889c4b048401 100644 --- a/src/Network/Network/help/Set-AzExpressRouteCircuitConnectionConfig.md +++ b/src/Network/Network/help/Set-AzExpressRouteCircuitConnectionConfig.md @@ -16,15 +16,16 @@ Updates a circuit connection configuration created in Private Peerings for an Ex ``` Set-AzExpressRouteCircuitConnectionConfig [-Name] [-ExpressRouteCircuit] [-AddressPrefix] [-AddressPrefixType ] [-AuthorizationKey ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` Set-AzExpressRouteCircuitConnectionConfig [-Name] [-ExpressRouteCircuit] [-PeerExpressRouteCircuitPeering] [-AddressPrefix] [-AddressPrefixType ] - [-AuthorizationKey ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-AuthorizationKey ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -164,6 +165,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzExpressRouteCircuitPeeringConfig.md b/src/Network/Network/help/Set-AzExpressRouteCircuitPeeringConfig.md index 5f3b3084017b..03620ed1e356 100644 --- a/src/Network/Network/help/Set-AzExpressRouteCircuitPeeringConfig.md +++ b/src/Network/Network/help/Set-AzExpressRouteCircuitPeeringConfig.md @@ -20,7 +20,7 @@ Set-AzExpressRouteCircuitPeeringConfig -Name -ExpressRouteCircuit -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] [-PeerAddressType ] [-LegacyMode ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### MicrosoftPeeringConfigRoutFilterId @@ -30,7 +30,8 @@ Set-AzExpressRouteCircuitPeeringConfig -Name -ExpressRouteCircuit -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] -RouteFilterId [-PeerAddressType ] - [-LegacyMode ] [-DefaultProfile ] [] + [-LegacyMode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### MicrosoftPeeringConfigRoutFilter @@ -40,7 +41,8 @@ Set-AzExpressRouteCircuitPeeringConfig -Name -ExpressRouteCircuit -VlanId [-SharedKey ] [-MicrosoftConfigAdvertisedPublicPrefixes ] [-MicrosoftConfigCustomerAsn ] [-MicrosoftConfigRoutingRegistryName ] -RouteFilter [-PeerAddressType ] - [-LegacyMode ] [-DefaultProfile ] [] + [-LegacyMode ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -264,6 +266,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter This is an existing RouteFilter object. diff --git a/src/Network/Network/help/Set-AzExpressRouteConnection.md b/src/Network/Network/help/Set-AzExpressRouteConnection.md index 2d84807e65b8..f264e488eb17 100644 --- a/src/Network/Network/help/Set-AzExpressRouteConnection.md +++ b/src/Network/Network/help/Set-AzExpressRouteConnection.md @@ -16,22 +16,24 @@ Updates an express route connection created between an express route gateway and ``` Set-AzExpressRouteConnection -ResourceGroupName -ExpressRouteGatewayName -Name [-AuthorizationKey ] [-RoutingWeight ] [-EnableInternetSecurity ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByExpressRouteConnectionResourceId ``` Set-AzExpressRouteConnection -ResourceId [-AuthorizationKey ] [-RoutingWeight ] [-EnableInternetSecurity ] [-RoutingConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteConnectionObject ``` Set-AzExpressRouteConnection -InputObject [-AuthorizationKey ] [-RoutingWeight ] [-EnableInternetSecurity ] [-RoutingConfiguration ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -195,6 +197,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzExpressRouteCrossConnection.md b/src/Network/Network/help/Set-AzExpressRouteCrossConnection.md index 6bd287d83770..c647ec89a9fd 100644 --- a/src/Network/Network/help/Set-AzExpressRouteCrossConnection.md +++ b/src/Network/Network/help/Set-AzExpressRouteCrossConnection.md @@ -16,7 +16,8 @@ Modifies an ExpressRoute cross connection. ### ModifyByCircuitReference ``` Set-AzExpressRouteCrossConnection -ExpressRouteCrossConnection [-AsJob] - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ModifyByParameterValues @@ -24,7 +25,8 @@ Set-AzExpressRouteCrossConnection -ExpressRouteCrossConnection -Name [-ServiceProviderProvisioningState ] [-ServiceProviderNotes ] [-Peerings ] [-AsJob] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -131,6 +133,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The ExpressRouteCrossConnection diff --git a/src/Network/Network/help/Set-AzExpressRouteGateway.md b/src/Network/Network/help/Set-AzExpressRouteGateway.md index a4419d0539c9..a865a7d4ced6 100644 --- a/src/Network/Network/help/Set-AzExpressRouteGateway.md +++ b/src/Network/Network/help/Set-AzExpressRouteGateway.md @@ -16,21 +16,23 @@ Updates a Scalable ExpressRoute Gateway. ``` Set-AzExpressRouteGateway -ResourceGroupName -Name [-MinScaleUnits ] [-MaxScaleUnits ] [-AllowNonVirtualWanTraffic ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteGatewayObject ``` Set-AzExpressRouteGateway -InputObject [-MinScaleUnits ] [-MaxScaleUnits ] [-AllowNonVirtualWanTraffic ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByExpressRouteGatewayResourceId ``` Set-AzExpressRouteGateway -ResourceId [-MinScaleUnits ] [-MaxScaleUnits ] [-AllowNonVirtualWanTraffic ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -195,6 +197,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the ExpressRouteGateway to be updated. diff --git a/src/Network/Network/help/Set-AzExpressRoutePort.md b/src/Network/Network/help/Set-AzExpressRoutePort.md index d5f4ed9a9613..ff30c1948cb3 100644 --- a/src/Network/Network/help/Set-AzExpressRoutePort.md +++ b/src/Network/Network/help/Set-AzExpressRoutePort.md @@ -14,7 +14,8 @@ Modifies an ExpressRoutePort. ``` Set-AzExpressRoutePort -ExpressRoutePort [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -100,6 +101,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzExpressRoutePortIdentity.md b/src/Network/Network/help/Set-AzExpressRoutePortIdentity.md index e4cd9100f186..9a6ee0fe9e2c 100644 --- a/src/Network/Network/help/Set-AzExpressRoutePortIdentity.md +++ b/src/Network/Network/help/Set-AzExpressRoutePortIdentity.md @@ -14,7 +14,7 @@ Updates a identity assigned to an ExpressRoutePort. ``` Set-AzExpressRoutePortIdentity -ExpressRoutePort -UserAssignedIdentityId - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -62,6 +62,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -UserAssignedIdentityId ResourceId of the user assigned identity to be assigned to ExpressRoutePort. diff --git a/src/Network/Network/help/Set-AzFirewall.md b/src/Network/Network/help/Set-AzFirewall.md index cee1b1250a32..cb90289d199b 100644 --- a/src/Network/Network/help/Set-AzFirewall.md +++ b/src/Network/Network/help/Set-AzFirewall.md @@ -14,8 +14,8 @@ Saves a modified Firewall. ## SYNTAX ``` -Set-AzFirewall -AzureFirewall [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Set-AzFirewall -AzureFirewall [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -297,6 +297,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzFirewallPolicy.md b/src/Network/Network/help/Set-AzFirewallPolicy.md index bb22713af400..2971a121e219 100644 --- a/src/Network/Network/help/Set-AzFirewallPolicy.md +++ b/src/Network/Network/help/Set-AzFirewallPolicy.md @@ -21,7 +21,8 @@ Set-AzFirewallPolicy -Name -ResourceGroupName [-AsJob] [-Threa [-TransportSecurityName ] [-TransportSecurityKeyVaultSecretId ] [-SkuTier ] [-UserAssignedIdentityId ] [-Identity ] [-PrivateRange ] [-ExplicitProxy ] [-Snat ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObjectParameterSet @@ -33,7 +34,8 @@ Set-AzFirewallPolicy [-Name ] -InputObject [-AsJ [-TransportSecurityName ] [-TransportSecurityKeyVaultSecretId ] [-SkuTier ] [-UserAssignedIdentityId ] [-Identity ] [-PrivateRange ] [-ExplicitProxy ] [-Snat ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdParameterSet @@ -45,7 +47,8 @@ Set-AzFirewallPolicy [-AsJob] -ResourceId [-ThreatIntelMode ] [-TransportSecurityName ] [-TransportSecurityKeyVaultSecretId ] [-SkuTier ] [-UserAssignedIdentityId ] [-Identity ] [-PrivateRange ] [-ExplicitProxy ] [-Snat ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -322,6 +325,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzFirewallPolicyRuleCollectionGroup.md b/src/Network/Network/help/Set-AzFirewallPolicyRuleCollectionGroup.md index f5dacef451a3..8da3c8777f10 100644 --- a/src/Network/Network/help/Set-AzFirewallPolicyRuleCollectionGroup.md +++ b/src/Network/Network/help/Set-AzFirewallPolicyRuleCollectionGroup.md @@ -16,28 +16,31 @@ saves a modified azure firewall policy rule collection group ``` Set-AzFirewallPolicyRuleCollectionGroup -Name -ResourceGroupName -FirewallPolicyName -Priority [-RuleCollection ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByParentInputObjectParameterSet ``` Set-AzFirewallPolicyRuleCollectionGroup -Name -FirewallPolicyObject -Priority [-RuleCollection ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObjectParameterSet ``` Set-AzFirewallPolicyRuleCollectionGroup -InputObject [-Priority ] [-RuleCollection ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdParameterSet ``` Set-AzFirewallPolicyRuleCollectionGroup -ResourceId -Priority [-RuleCollection ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -179,6 +182,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzIpAllocation.md b/src/Network/Network/help/Set-AzIpAllocation.md index 94c02632b638..267c05e1eed9 100644 --- a/src/Network/Network/help/Set-AzIpAllocation.md +++ b/src/Network/Network/help/Set-AzIpAllocation.md @@ -15,19 +15,19 @@ Saves a modified IpAllocation. ### SetByNameParameterSet ``` Set-AzIpAllocation -ResourceGroupName -Name [-IpAllocationTag ] [-Tag ] - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceIdParameterSet ``` Set-AzIpAllocation -ResourceId [-IpAllocationTag ] [-Tag ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByInputObjectParameterSet ``` Set-AzIpAllocation -InputObject [-IpAllocationTag ] [-Tag ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -117,6 +117,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzIpGroup.md b/src/Network/Network/help/Set-AzIpGroup.md index 020ab38ec671..92f442351aa4 100644 --- a/src/Network/Network/help/Set-AzIpGroup.md +++ b/src/Network/Network/help/Set-AzIpGroup.md @@ -13,8 +13,8 @@ Saves a modified Firewall. ## SYNTAX ``` -Set-AzIpGroup -IpGroup [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] +Set-AzIpGroup -IpGroup [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzLoadBalancer.md b/src/Network/Network/help/Set-AzLoadBalancer.md index be58589350dd..3b4da6faac31 100644 --- a/src/Network/Network/help/Set-AzLoadBalancer.md +++ b/src/Network/Network/help/Set-AzLoadBalancer.md @@ -14,8 +14,8 @@ Updates a load balancer. ## SYNTAX ``` -Set-AzLoadBalancer -LoadBalancer [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Set-AzLoadBalancer -LoadBalancer [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -81,6 +81,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzLoadBalancerBackendAddressPool.md b/src/Network/Network/help/Set-AzLoadBalancerBackendAddressPool.md index 13d242a87e71..e9591f4de2cd 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerBackendAddressPool.md +++ b/src/Network/Network/help/Set-AzLoadBalancerBackendAddressPool.md @@ -16,28 +16,31 @@ Updates the backend pool on a loadbalancer ``` Set-AzLoadBalancerBackendAddressPool -ResourceGroupName -LoadBalancerName -Name -LoadBalancerBackendAddress [-TunnelInterface ] [-Force] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByParentObjectParameterSet ``` Set-AzLoadBalancerBackendAddressPool -Name -LoadBalancer -LoadBalancerBackendAddress [-TunnelInterface ] [-Force] - [-PassThru] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByInputObjectParameterSet ``` Set-AzLoadBalancerBackendAddressPool -InputObject [-TunnelInterface ] [-Force] [-PassThru] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceIdParameterSet ``` Set-AzLoadBalancerBackendAddressPool -LoadBalancerBackendAddress -ResourceId [-TunnelInterface ] [-Force] [-PassThru] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -197,6 +200,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the load balancer. diff --git a/src/Network/Network/help/Set-AzLoadBalancerFrontendIpConfig.md b/src/Network/Network/help/Set-AzLoadBalancerFrontendIpConfig.md index 70e4aeaaccf9..939bafb4d0f6 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerFrontendIpConfig.md +++ b/src/Network/Network/help/Set-AzLoadBalancerFrontendIpConfig.md @@ -17,42 +17,46 @@ Updates a front-end IP configuration for a load balancer. ``` Set-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-PrivateIpAddress ] [-PrivateIpAddressVersion ] [-Zone ] -Subnet [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdSubnet ``` Set-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-PrivateIpAddress ] [-PrivateIpAddressVersion ] [-Zone ] -SubnetId [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdPublicIpAddress ``` Set-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddressId [-GatewayLoadBalancerId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourcePublicIpAddress ``` Set-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddress [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdPublicIpAddressPrefix ``` Set-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddressPrefixId [-GatewayLoadBalancerId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourcePublicIpAddressPrefix ``` Set-AzLoadBalancerFrontendIpConfig -LoadBalancer -Name [-Zone ] -PublicIpAddressPrefix [-GatewayLoadBalancerId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -178,6 +182,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies the **PublicIpAddress** object that is associated with the front-end IP configuration to set. diff --git a/src/Network/Network/help/Set-AzLoadBalancerInboundNatPoolConfig.md b/src/Network/Network/help/Set-AzLoadBalancerInboundNatPoolConfig.md index 88fb19136f38..5d87a5bf1ad9 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerInboundNatPoolConfig.md +++ b/src/Network/Network/help/Set-AzLoadBalancerInboundNatPoolConfig.md @@ -18,8 +18,8 @@ Sets an inbound NAT pool configuration for a load balancer. Set-AzLoadBalancerInboundNatPoolConfig -LoadBalancer -Name -Protocol -FrontendPortRangeStart -FrontendPortRangeEnd -BackendPort [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] - [-FrontendIpConfiguration ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-FrontendIpConfiguration ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceId @@ -27,7 +27,8 @@ Set-AzLoadBalancerInboundNatPoolConfig -LoadBalancer -Name -Name -Protocol -FrontendPortRangeStart -FrontendPortRangeEnd -BackendPort [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfigurationId ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -196,6 +197,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol ```yaml Type: System.String diff --git a/src/Network/Network/help/Set-AzLoadBalancerInboundNatRuleConfig.md b/src/Network/Network/help/Set-AzLoadBalancerInboundNatRuleConfig.md index 69ca35d436c8..50d8cb6afac5 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerInboundNatRuleConfig.md +++ b/src/Network/Network/help/Set-AzLoadBalancerInboundNatRuleConfig.md @@ -19,7 +19,8 @@ Set-AzLoadBalancerInboundNatRuleConfig -LoadBalancer -Name ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfiguration ] [-FrontendPortRangeStart ] [-FrontendPortRangeEnd ] [-BackendAddressPool ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -28,7 +29,7 @@ Set-AzLoadBalancerInboundNatRuleConfig -LoadBalancer -Name ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-FrontendIpConfigurationId ] [-FrontendPortRangeStart ] [-FrontendPortRangeEnd ] [-BackendAddressPoolId ] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -284,6 +285,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that is matched by an inbound NAT rule configuration. The acceptable values for this parameter are: Tcp or Udp. diff --git a/src/Network/Network/help/Set-AzLoadBalancerOutboundRuleConfig.md b/src/Network/Network/help/Set-AzLoadBalancerOutboundRuleConfig.md index 7db95c8f3434..adbf94ef6d1f 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerOutboundRuleConfig.md +++ b/src/Network/Network/help/Set-AzLoadBalancerOutboundRuleConfig.md @@ -17,7 +17,8 @@ Sets an outbound rule configuration for a load balancer. Set-AzLoadBalancerOutboundRuleConfig -LoadBalancer -Name [-AllocatedOutboundPort ] -Protocol [-EnableTcpReset] [-IdleTimeoutInMinutes ] -FrontendIpConfiguration -BackendAddressPool - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -25,7 +26,8 @@ Set-AzLoadBalancerOutboundRuleConfig -LoadBalancer -Name -Name [-AllocatedOutboundPort ] -Protocol [-EnableTcpReset] [-IdleTimeoutInMinutes ] -FrontendIpConfiguration -BackendAddressPoolId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -184,6 +186,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol - TCP, UDP or All diff --git a/src/Network/Network/help/Set-AzLoadBalancerProbeConfig.md b/src/Network/Network/help/Set-AzLoadBalancerProbeConfig.md index b0918b25b139..82c4def4bcc7 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerProbeConfig.md +++ b/src/Network/Network/help/Set-AzLoadBalancerProbeConfig.md @@ -16,7 +16,8 @@ Updates a probe configuration for a load balancer. ``` Set-AzLoadBalancerProbeConfig -LoadBalancer -Name [-Protocol ] -Port -IntervalInSeconds -ProbeCount [-ProbeThreshold ] [-RequestPath ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -155,6 +156,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol to use for the probing. The acceptable values for this parameter are: Tcp or Http. diff --git a/src/Network/Network/help/Set-AzLoadBalancerRuleConfig.md b/src/Network/Network/help/Set-AzLoadBalancerRuleConfig.md index d938242dee34..3c220d93f495 100644 --- a/src/Network/Network/help/Set-AzLoadBalancerRuleConfig.md +++ b/src/Network/Network/help/Set-AzLoadBalancerRuleConfig.md @@ -19,7 +19,8 @@ Set-AzLoadBalancerRuleConfig -LoadBalancer -Name [-Pro [-LoadDistribution ] [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-DisableOutboundSNAT] [-FrontendIpConfiguration ] [-BackendAddressPool ] - [-Probe ] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Probe ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByResourceId @@ -27,8 +28,8 @@ Set-AzLoadBalancerRuleConfig -LoadBalancer -Name [-Pro Set-AzLoadBalancerRuleConfig -LoadBalancer -Name [-Protocol ] [-LoadDistribution ] [-FrontendPort ] [-BackendPort ] [-IdleTimeoutInMinutes ] [-EnableFloatingIP] [-EnableTcpReset] [-DisableOutboundSNAT] [-FrontendIpConfigurationId ] - [-BackendAddressPoolId ] [-ProbeId ] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-BackendAddressPoolId ] [-ProbeId ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -302,6 +303,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the protocol that is matched by a load balancer rule. The acceptable values for this parameter are: Tcp or Udp. diff --git a/src/Network/Network/help/Set-AzLocalNetworkGateway.md b/src/Network/Network/help/Set-AzLocalNetworkGateway.md index e3ba6ae1fe6d..80cd0ceeb9b7 100644 --- a/src/Network/Network/help/Set-AzLocalNetworkGateway.md +++ b/src/Network/Network/help/Set-AzLocalNetworkGateway.md @@ -16,7 +16,7 @@ Modifies a local network gateway. ``` Set-AzLocalNetworkGateway -LocalNetworkGateway [-AddressPrefix ] [-Asn ] [-BgpPeeringAddress ] [-PeerWeight ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -147,6 +147,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzNatGateway.md b/src/Network/Network/help/Set-AzNatGateway.md index 5aebb64ec556..c030fd9cf456 100644 --- a/src/Network/Network/help/Set-AzNatGateway.md +++ b/src/Network/Network/help/Set-AzNatGateway.md @@ -16,21 +16,23 @@ Update Nat Gateway Resource with Public Ip Address, Public Ip Prefix and IdleTim ``` Set-AzNatGateway -ResourceGroupName -Name [-PublicIpAddress ] [-PublicIpPrefix ] [-AsJob] [-IdleTimeoutInMinutes ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdParameterSet ``` Set-AzNatGateway -ResourceId [-PublicIpAddress ] [-PublicIpPrefix ] - [-AsJob] [-IdleTimeoutInMinutes ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-AsJob] [-IdleTimeoutInMinutes ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByInputObjectParameterSet ``` Set-AzNatGateway -InputObject [-PublicIpAddress ] [-PublicIpPrefix ] [-AsJob] [-IdleTimeoutInMinutes ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -124,6 +126,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress An array of public ip addresses associated with the nat gateway resource. diff --git a/src/Network/Network/help/Set-AzNetworkInterface.md b/src/Network/Network/help/Set-AzNetworkInterface.md index 33247b994e03..9f957d68f08d 100644 --- a/src/Network/Network/help/Set-AzNetworkInterface.md +++ b/src/Network/Network/help/Set-AzNetworkInterface.md @@ -15,7 +15,7 @@ Updates a network interface. ``` Set-AzNetworkInterface -NetworkInterface [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -129,6 +129,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzNetworkInterfaceIpConfig.md b/src/Network/Network/help/Set-AzNetworkInterfaceIpConfig.md index 9bb3076a9ccf..c77d8a889224 100644 --- a/src/Network/Network/help/Set-AzNetworkInterfaceIpConfig.md +++ b/src/Network/Network/help/Set-AzNetworkInterfaceIpConfig.md @@ -21,7 +21,7 @@ Set-AzNetworkInterfaceIpConfig -Name -NetworkInterface ] [-ApplicationGatewayBackendAddressPool ] [-ApplicationSecurityGroup ] [-GatewayLoadBalancerId ] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByResourceId @@ -30,7 +30,8 @@ Set-AzNetworkInterfaceIpConfig -Name -NetworkInterface ] [-PrivateIpAddress ] [-Primary] [-SubnetId ] [-PublicIpAddressId ] [-LoadBalancerBackendAddressPoolId ] [-LoadBalancerInboundNatRuleId ] [-ApplicationGatewayBackendAddressPoolId ] - [-ApplicationSecurityGroupId ] [-DefaultProfile ] [] + [-ApplicationSecurityGroupId ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -318,6 +319,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies a **PublicIPAddress** object. This cmdlet creates a reference to a public IP Address to associate with this network interface IP configuration. diff --git a/src/Network/Network/help/Set-AzNetworkInterfaceTapConfig.md b/src/Network/Network/help/Set-AzNetworkInterfaceTapConfig.md index bb86b4447a30..b3e03c0e5dc4 100644 --- a/src/Network/Network/help/Set-AzNetworkInterfaceTapConfig.md +++ b/src/Network/Network/help/Set-AzNetworkInterfaceTapConfig.md @@ -14,7 +14,8 @@ Updates a tap configuration for a network interface. ``` Set-AzNetworkInterfaceTapConfig -NetworkInterfaceTapConfig [-AsJob] - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -91,6 +92,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManager.md b/src/Network/Network/help/Set-AzNetworkManager.md index b31f7f0a1046..ec67cb97e52f 100644 --- a/src/Network/Network/help/Set-AzNetworkManager.md +++ b/src/Network/Network/help/Set-AzNetworkManager.md @@ -14,7 +14,7 @@ Updates a network manager.. ``` Set-AzNetworkManager -InputObject [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -160,6 +160,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerConnectivityConfiguration.md b/src/Network/Network/help/Set-AzNetworkManagerConnectivityConfiguration.md index 67a9bedf492b..3830a2f63030 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerConnectivityConfiguration.md +++ b/src/Network/Network/help/Set-AzNetworkManagerConnectivityConfiguration.md @@ -14,7 +14,8 @@ Updates a connectivity configuration. ``` Set-AzNetworkManagerConnectivityConfiguration -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -130,6 +131,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerGroup.md b/src/Network/Network/help/Set-AzNetworkManagerGroup.md index f5c181b39309..601c28bc8faa 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerGroup.md +++ b/src/Network/Network/help/Set-AzNetworkManagerGroup.md @@ -14,7 +14,8 @@ Updates a network manager group. ``` Set-AzNetworkManagerGroup -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -98,6 +99,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerManagementGroupConnection.md b/src/Network/Network/help/Set-AzNetworkManagerManagementGroupConnection.md index abee662e3df6..82d766ef771a 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerManagementGroupConnection.md +++ b/src/Network/Network/help/Set-AzNetworkManagerManagementGroupConnection.md @@ -14,7 +14,8 @@ Update a network manger management group connection ``` Set-AzNetworkManagerManagementGroupConnection -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -92,6 +93,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md b/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md index f69fb7eacf39..561924cb3698 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md +++ b/src/Network/Network/help/Set-AzNetworkManagerScopeConnection.md @@ -14,7 +14,8 @@ Update a network manager scope connection. ``` Set-AzNetworkManagerScopeConnection -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -100,6 +101,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminConfiguration.md b/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminConfiguration.md index 2325115503c6..6e1c5302fcd1 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminConfiguration.md +++ b/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminConfiguration.md @@ -14,7 +14,8 @@ Updates a network manager security admin configuration. ``` Set-AzNetworkManagerSecurityAdminConfiguration -InputObject - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -103,6 +104,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRule.md b/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRule.md index 97cacc20755a..e2986b51d886 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRule.md +++ b/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRule.md @@ -14,7 +14,8 @@ Updates a network manager security admin rule. ``` Set-AzNetworkManagerSecurityAdminRule -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -123,6 +124,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRuleCollection.md b/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRuleCollection.md index 1b2322746740..789d40bf9e3a 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRuleCollection.md +++ b/src/Network/Network/help/Set-AzNetworkManagerSecurityAdminRuleCollection.md @@ -14,7 +14,8 @@ Updates a network manager security admin rule collection. ``` Set-AzNetworkManagerSecurityAdminRuleCollection -InputObject - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -114,6 +115,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkManagerSubscriptionConnection.md b/src/Network/Network/help/Set-AzNetworkManagerSubscriptionConnection.md index a73737641981..dbfc1cc417c3 100644 --- a/src/Network/Network/help/Set-AzNetworkManagerSubscriptionConnection.md +++ b/src/Network/Network/help/Set-AzNetworkManagerSubscriptionConnection.md @@ -14,7 +14,8 @@ Update a network manager subscription connection. ``` Set-AzNetworkManagerSubscriptionConnection -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -92,6 +93,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkProfile.md b/src/Network/Network/help/Set-AzNetworkProfile.md index 10bf85b9a008..991ad0d1a8c4 100644 --- a/src/Network/Network/help/Set-AzNetworkProfile.md +++ b/src/Network/Network/help/Set-AzNetworkProfile.md @@ -14,7 +14,7 @@ Updates a network profile. ``` Set-AzNetworkProfile -NetworkProfile [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -82,6 +82,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkSecurityGroup.md b/src/Network/Network/help/Set-AzNetworkSecurityGroup.md index 534d84bad753..2fb7c18a78b9 100644 --- a/src/Network/Network/help/Set-AzNetworkSecurityGroup.md +++ b/src/Network/Network/help/Set-AzNetworkSecurityGroup.md @@ -15,7 +15,8 @@ Updates a network security group. ``` Set-AzNetworkSecurityGroup -NetworkSecurityGroup [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -78,6 +79,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Confirm Prompts you for confirmation before running the cmdlet. diff --git a/src/Network/Network/help/Set-AzNetworkSecurityRuleConfig.md b/src/Network/Network/help/Set-AzNetworkSecurityRuleConfig.md index f5b520148217..973e08f11d5b 100644 --- a/src/Network/Network/help/Set-AzNetworkSecurityRuleConfig.md +++ b/src/Network/Network/help/Set-AzNetworkSecurityRuleConfig.md @@ -20,7 +20,8 @@ Set-AzNetworkSecurityRuleConfig -Name -NetworkSecurityGroup ] [-DestinationAddressPrefix ] [-SourceApplicationSecurityGroup ] [-DestinationApplicationSecurityGroup ] [-Access ] [-Priority ] - [-Direction ] [-DefaultProfile ] [] + [-Direction ] [-DefaultProfile ] [-ProgressAction ] + [] ``` ### SetByResourceId @@ -30,7 +31,7 @@ Set-AzNetworkSecurityRuleConfig -Name -NetworkSecurityGroup ] [-DestinationAddressPrefix ] [-SourceApplicationSecurityGroupId ] [-DestinationApplicationSecurityGroupId ] [-Access ] [-Priority ] [-Direction ] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -265,6 +266,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Specifies the network protocol that a rule configuration applies to. The acceptable values for this parameter are: diff --git a/src/Network/Network/help/Set-AzNetworkWatcherConfigFlowLog.md b/src/Network/Network/help/Set-AzNetworkWatcherConfigFlowLog.md index 34c5496e6911..59e96c38e926 100644 --- a/src/Network/Network/help/Set-AzNetworkWatcherConfigFlowLog.md +++ b/src/Network/Network/help/Set-AzNetworkWatcherConfigFlowLog.md @@ -16,8 +16,8 @@ Configures flow logging for a target resource. ``` Set-AzNetworkWatcherConfigFlowLog -NetworkWatcher -TargetResourceId -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] - [-FormatType ] [-FormatVersion ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-FormatType ] [-FormatVersion ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetFlowlogByResourceWithTAByResource @@ -26,7 +26,8 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcher -TargetReso -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] [-EnableTrafficAnalytics] -Workspace [-TrafficAnalyticsInterval ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetFlowlogByResourceWithTAByDetails @@ -35,8 +36,8 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcher -TargetReso -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] [-EnableTrafficAnalytics] -WorkspaceResourceId -WorkspaceGUID -WorkspaceLocation - [-TrafficAnalyticsInterval ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-TrafficAnalyticsInterval ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetFlowlogByNameWithTAByResource @@ -45,7 +46,8 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcherName -ResourceGroupNam -TargetResourceId -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] [-EnableTrafficAnalytics] -Workspace [-TrafficAnalyticsInterval ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetFlowlogByNameWithTAByDetails @@ -54,8 +56,8 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcherName -ResourceGroupNam -TargetResourceId -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] [-EnableTrafficAnalytics] -WorkspaceResourceId -WorkspaceGUID -WorkspaceLocation - [-TrafficAnalyticsInterval ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-TrafficAnalyticsInterval ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetFlowlogByNameWithoutTA @@ -63,7 +65,8 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcherName -ResourceGroupNam Set-AzNetworkWatcherConfigFlowLog -NetworkWatcherName -ResourceGroupName -TargetResourceId -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetFlowlogByLocationWithTAByResource @@ -71,8 +74,8 @@ Set-AzNetworkWatcherConfigFlowLog -NetworkWatcherName -ResourceGroupNam Set-AzNetworkWatcherConfigFlowLog -Location -TargetResourceId -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] [-EnableTrafficAnalytics] -Workspace - [-TrafficAnalyticsInterval ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-TrafficAnalyticsInterval ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetFlowlogByLocationWithTAByDetails @@ -81,15 +84,16 @@ Set-AzNetworkWatcherConfigFlowLog -Location -TargetResourceId -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] [-FormatVersion ] [-AsJob] [-EnableTrafficAnalytics] -WorkspaceResourceId -WorkspaceGUID -WorkspaceLocation [-TrafficAnalyticsInterval ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetFlowlogByLocationWithoutTA ``` Set-AzNetworkWatcherConfigFlowLog -Location -TargetResourceId -EnableFlowLog -StorageAccountId [-EnableRetention ] [-RetentionInDays ] [-FormatType ] - [-FormatVersion ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FormatVersion ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -376,6 +380,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Set-AzNetworkWatcherConnectionMonitor.md b/src/Network/Network/help/Set-AzNetworkWatcherConnectionMonitor.md index 104adcd7ba9e..9bd43e25b742 100644 --- a/src/Network/Network/help/Set-AzNetworkWatcherConnectionMonitor.md +++ b/src/Network/Network/help/Set-AzNetworkWatcherConnectionMonitor.md @@ -17,8 +17,8 @@ Updates connection monitor resource. Set-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName -Name -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### SetByResource @@ -26,8 +26,8 @@ Set-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGrou Set-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### SetByResourceV2 @@ -35,7 +35,8 @@ Set-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name < Set-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name -TestGroup [-Output ] [-Note ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByNameV2 @@ -43,7 +44,8 @@ Set-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name < Set-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName -Name -TestGroup [-Output ] [-Note ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation @@ -51,7 +53,8 @@ Set-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGrou Set-AzNetworkWatcherConnectionMonitor -Location -Name -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocationV2 @@ -59,7 +62,8 @@ Set-AzNetworkWatcherConnectionMonitor -Location -Name -SourceR Set-AzNetworkWatcherConnectionMonitor -Location -Name -TestGroup [-Output ] [-Note ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId @@ -67,7 +71,8 @@ Set-AzNetworkWatcherConnectionMonitor -Location -Name Set-AzNetworkWatcherConnectionMonitor -ResourceId -SourceResourceId [-MonitoringIntervalInSeconds ] [-SourcePort ] [-DestinationResourceId ] -DestinationPort [-DestinationAddress ] [-ConfigureOnly] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceIdV2 @@ -75,13 +80,15 @@ Set-AzNetworkWatcherConnectionMonitor -ResourceId -SourceResourceId -TestGroup [-Output ] [-Note ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObject ``` Set-AzNetworkWatcherConnectionMonitor -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -349,6 +356,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Set-AzNetworkWatcherFlowLog.md b/src/Network/Network/help/Set-AzNetworkWatcherFlowLog.md index bee999d8533c..eaad361e7ab4 100644 --- a/src/Network/Network/help/Set-AzNetworkWatcherFlowLog.md +++ b/src/Network/Network/help/Set-AzNetworkWatcherFlowLog.md @@ -17,7 +17,8 @@ Updates flow log resource. Set-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -Name -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResource @@ -25,7 +26,8 @@ Set-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -Name -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceWithTA @@ -34,7 +36,8 @@ Set-AzNetworkWatcherFlowLog -NetworkWatcher -Name -T -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByNameWithTA @@ -43,15 +46,16 @@ Set-AzNetworkWatcherFlowLog -NetworkWatcherName -ResourceGroupName -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` Set-AzNetworkWatcherFlowLog -Location -Name -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] - [-FormatVersion ] [-Tag ] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-FormatVersion ] [-Tag ] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByLocationWithTA @@ -60,15 +64,15 @@ Set-AzNetworkWatcherFlowLog -Location -Name -TargetResourceId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceId ``` Set-AzNetworkWatcherFlowLog -ResourceId -TargetResourceId -StorageId -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] - [-FormatVersion ] [-Tag ] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-FormatVersion ] [-Tag ] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByResourceIdWithTA @@ -77,13 +81,14 @@ Set-AzNetworkWatcherFlowLog -ResourceId -TargetResourceId -Sto -Enabled [-EnableRetention ] [-RetentionPolicyDays ] [-FormatType ] [-FormatVersion ] [-EnableTrafficAnalytics] [-TrafficAnalyticsWorkspaceId ] [-TrafficAnalyticsInterval ] [-Tag ] [-Force] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByInputObject ``` Set-AzNetworkWatcherFlowLog -InputObject [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -316,6 +321,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Set-AzPrivateDnsZoneGroup.md b/src/Network/Network/help/Set-AzPrivateDnsZoneGroup.md index 557d5d117529..be22c6729c9e 100644 --- a/src/Network/Network/help/Set-AzPrivateDnsZoneGroup.md +++ b/src/Network/Network/help/Set-AzPrivateDnsZoneGroup.md @@ -15,7 +15,8 @@ Updates DNS zone group ``` Set-AzPrivateDnsZoneGroup -ResourceGroupName -PrivateEndpointName -Name -PrivateDnsZoneConfig - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -136,6 +137,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. diff --git a/src/Network/Network/help/Set-AzPrivateEndpoint.md b/src/Network/Network/help/Set-AzPrivateEndpoint.md index ef415d172b19..7bfc5bdf1bd5 100644 --- a/src/Network/Network/help/Set-AzPrivateEndpoint.md +++ b/src/Network/Network/help/Set-AzPrivateEndpoint.md @@ -14,7 +14,7 @@ Updates a private endpoint. ``` Set-AzPrivateEndpoint -PrivateEndpoint [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -82,6 +82,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzPrivateEndpointConnection.md b/src/Network/Network/help/Set-AzPrivateEndpointConnection.md index 6d72810c4b26..defab23d7cfd 100644 --- a/src/Network/Network/help/Set-AzPrivateEndpointConnection.md +++ b/src/Network/Network/help/Set-AzPrivateEndpointConnection.md @@ -15,14 +15,16 @@ Updates a private endpoint connection state on private link service. ### ByResourceId (Default) ``` Set-AzPrivateEndpointConnection -PrivateLinkServiceConnectionState [-Description ] - -ResourceId [-DefaultProfile ] [] + -ResourceId [-DefaultProfile ] [-ProgressAction ] + [] ``` ### ByResource ``` Set-AzPrivateEndpointConnection -Name -PrivateLinkServiceConnectionState [-Description ] -ResourceGroupName -ServiceName - [-DefaultProfile ] -PrivateLinkResourceType [] + [-DefaultProfile ] [-ProgressAction ] + -PrivateLinkResourceType [] ``` ## DESCRIPTION @@ -115,6 +117,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzPrivateLinkService.md b/src/Network/Network/help/Set-AzPrivateLinkService.md index b681b674a03e..4319fd02845b 100644 --- a/src/Network/Network/help/Set-AzPrivateLinkService.md +++ b/src/Network/Network/help/Set-AzPrivateLinkService.md @@ -14,7 +14,7 @@ Updates a private link service. ``` Set-AzPrivateLinkService -PrivateLinkService [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -85,6 +85,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Set-AzPublicIpAddress.md b/src/Network/Network/help/Set-AzPublicIpAddress.md index 53d9aa3bce6a..ca2e82cbbaa4 100644 --- a/src/Network/Network/help/Set-AzPublicIpAddress.md +++ b/src/Network/Network/help/Set-AzPublicIpAddress.md @@ -15,7 +15,7 @@ Updates a public IP address. ``` Set-AzPublicIpAddress -PublicIpAddress [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -108,6 +108,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpAddress Specifies a public IP address object representing the state to which the public IP address should be set. diff --git a/src/Network/Network/help/Set-AzPublicIpPrefix.md b/src/Network/Network/help/Set-AzPublicIpPrefix.md index 821d7160552f..9fb877530fc0 100644 --- a/src/Network/Network/help/Set-AzPublicIpPrefix.md +++ b/src/Network/Network/help/Set-AzPublicIpPrefix.md @@ -14,7 +14,7 @@ Sets the Tags for an existing PublicIpPrefix ``` Set-AzPublicIpPrefix -PublicIpPrefix [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -65,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -PublicIpPrefix The PublicIpPrefix diff --git a/src/Network/Network/help/Set-AzRouteConfig.md b/src/Network/Network/help/Set-AzRouteConfig.md index e9f1dbc59695..df6ad10bb367 100644 --- a/src/Network/Network/help/Set-AzRouteConfig.md +++ b/src/Network/Network/help/Set-AzRouteConfig.md @@ -15,8 +15,8 @@ Updates a route configuration for a route table. ``` Set-AzRouteConfig -RouteTable [-Name ] [-AddressPrefix ] [-NextHopType ] - [-NextHopIpAddress ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-NextHopIpAddress ] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -165,6 +165,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteTable Specifies the route table with which this route is associated. diff --git a/src/Network/Network/help/Set-AzRouteFilter.md b/src/Network/Network/help/Set-AzRouteFilter.md index 217299f60e24..436ca80964db 100644 --- a/src/Network/Network/help/Set-AzRouteFilter.md +++ b/src/Network/Network/help/Set-AzRouteFilter.md @@ -14,7 +14,7 @@ Updates a route filter. ``` Set-AzRouteFilter -RouteFilter [-Force] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -76,6 +76,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter The RouteFilter diff --git a/src/Network/Network/help/Set-AzRouteFilterRuleConfig.md b/src/Network/Network/help/Set-AzRouteFilterRuleConfig.md index ef44592eea19..b0ecbfc94a8d 100644 --- a/src/Network/Network/help/Set-AzRouteFilterRuleConfig.md +++ b/src/Network/Network/help/Set-AzRouteFilterRuleConfig.md @@ -14,8 +14,8 @@ Modifies the route filter rule of a route filter. ``` Set-AzRouteFilterRuleConfig -RouteFilter [-Force] -Name -Access - -RouteFilterRuleType -CommunityList [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -RouteFilterRuleType -CommunityList [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -113,6 +113,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteFilter The RouteFilter diff --git a/src/Network/Network/help/Set-AzRouteTable.md b/src/Network/Network/help/Set-AzRouteTable.md index 965a3ffc914d..9e64c658512c 100644 --- a/src/Network/Network/help/Set-AzRouteTable.md +++ b/src/Network/Network/help/Set-AzRouteTable.md @@ -14,8 +14,8 @@ Updates a route table. ## SYNTAX ``` -Set-AzRouteTable -RouteTable [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] +Set-AzRouteTable -RouteTable [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -131,6 +131,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RouteTable Specifies a route table object representing the state to which the route table should be set. diff --git a/src/Network/Network/help/Set-AzRoutingIntent.md b/src/Network/Network/help/Set-AzRoutingIntent.md index c3458c42fb5f..d6136b1e0eab 100644 --- a/src/Network/Network/help/Set-AzRoutingIntent.md +++ b/src/Network/Network/help/Set-AzRoutingIntent.md @@ -15,26 +15,29 @@ Updates a routing intent resource associated with a VirtualHub. ### ByRoutingIntentName (Default) ``` Set-AzRoutingIntent -ResourceGroupName -ParentResourceName -Name - [-RoutingPolicy ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-RoutingPolicy ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject ``` Set-AzRoutingIntent -Name -ParentObject [-RoutingPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRoutingIntentObject ``` Set-AzRoutingIntent -InputObject [-RoutingPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRoutingIntentResourceId ``` Set-AzRoutingIntent -ResourceId [-RoutingPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -176,6 +179,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzRoutingPolicy.md b/src/Network/Network/help/Set-AzRoutingPolicy.md index 31cedad336bd..ae0a28ead76f 100644 --- a/src/Network/Network/help/Set-AzRoutingPolicy.md +++ b/src/Network/Network/help/Set-AzRoutingPolicy.md @@ -14,7 +14,8 @@ Updates the destinations or nexthop for the specified Routing Policy of a Routin ``` Set-AzRoutingPolicy -RoutingIntent -Destination -NextHop -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -112,6 +113,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RoutingIntent The routing intent resource to which this rouing policy has to be added. diff --git a/src/Network/Network/help/Set-AzSecurityPartnerProvider.md b/src/Network/Network/help/Set-AzSecurityPartnerProvider.md index cda8acf69b17..2e2ad73d930a 100644 --- a/src/Network/Network/help/Set-AzSecurityPartnerProvider.md +++ b/src/Network/Network/help/Set-AzSecurityPartnerProvider.md @@ -14,7 +14,8 @@ Saves a modified Azure SecurityPartnerProvider. ``` Set-AzSecurityPartnerProvider -SecurityPartnerProvider [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -60,6 +61,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -SecurityPartnerProvider The SecurityPartnerProvider diff --git a/src/Network/Network/help/Set-AzServiceEndpointPolicy.md b/src/Network/Network/help/Set-AzServiceEndpointPolicy.md index cc27d79889b6..a3a857055a4d 100644 --- a/src/Network/Network/help/Set-AzServiceEndpointPolicy.md +++ b/src/Network/Network/help/Set-AzServiceEndpointPolicy.md @@ -14,7 +14,8 @@ Updates a service endpoint policy. ``` Set-AzServiceEndpointPolicy -ServiceEndpointPolicy - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -47,6 +48,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ServiceEndpointPolicy The ServiceEndpointPolicy diff --git a/src/Network/Network/help/Set-AzServiceEndpointPolicyDefinition.md b/src/Network/Network/help/Set-AzServiceEndpointPolicyDefinition.md index 47e48d349afe..3b41ff182272 100644 --- a/src/Network/Network/help/Set-AzServiceEndpointPolicyDefinition.md +++ b/src/Network/Network/help/Set-AzServiceEndpointPolicyDefinition.md @@ -15,7 +15,8 @@ Updates a service endpoint policy definition. ``` Set-AzServiceEndpointPolicyDefinition -Name -ServiceEndpointPolicy [-Description ] [-ServiceResource ] [-Service ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -77,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Service Name of the service diff --git a/src/Network/Network/help/Set-AzVirtualHub.md b/src/Network/Network/help/Set-AzVirtualHub.md index 915e264d1e23..bf12a21ae9a2 100644 --- a/src/Network/Network/help/Set-AzVirtualHub.md +++ b/src/Network/Network/help/Set-AzVirtualHub.md @@ -15,20 +15,22 @@ Modifies a Virtual Hub to add a Virtual HUb Route Table to it. ### ByVirtualHubName (Default) ``` Set-AzVirtualHub -ResourceGroupName -Name -RouteTable - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubResourceId ``` Set-AzVirtualHub -ResourceId -RouteTable [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObject ``` Set-AzVirtualHub -InputObject -RouteTable [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -124,6 +126,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Set-AzVirtualNetwork.md b/src/Network/Network/help/Set-AzVirtualNetwork.md index 1a0f3b70f3d0..c600f3df8c8b 100644 --- a/src/Network/Network/help/Set-AzVirtualNetwork.md +++ b/src/Network/Network/help/Set-AzVirtualNetwork.md @@ -15,7 +15,7 @@ Updates a virtual network. ``` Set-AzVirtualNetwork -VirtualNetwork [-AsJob] [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +71,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetwork Specifies a virtual network object representing the state to which the virtual network should be set. diff --git a/src/Network/Network/help/Set-AzVirtualNetworkGateway.md b/src/Network/Network/help/Set-AzVirtualNetworkGateway.md index 7ef89a14fb18..a5d8fe49f7f3 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkGateway.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkGateway.md @@ -29,7 +29,8 @@ Set-AzVirtualNetworkGateway -VirtualNetworkGateway [-G [-MaxScaleUnit ] [-VirtualNetworkGatewayPolicyGroup ] [-ClientConnectionConfiguration ] [-AdminState ] [-AllowRemoteVnetTraffic ] [-AllowVirtualWanTraffic ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### UpdateResourceWithTags @@ -48,7 +49,8 @@ Set-AzVirtualNetworkGateway -VirtualNetworkGateway [-G [-MaxScaleUnit ] [-VirtualNetworkGatewayPolicyGroup ] [-ClientConnectionConfiguration ] [-AdminState ] [-AllowRemoteVnetTraffic ] [-AllowVirtualWanTraffic ] -Tag [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -855,6 +857,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RadiusServerAddress P2S External Radius server address. diff --git a/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnection.md b/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnection.md index 2260d85fd575..d35b5ebe1a66 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnection.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnection.md @@ -21,7 +21,8 @@ Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection ] [-TrafficSelectorPolicy ] [-IngressNatRule ] [-EgressNatRule ] [-GatewayCustomBgpIpAddress ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### UpdateResourceWithTags @@ -32,7 +33,8 @@ Set-AzVirtualNetworkGatewayConnection -VirtualNetworkGatewayConnection ] [-TrafficSelectorPolicy ] [-IngressNatRule ] [-EgressNatRule ] [-GatewayCustomBgpIpAddress ] -Tag [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -403,6 +405,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Tag A hashtable which represents resource tags. diff --git a/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnectionSharedKey.md b/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnectionSharedKey.md index 3f49615f88d7..a893dcb8e4db 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnectionSharedKey.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkGatewayConnectionSharedKey.md @@ -15,7 +15,8 @@ Configures the shared key of the virtual network gateway connection. ``` Set-AzVirtualNetworkGatewayConnectionSharedKey -Name -ResourceGroupName -Value - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -82,6 +83,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group that the virtual network gateway belongs to diff --git a/src/Network/Network/help/Set-AzVirtualNetworkGatewayDefaultSite.md b/src/Network/Network/help/Set-AzVirtualNetworkGatewayDefaultSite.md index 555d7bb662f5..742148bdcd65 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkGatewayDefaultSite.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkGatewayDefaultSite.md @@ -15,7 +15,8 @@ Sets the default site for a virtual network gateway. ``` Set-AzVirtualNetworkGatewayDefaultSite -VirtualNetworkGateway - -GatewayDefaultSite [-DefaultProfile ] [] + -GatewayDefaultSite [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -73,6 +74,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkGateway Specifies an object reference to the virtual network gateway where the default site will be assigned. You can create an object reference to a virtual network gateway by using the **Get-AzVirtualNetworkGateway** and specifying the name of the gateway. diff --git a/src/Network/Network/help/Set-AzVirtualNetworkPeering.md b/src/Network/Network/help/Set-AzVirtualNetworkPeering.md index 663cc158137f..c98303de15da 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkPeering.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkPeering.md @@ -15,7 +15,7 @@ Configures a virtual network peering. ``` Set-AzVirtualNetworkPeering -VirtualNetworkPeering [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -107,6 +107,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkPeering Specifies the virtual network peering. diff --git a/src/Network/Network/help/Set-AzVirtualNetworkSubnetConfig.md b/src/Network/Network/help/Set-AzVirtualNetworkSubnetConfig.md index 9f599b383c90..e179c29d1d40 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkSubnetConfig.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkSubnetConfig.md @@ -20,7 +20,8 @@ Set-AzVirtualNetworkSubnetConfig -Name -VirtualNetwork ] [-ServiceEndpointPolicy ] [-Delegation ] [-PrivateEndpointNetworkPoliciesFlag ] [-PrivateLinkServiceNetworkPoliciesFlag ] [-IpAllocation ] - [-DefaultOutboundAccess ] [-DefaultProfile ] [] + [-DefaultOutboundAccess ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByResourceId @@ -30,7 +31,8 @@ Set-AzVirtualNetworkSubnetConfig -Name -VirtualNetwork ] [-ServiceEndpointPolicy ] [-Delegation ] [-PrivateEndpointNetworkPoliciesFlag ] [-PrivateLinkServiceNetworkPoliciesFlag ] [-IpAllocation ] - [-DefaultOutboundAccess ] [-DefaultProfile ] [] + [-DefaultOutboundAccess ] [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -264,6 +266,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceId Specifies the Id of NAT Gateway resource associated with the subnet configuration. diff --git a/src/Network/Network/help/Set-AzVirtualNetworkTap.md b/src/Network/Network/help/Set-AzVirtualNetworkTap.md index 3004941e725b..ffb55edd339c 100644 --- a/src/Network/Network/help/Set-AzVirtualNetworkTap.md +++ b/src/Network/Network/help/Set-AzVirtualNetworkTap.md @@ -14,7 +14,8 @@ Updates a virtual network tap. ``` Set-AzVirtualNetworkTap -VirtualNetworkTap [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -64,6 +65,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -VirtualNetworkTap The virtual network tap diff --git a/src/Network/Network/help/Set-AzVpnClientIpsecParameter.md b/src/Network/Network/help/Set-AzVpnClientIpsecParameter.md index b39d5b4d44ef..20838e3f42c1 100644 --- a/src/Network/Network/help/Set-AzVpnClientIpsecParameter.md +++ b/src/Network/Network/help/Set-AzVpnClientIpsecParameter.md @@ -15,22 +15,24 @@ Sets the vpn ipsec parameters for existing virtual network gateway. ### ByFactoryName (Default) ``` Set-AzVpnClientIpsecParameter -VirtualNetworkGatewayName -ResourceGroupName - -VpnClientIPsecParameter [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -VpnClientIPsecParameter [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByFactoryObject ``` Set-AzVpnClientIpsecParameter -VirtualNetworkGatewayName -ResourceGroupName -VpnClientIPsecParameter -InputObject - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId ``` Set-AzVpnClientIpsecParameter -VirtualNetworkGatewayName -ResourceGroupName -VpnClientIPsecParameter -ResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -81,6 +83,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Start-AzApplicationGateway.md b/src/Network/Network/help/Start-AzApplicationGateway.md index 37dd0d1f5219..c6fd041520b1 100644 --- a/src/Network/Network/help/Start-AzApplicationGateway.md +++ b/src/Network/Network/help/Start-AzApplicationGateway.md @@ -15,7 +15,7 @@ Starts an application gateway. ``` Start-AzApplicationGateway -ApplicationGateway - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -63,6 +63,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Start-AzNetworkWatcherConnectionMonitor.md b/src/Network/Network/help/Start-AzNetworkWatcherConnectionMonitor.md index 1dc5cd8fe1e8..8cd728b9f1ea 100644 --- a/src/Network/Network/help/Start-AzNetworkWatcherConnectionMonitor.md +++ b/src/Network/Network/help/Start-AzNetworkWatcherConnectionMonitor.md @@ -15,31 +15,36 @@ Start a connection monitor ### SetByName (Default) ``` Start-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName -Name - [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByResource ``` Start-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` Start-AzNetworkWatcherConnectionMonitor -Location -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` Start-AzNetworkWatcherConnectionMonitor -ResourceId [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObject ``` Start-AzNetworkWatcherConnectionMonitor -InputObject [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -176,6 +181,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Start-AzNetworkWatcherResourceTroubleshooting.md b/src/Network/Network/help/Start-AzNetworkWatcherResourceTroubleshooting.md index cfbf20668988..e9ca0a339722 100644 --- a/src/Network/Network/help/Start-AzNetworkWatcherResourceTroubleshooting.md +++ b/src/Network/Network/help/Start-AzNetworkWatcherResourceTroubleshooting.md @@ -15,20 +15,22 @@ Starts troubleshooting on a Networking resource in Azure. ### SetByResource (Default) ``` Start-AzNetworkWatcherResourceTroubleshooting -NetworkWatcher -TargetResourceId - -StorageId -StoragePath [-DefaultProfile ] [] + -StorageId -StoragePath [-DefaultProfile ] + [-ProgressAction ] [] ``` ### SetByName ``` Start-AzNetworkWatcherResourceTroubleshooting -NetworkWatcherName -ResourceGroupName -TargetResourceId -StorageId -StoragePath - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation ``` Start-AzNetworkWatcherResourceTroubleshooting -Location -TargetResourceId -StorageId - -StoragePath [-DefaultProfile ] [] + -StoragePath [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -112,6 +114,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Start-AzVirtualNetworkGatewayConnectionPacketCapture.md b/src/Network/Network/help/Start-AzVirtualNetworkGatewayConnectionPacketCapture.md index af058f11ff38..7098e77e1c04 100644 --- a/src/Network/Network/help/Start-AzVirtualNetworkGatewayConnectionPacketCapture.md +++ b/src/Network/Network/help/Start-AzVirtualNetworkGatewayConnectionPacketCapture.md @@ -15,21 +15,22 @@ Starts Packet Capture Operation on a Virtual Network Gateway Connection. ### ByName (Default) ``` Start-AzVirtualNetworkGatewayConnectionPacketCapture -ResourceGroupName -Name - [-FilterData ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FilterData ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByInputObject ``` Start-AzVirtualNetworkGatewayConnectionPacketCapture -InputObject - [-FilterData ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-FilterData ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` Start-AzVirtualNetworkGatewayConnectionPacketCapture -ResourceId [-FilterData ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -182,6 +183,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Start-AzVirtualnetworkGatewayPacketCapture.md b/src/Network/Network/help/Start-AzVirtualnetworkGatewayPacketCapture.md index 42e4584be1a7..15f88587c349 100644 --- a/src/Network/Network/help/Start-AzVirtualnetworkGatewayPacketCapture.md +++ b/src/Network/Network/help/Start-AzVirtualnetworkGatewayPacketCapture.md @@ -15,19 +15,22 @@ Starts Packet Capture Operation on a Virtual Network Gateway. ### ByName (Default) ``` Start-AzVirtualnetworkGatewayPacketCapture -ResourceGroupName -Name [-FilterData ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByInputObject ``` Start-AzVirtualnetworkGatewayPacketCapture -InputObject [-FilterData ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId ``` Start-AzVirtualnetworkGatewayPacketCapture -ResourceId [-FilterData ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -180,6 +183,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Start-AzVpnConnectionPacketCapture.md b/src/Network/Network/help/Start-AzVpnConnectionPacketCapture.md index bfa87b6198c6..9e28caea1752 100644 --- a/src/Network/Network/help/Start-AzVpnConnectionPacketCapture.md +++ b/src/Network/Network/help/Start-AzVpnConnectionPacketCapture.md @@ -16,20 +16,21 @@ Starts Packet Capture Operation on a Vpn Connection. ``` Start-AzVpnConnectionPacketCapture -ResourceGroupName -ParentResourceName -Name [-FilterData ] -LinkConnectionName [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnConnectionObject ``` Start-AzVpnConnectionPacketCapture -InputObject [-FilterData ] - -LinkConnectionName [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -LinkConnectionName [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnConnectionResourceId ``` Start-AzVpnConnectionPacketCapture -ResourceId [-FilterData ] -LinkConnectionName - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -189,6 +190,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Start-AzVpnGatewayPacketCapture.md b/src/Network/Network/help/Start-AzVpnGatewayPacketCapture.md index b1166e7540cf..e0413f39a60f 100644 --- a/src/Network/Network/help/Start-AzVpnGatewayPacketCapture.md +++ b/src/Network/Network/help/Start-AzVpnGatewayPacketCapture.md @@ -15,19 +15,22 @@ Starts Packet Capture Operation on a Vpn Gateway. ### ByVpnGatewayName (Default) ``` Start-AzVpnGatewayPacketCapture -ResourceGroupName -Name [-FilterData ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObject ``` Start-AzVpnGatewayPacketCapture -InputObject [-FilterData ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayResourceId ``` Start-AzVpnGatewayPacketCapture -ResourceId [-FilterData ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -155,6 +158,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Stop-AzApplicationGateway.md b/src/Network/Network/help/Stop-AzApplicationGateway.md index 580dcb997fcf..71f77dae547c 100644 --- a/src/Network/Network/help/Stop-AzApplicationGateway.md +++ b/src/Network/Network/help/Stop-AzApplicationGateway.md @@ -15,7 +15,7 @@ Stops an application gateway ``` Stop-AzApplicationGateway -ApplicationGateway [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -78,6 +78,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Stop-AzNetworkWatcherConnectionMonitor.md b/src/Network/Network/help/Stop-AzNetworkWatcherConnectionMonitor.md index 815abf267f16..7bad8c2181a5 100644 --- a/src/Network/Network/help/Stop-AzNetworkWatcherConnectionMonitor.md +++ b/src/Network/Network/help/Stop-AzNetworkWatcherConnectionMonitor.md @@ -15,31 +15,36 @@ Stop a connection monitor ### SetByName (Default) ``` Stop-AzNetworkWatcherConnectionMonitor -NetworkWatcherName -ResourceGroupName -Name - [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-PassThru] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### SetByResource ``` Stop-AzNetworkWatcherConnectionMonitor -NetworkWatcher -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByLocation ``` Stop-AzNetworkWatcherConnectionMonitor -Location -Name [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByResourceId ``` Stop-AzNetworkWatcherConnectionMonitor -ResourceId [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByInputObject ``` Stop-AzNetworkWatcherConnectionMonitor -InputObject [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -187,6 +192,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Stop-AzNetworkWatcherPacketCapture.md b/src/Network/Network/help/Stop-AzNetworkWatcherPacketCapture.md index a6cba754b6ab..11449f86e2d8 100644 --- a/src/Network/Network/help/Stop-AzNetworkWatcherPacketCapture.md +++ b/src/Network/Network/help/Stop-AzNetworkWatcherPacketCapture.md @@ -15,20 +15,22 @@ Stops a running packet capture session ### SetByResource (Default) ``` Stop-AzNetworkWatcherPacketCapture -NetworkWatcher -PacketCaptureName [-PassThru] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### SetByName ``` Stop-AzNetworkWatcherPacketCapture -NetworkWatcherName -ResourceGroupName - -PacketCaptureName [-PassThru] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -PacketCaptureName [-PassThru] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### SetByLocation ``` Stop-AzNetworkWatcherPacketCapture -Location -PacketCaptureName [-PassThru] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -150,6 +152,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the network watcher resource group. diff --git a/src/Network/Network/help/Stop-AzVirtualNetworkGatewayConnectionPacketCapture.md b/src/Network/Network/help/Stop-AzVirtualNetworkGatewayConnectionPacketCapture.md index a6d84fca5875..ba742fc3a295 100644 --- a/src/Network/Network/help/Stop-AzVirtualNetworkGatewayConnectionPacketCapture.md +++ b/src/Network/Network/help/Stop-AzVirtualNetworkGatewayConnectionPacketCapture.md @@ -15,19 +15,22 @@ Stops Packet Capture Operation on a Virtual Network Gateway connection ### ByName (Default) ``` Stop-AzVirtualNetworkGatewayConnectionPacketCapture -ResourceGroupName -Name -SasUrl - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByInputObject ``` Stop-AzVirtualNetworkGatewayConnectionPacketCapture -InputObject - -SasUrl [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -SasUrl [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByResourceId ``` Stop-AzVirtualNetworkGatewayConnectionPacketCapture -ResourceId -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -157,6 +160,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Stop-AzVirtualNetworkGatewayPacketCapture.md b/src/Network/Network/help/Stop-AzVirtualNetworkGatewayPacketCapture.md index fb25cebfa776..4450e1d89502 100644 --- a/src/Network/Network/help/Stop-AzVirtualNetworkGatewayPacketCapture.md +++ b/src/Network/Network/help/Stop-AzVirtualNetworkGatewayPacketCapture.md @@ -15,19 +15,22 @@ Stops Packet Capture Operation on a Virtual Network Gateway. ### ByName (Default) ``` Stop-AzVirtualNetworkGatewayPacketCapture -ResourceGroupName -Name -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByInputObject ``` Stop-AzVirtualNetworkGatewayPacketCapture -InputObject -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByResourceId ``` Stop-AzVirtualNetworkGatewayPacketCapture -ResourceId -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -157,6 +160,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Stop-AzVpnConnectionPacketCapture.md b/src/Network/Network/help/Stop-AzVpnConnectionPacketCapture.md index 66f85d7acb0a..8e6b02b68861 100644 --- a/src/Network/Network/help/Stop-AzVpnConnectionPacketCapture.md +++ b/src/Network/Network/help/Stop-AzVpnConnectionPacketCapture.md @@ -15,20 +15,22 @@ Stops Packet Capture Operation on a Vpn connection ### ByVpnConnectionName (Default) ``` Stop-AzVpnConnectionPacketCapture -ResourceGroupName -ParentResourceName -Name - -LinkConnectionName -SasUrl [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -LinkConnectionName -SasUrl [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnConnectionObject ``` Stop-AzVpnConnectionPacketCapture -InputObject -LinkConnectionName -SasUrl - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnConnectionResourceId ``` Stop-AzVpnConnectionPacketCapture -ResourceId -LinkConnectionName -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -190,6 +192,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Stop-AzVpnGatewayPacketCapture.md b/src/Network/Network/help/Stop-AzVpnGatewayPacketCapture.md index 558200b66980..1b2c86498703 100644 --- a/src/Network/Network/help/Stop-AzVpnGatewayPacketCapture.md +++ b/src/Network/Network/help/Stop-AzVpnGatewayPacketCapture.md @@ -15,19 +15,22 @@ Stops Packet Capture Operation on a Vpn Gateway. ### ByVpnGatewayName (Default) ``` Stop-AzVpnGatewayPacketCapture -ResourceGroupName -Name -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayObject ``` Stop-AzVpnGatewayPacketCapture -InputObject -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayResourceId ``` Stop-AzVpnGatewayPacketCapture -ResourceId -SasUrl [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -157,6 +160,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Sync-AzVirtualNetworkPeering.md b/src/Network/Network/help/Sync-AzVirtualNetworkPeering.md index a333a411689e..ad0d5493921e 100644 --- a/src/Network/Network/help/Sync-AzVirtualNetworkPeering.md +++ b/src/Network/Network/help/Sync-AzVirtualNetworkPeering.md @@ -15,13 +15,15 @@ Command to sync the address space on the peering link if the remote virtual netw ### Fields (Default) ``` Sync-AzVirtualNetworkPeering -VirtualNetworkName -ResourceGroupName -Name - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### Object ``` Sync-AzVirtualNetworkPeering -VirtualNetworkPeering - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -76,6 +78,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Test-AzDnsAvailability.md b/src/Network/Network/help/Test-AzDnsAvailability.md index a00d222f1bd5..1f9137bede1e 100644 --- a/src/Network/Network/help/Test-AzDnsAvailability.md +++ b/src/Network/Network/help/Test-AzDnsAvailability.md @@ -15,7 +15,7 @@ Checks whether a domain name in the cloudapp.azure.com zone is available for use ``` Test-AzDnsAvailability -DomainNameLabel -Location [-DefaultProfile ] - [] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -71,6 +71,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### CommonParameters This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). diff --git a/src/Network/Network/help/Test-AzNetworkWatcherConnectivity.md b/src/Network/Network/help/Test-AzNetworkWatcherConnectivity.md index c6a9c4de2e8c..ea997bea3b25 100644 --- a/src/Network/Network/help/Test-AzNetworkWatcherConnectivity.md +++ b/src/Network/Network/help/Test-AzNetworkWatcherConnectivity.md @@ -17,7 +17,7 @@ Returns connectivity information for a specified source VM and a destination. Test-AzNetworkWatcherConnectivity -NetworkWatcher -SourceId [-SourcePort ] [-DestinationId ] [-DestinationAddress ] [-DestinationPort ] [-ProtocolConfiguration ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName @@ -25,7 +25,7 @@ Test-AzNetworkWatcherConnectivity -NetworkWatcher -SourceId < Test-AzNetworkWatcherConnectivity -NetworkWatcherName -ResourceGroupName -SourceId [-SourcePort ] [-DestinationId ] [-DestinationAddress ] [-DestinationPort ] [-ProtocolConfiguration ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation @@ -33,7 +33,7 @@ Test-AzNetworkWatcherConnectivity -NetworkWatcherName -ResourceGroupNam Test-AzNetworkWatcherConnectivity -Location -SourceId [-SourcePort ] [-DestinationId ] [-DestinationAddress ] [-DestinationPort ] [-ProtocolConfiguration ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -210,6 +210,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ProtocolConfiguration Protocol configuration on which check connectivity will be performed. diff --git a/src/Network/Network/help/Test-AzNetworkWatcherIPFlow.md b/src/Network/Network/help/Test-AzNetworkWatcherIPFlow.md index 507feff1feaa..4e6f0dcf38b1 100644 --- a/src/Network/Network/help/Test-AzNetworkWatcherIPFlow.md +++ b/src/Network/Network/help/Test-AzNetworkWatcherIPFlow.md @@ -17,7 +17,7 @@ Returns whether the packet is allowed or denied to or from a particular destinat Test-AzNetworkWatcherIPFlow -NetworkWatcher -TargetVirtualMachineId -Direction -Protocol -RemoteIPAddress -LocalIPAddress -LocalPort [-RemotePort ] [-TargetNetworkInterfaceId ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByName @@ -25,7 +25,7 @@ Test-AzNetworkWatcherIPFlow -NetworkWatcher -TargetVirtualMac Test-AzNetworkWatcherIPFlow -NetworkWatcherName -ResourceGroupName -TargetVirtualMachineId -Direction -Protocol -RemoteIPAddress -LocalIPAddress -LocalPort [-RemotePort ] [-TargetNetworkInterfaceId ] - [-AsJob] [-DefaultProfile ] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [] ``` ### SetByLocation @@ -33,7 +33,7 @@ Test-AzNetworkWatcherIPFlow -NetworkWatcherName -ResourceGroupName -TargetVirtualMachineId -Direction -Protocol -RemoteIPAddress -LocalIPAddress -LocalPort [-RemotePort ] [-TargetNetworkInterfaceId ] [-AsJob] - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ## DESCRIPTION @@ -177,6 +177,21 @@ Accept pipeline input: True (ByValue) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Protocol Protocol. diff --git a/src/Network/Network/help/Test-AzPrivateIPAddressAvailability.md b/src/Network/Network/help/Test-AzPrivateIPAddressAvailability.md index 93891bc33313..d8df32b0fbf9 100644 --- a/src/Network/Network/help/Test-AzPrivateIPAddressAvailability.md +++ b/src/Network/Network/help/Test-AzPrivateIPAddressAvailability.md @@ -16,13 +16,14 @@ Test availability of a private IP address in a virtual network. ### TestByResource ``` Test-AzPrivateIPAddressAvailability -VirtualNetwork -IPAddress - [-DefaultProfile ] [] + [-DefaultProfile ] [-ProgressAction ] [] ``` ### TestByResourceId ``` Test-AzPrivateIPAddressAvailability -ResourceGroupName -VirtualNetworkName - -IPAddress [-DefaultProfile ] [] + -IPAddress [-DefaultProfile ] [-ProgressAction ] + [] ``` ## DESCRIPTION @@ -70,6 +71,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group for the virtual network. diff --git a/src/Network/Network/help/Test-AzPrivateLinkServiceVisibility.md b/src/Network/Network/help/Test-AzPrivateLinkServiceVisibility.md index c9b31ad8692e..4764555fbfdd 100644 --- a/src/Network/Network/help/Test-AzPrivateLinkServiceVisibility.md +++ b/src/Network/Network/help/Test-AzPrivateLinkServiceVisibility.md @@ -14,7 +14,8 @@ The **Test-AzPrivateLinkServiceVisibility** checks whether a private link servic ``` Test-AzPrivateLinkServiceVisibility -Location [-ResourceGroupName ] - -PrivateLinkServiceAlias [-DefaultProfile ] [] + -PrivateLinkServiceAlias [-DefaultProfile ] + [-ProgressAction ] [] ``` ## DESCRIPTION @@ -70,6 +71,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName Specifies the name of the resource group. diff --git a/src/Network/Network/help/Update-AzCustomIpPrefix.md b/src/Network/Network/help/Update-AzCustomIpPrefix.md index 09a885a5c076..63ce52995bd5 100644 --- a/src/Network/Network/help/Update-AzCustomIpPrefix.md +++ b/src/Network/Network/help/Update-AzCustomIpPrefix.md @@ -16,21 +16,23 @@ Updates a CustomIpPrefix ``` Update-AzCustomIpPrefix -Name -ResourceGroupName [-Commission] [-Decommission] [-Provision] [-Deprovision] [-NoInternetAdvertise] [-Cidr ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### UpdateByInputObjectParameterSet ``` Update-AzCustomIpPrefix -InputObject [-Commission] [-Decommission] [-Provision] [-Deprovision] [-NoInternetAdvertise] [-Cidr ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### UpdateByResourceIdParameterSet ``` Update-AzCustomIpPrefix -ResourceId [-Commission] [-Decommission] [-Provision] [-Deprovision] [-NoInternetAdvertise] [-Cidr ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -217,6 +219,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Provision Provision the CustomIpPrefix resource diff --git a/src/Network/Network/help/Update-AzNetworkSecurityPerimeter.md b/src/Network/Network/help/Update-AzNetworkSecurityPerimeter.md new file mode 100644 index 000000000000..1bfa7c719f15 --- /dev/null +++ b/src/Network/Network/help/Update-AzNetworkSecurityPerimeter.md @@ -0,0 +1,288 @@ +--- +external help file: Az.NetworkSecurityPerimeter.psm1-help.xml +Module Name: Az.Network +online version: https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeter +schema: 2.0.0 +--- + +# Update-AzNetworkSecurityPerimeter + +## SYNOPSIS +Patch Tags for a Network Security Perimeter. + +## SYNTAX + +### PatchExpanded (Default) +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] + [-Tag ] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +### PatchViaJsonString +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] + -JsonString [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +### PatchViaJsonFilePath +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] + -JsonFilePath [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] +``` + +### Patch +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] + -Parameter [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] +``` + +### PatchViaIdentityExpanded +``` +Update-AzNetworkSecurityPerimeter -InputObject [-Tag ] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] [] +``` + +### PatchViaIdentity +``` +Update-AzNetworkSecurityPerimeter -InputObject + -Parameter [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] +``` + +## DESCRIPTION +Patch Tags for a Network Security Perimeter. + +## EXAMPLES + +### Example 1: Updates a NetworkSecurityPerimeter +```powershell +Update-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 +``` + +```output +Location Name +-------- ---- + nsp3 +``` + +Updates a NetworkSecurityPerimeter + +### Example 2: Updates a NetworkSecurityPerimeter by identity (using pipe) +```powershell +$GETObj = Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + Update-AzNetworkSecurityPerimeter -InputObject $GETObj +``` + +```output +Location Name +-------- ---- + nsp3 +``` + +Updates a NetworkSecurityPerimeter by identity (using pipe) + +## PARAMETERS + +### -DefaultProfile +The DefaultProfile parameter is not functional. +Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + +```yaml +Type: System.Management.Automation.PSObject +Parameter Sets: (All) +Aliases: AzureRMContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -InputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PatchViaIdentityExpanded, PatchViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -JsonFilePath +Path of Json file supplied to the Patch operation + +```yaml +Type: System.String +Parameter Sets: PatchViaJsonFilePath +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -JsonString +Json string supplied to the Patch operation + +```yaml +Type: System.String +Parameter Sets: PatchViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Name +The name of the network security perimeter. + +```yaml +Type: System.String +Parameter Sets: PatchExpanded, PatchViaJsonString, PatchViaJsonFilePath, Patch +Aliases: NetworkSecurityPerimeterName, SecurityPerimeterName, NSPName + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Parameter +Update tags request. + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest +Parameter Sets: Patch, PatchViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ResourceGroupName +The name of the resource group. + +```yaml +Type: System.String +Parameter Sets: PatchExpanded, PatchViaJsonString, PatchViaJsonFilePath, Patch +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SubscriptionId +The subscription credentials which uniquely identify the Microsoft Azure subscription. +The subscription ID forms part of the URI for every service call. + +```yaml +Type: System.String +Parameter Sets: PatchExpanded, PatchViaJsonString, PatchViaJsonFilePath, Patch +Aliases: + +Required: False +Position: Named +Default value: (Get-AzContext).Subscription.Id +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Tag +List of tags for Network Security Perimeter + +```yaml +Type: System.Collections.Hashtable +Parameter Sets: PatchExpanded, PatchViaIdentityExpanded +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest + +## OUTPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + +## NOTES + +## RELATED LINKS diff --git a/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAccessRule.md index 956192234122..6415353d4927 100644 --- a/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAccessRule.md @@ -17,16 +17,18 @@ Updates an access rule. Update-AzNetworkSecurityPerimeterAccessRule -ResourceGroupName -Name -SecurityPerimeterName -ProfileName [-SubscriptionId ] [-Tag ] [-Location ] [-AddressPrefix ] [-FullyQualifiedDomainName ] - [-EmailAddress ] [-PhoneNumber ] [-Direction ] [-Subscription ] - [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] [] + [-EmailAddress ] [-PhoneNumber ] [-ServiceTag ] [-Direction ] + [-Subscription ] [-DefaultProfile ] [-AsJob] [-NoWait] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### UpdateViaIdentityExpanded ``` Update-AzNetworkSecurityPerimeterAccessRule -InputObject [-Tag ] [-Location ] [-AddressPrefix ] [-FullyQualifiedDomainName ] - [-EmailAddress ] [-PhoneNumber ] [-Direction ] [-Subscription ] - [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] [] + [-EmailAddress ] [-PhoneNumber ] [-ServiceTag ] [-Direction ] + [-Subscription ] [-DefaultProfile ] [-AsJob] [-NoWait] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -34,24 +36,40 @@ Updates an access rule. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Updates a NetworkSecurityPerimeterAccessRule +```powershell Update-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -ProfileName profile1 -AddressPrefix @('10.10.0.0/17') ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- + ar3 ``` + +Updates a NetworkSecurityPerimeterAccessRule + +### Example 2: Updates a NetworkSecurityPerimeterAccessRule by identity (using pipe) +```powershell $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 -ProfileName profile1 -Update-AzNetworkSecurityPerimeterAccessRule -InputObject $GETObj -AddressPrefix @('10.0.0.0/16') + Update-AzNetworkSecurityPerimeterAccessRule -InputObject $GETObj -AddressPrefix @('10.0.0.0/16') +``` + +```output +Location Name +-------- ---- + ar3 ``` +Updates a NetworkSecurityPerimeterAccessRule by identity (using pipe) + ## PARAMETERS ### -AddressPrefix Address Prefix ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -66,13 +84,13 @@ Accept wildcard characters: False Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -81,7 +99,7 @@ Accept wildcard characters: False The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -96,7 +114,7 @@ Accept wildcard characters: False Direction ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -111,7 +129,7 @@ Accept wildcard characters: False Email Addresses ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -126,7 +144,7 @@ Accept wildcard characters: False Fully qualified domain name ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -142,7 +160,7 @@ Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -157,7 +175,7 @@ Accept wildcard characters: False Location of the resource ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -172,7 +190,7 @@ Accept wildcard characters: False The name of the access rule. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: AccessRuleName @@ -187,13 +205,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -202,7 +220,7 @@ Accept wildcard characters: False Phone Numbers ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -217,7 +235,7 @@ Accept wildcard characters: False The name of the profile ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -228,12 +246,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -248,7 +281,7 @@ Accept wildcard characters: False The name of the network security perimeter ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: NetworkSecurityPerimeterName @@ -259,12 +292,26 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ServiceTag +Service Tags + +```yaml +Type: System.String[] +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subscription Subscription ids -To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ```yaml -Type: ISubscriptionId[] +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[] Parameter Sets: (All) Aliases: @@ -279,13 +326,13 @@ Accept wildcard characters: False The ID of the target subscription. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -294,7 +341,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: (All) Aliases: @@ -309,7 +356,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -325,7 +372,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -342,32 +389,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity parameter. - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. - -SUBSCRIPTION \: Subscription ids - \[Id \\]: Subscription id in the ARM id format. ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeteraccessrule](https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeteraccessrule) - diff --git a/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAssociation.md b/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAssociation.md index 4262e1f7b5ef..9a4fcc1c61db 100644 --- a/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/Network/help/Update-AzNetworkSecurityPerimeterAssociation.md @@ -17,15 +17,15 @@ Updates an association Update-AzNetworkSecurityPerimeterAssociation -ResourceGroupName -Name -SecurityPerimeterName [-SubscriptionId ] [-Tag ] [-Location ] [-AccessMode ] [-PrivateLinkResourceId ] [-ProfileId ] [-DefaultProfile ] - [-AsJob] [-NoWait] [-WhatIf] [-Confirm] [] + [-AsJob] [-NoWait] [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### UpdateViaIdentityExpanded ``` Update-AzNetworkSecurityPerimeterAssociation -InputObject [-Tag ] [-Location ] [-AccessMode ] [-PrivateLinkResourceId ] - [-ProfileId ] [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] - [] + [-ProfileId ] [-DefaultProfile ] [-AsJob] [-NoWait] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -33,24 +33,40 @@ Updates an association. ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Updates a NetworkSecurityPerimeterAccessAssociation +```powershell Update-AzNetworkSecurityPerimeterAssociation -Name association1 -SecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 -AccessMode Enforced ``` -### EXAMPLE 2 +```output +Location Name +-------- ---- + association1 ``` + +Updates a NetworkSecurityPerimeterAccessAssociation + +### Example 2: Updates a NetworkSecurityPerimeterAccessAssociation by identity (using pipe) +```powershell $GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association1 -SecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 -Update-AzNetworkSecurityPerimeterAssociation -InputObject $GETObj -AccessMode Learning + Update-AzNetworkSecurityPerimeterAssociation -InputObject $GETObj -AccessMode Learning ``` +```output +Location Name +-------- ---- + association1 +``` + +Updates a NetworkSecurityPerimeterAccessAssociation by identity (using pipe) + ## PARAMETERS ### -AccessMode Access Mode ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -65,13 +81,13 @@ Accept wildcard characters: False Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -80,7 +96,7 @@ Accept wildcard characters: False The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -96,7 +112,7 @@ Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -111,7 +127,7 @@ Accept wildcard characters: False Location of the resource ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -126,7 +142,7 @@ Accept wildcard characters: False The name of the association. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: AssociationName @@ -141,13 +157,13 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -156,7 +172,7 @@ Accept wildcard characters: False Private link resource id ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -171,7 +187,7 @@ Accept wildcard characters: False Network security perimeter profile id ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -182,12 +198,27 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -202,7 +233,7 @@ Accept wildcard characters: False The name of the network security perimeter ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: NetworkSecurityPerimeterName @@ -217,13 +248,13 @@ Accept wildcard characters: False The ID of the target subscription. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -232,7 +263,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: (All) Aliases: @@ -247,7 +278,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -263,7 +294,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -280,29 +311,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity parameter. - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeterassociation](https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeterassociation) - diff --git a/src/Network/Network/help/Update-AzNetworkSecurityPerimeterLink.md b/src/Network/Network/help/Update-AzNetworkSecurityPerimeterLink.md index 16f6d579e5d0..b0cbf9842884 100644 --- a/src/Network/Network/help/Update-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/Network/help/Update-AzNetworkSecurityPerimeterLink.md @@ -17,16 +17,16 @@ Updates a NSP Link Update-AzNetworkSecurityPerimeterLink -ResourceGroupName -Name -SecurityPerimeterName [-SubscriptionId ] [-Tag ] [-Location ] [-AutoApprovedRemotePerimeterResourceId ] [-LocalInboundProfile ] - [-RemoteInboundProfile ] [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] - [] + [-RemoteInboundProfile ] [-DefaultProfile ] [-AsJob] [-NoWait] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### UpdateViaIdentityExpanded ``` Update-AzNetworkSecurityPerimeterLink -InputObject [-Tag ] [-Location ] [-AutoApprovedRemotePerimeterResourceId ] [-LocalInboundProfile ] - [-RemoteInboundProfile ] [-DefaultProfile ] [-AsJob] [-NoWait] [-WhatIf] [-Confirm] - [] + [-RemoteInboundProfile ] [-DefaultProfile ] [-AsJob] [-NoWait] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -34,17 +34,33 @@ Updates a NSP Link ## EXAMPLES -### EXAMPLE 1 -``` +### Example 1: Update network security perimeter link +```powershell Update-AzNetworkSecurityPerimeterLink -Name t-link2 -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp4 -LocalInboundProfile @('*') -RemoteInboundProfile @('*') ``` -### EXAMPLE 2 +```output +Etag Name +---- ---- + t-link2 ``` + +Update network security perimeter link + +### Example 2: Update network security perimeter link via identity +```powershell $getLinkObj = Get-AzNetworkSecurityPerimeterLink -Name t-link2 -ResourceGroupName psrg_ex -SecurityPerimeterName ext-nsp4 -``` Update-AzNetworkSecurityPerimeterLink -InputObject $getLinkObj -LocalInboundProfile @('*') +``` + +```output +Etag Name +---- ---- + t-link2 +``` + +Update network security perimeter link via identity ## PARAMETERS @@ -52,13 +68,13 @@ Update-AzNetworkSecurityPerimeterLink -InputObject $getLinkObj -LocalInboundProf Run the command as a job ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -67,7 +83,7 @@ Accept wildcard characters: False Auto approved remote perimeter resource id ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -82,7 +98,7 @@ Accept wildcard characters: False The credentials, account, tenant, and subscription used for communication with Azure. ```yaml -Type: PSObject +Type: System.Management.Automation.PSObject Parameter Sets: (All) Aliases: AzureRMContext, AzureCredential @@ -98,7 +114,7 @@ Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml -Type: INetworkSecurityPerimeterIdentity +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity Parameter Sets: UpdateViaIdentityExpanded Aliases: @@ -113,7 +129,7 @@ Accept wildcard characters: False Local inbound profiles ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -128,7 +144,7 @@ Accept wildcard characters: False Location of the resource ```yaml -Type: String +Type: System.String Parameter Sets: (All) Aliases: @@ -143,7 +159,7 @@ Accept wildcard characters: False The name of the Link. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: LinkName @@ -158,13 +174,28 @@ Accept wildcard characters: False Run the command asynchronously ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: Required: False Position: Named -Default value: False +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None Accept pipeline input: False Accept wildcard characters: False ``` @@ -173,7 +204,7 @@ Accept wildcard characters: False Remote inbound profiles ```yaml -Type: String[] +Type: System.String[] Parameter Sets: (All) Aliases: @@ -189,7 +220,7 @@ The name of the resource group. The name is case insensitive. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: @@ -204,7 +235,7 @@ Accept wildcard characters: False The name of the network security perimeter ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: NetworkSecurityPerimeterName @@ -219,13 +250,13 @@ Accept wildcard characters: False The ID of the target subscription. ```yaml -Type: String +Type: System.String Parameter Sets: UpdateExpanded Aliases: Required: False Position: Named -Default value: None +Default value: (Get-AzContext).Subscription.Id Accept pipeline input: False Accept wildcard characters: False ``` @@ -234,7 +265,7 @@ Accept wildcard characters: False Resource tags. ```yaml -Type: Hashtable +Type: System.Collections.Hashtable Parameter Sets: (All) Aliases: @@ -249,7 +280,7 @@ Accept wildcard characters: False Prompts you for confirmation before running the cmdlet. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: cf @@ -265,7 +296,7 @@ Shows what would happen if the cmdlet runs. The cmdlet is not run. ```yaml -Type: SwitchParameter +Type: System.Management.Automation.SwitchParameter Parameter Sets: (All) Aliases: wi @@ -282,29 +313,11 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## INPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + ## OUTPUTS ### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink + ## NOTES -COMPLEX PARAMETER PROPERTIES - -To create the parameters described below, construct a hash table containing the appropriate properties. -For information on hash tables, run Get-Help about_Hash_Tables. - -INPUTOBJECT \: Identity parameter. - \[AccessRuleName \\]: The name of the NSP access rule. - \[AssociationName \\]: The name of the NSP association. - \[Id \\]: Resource identity path - \[LinkName \\]: The name of the NSP link. - \[LinkReferenceName \\]: The name of the NSP linkReference. - \[Location \\]: The location of network security perimeter. - \[NetworkSecurityPerimeterName \\]: The name of the network security perimeter. - \[ProfileName \\]: The name of the NSP profile. - \[ResourceGroupName \\]: The name of the resource group. - \[SubscriptionId \\]: The subscription credentials which uniquely identify the Microsoft Azure subscription. -The subscription ID forms part of the URI for every service call. ## RELATED LINKS - -[https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeterlink](https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeterlink) - diff --git a/src/Network/Network/help/Update-AzNetworkVirtualAppliance.md b/src/Network/Network/help/Update-AzNetworkVirtualAppliance.md index 3880c0f0f06c..f5cf5fe65ae3 100644 --- a/src/Network/Network/help/Update-AzNetworkVirtualAppliance.md +++ b/src/Network/Network/help/Update-AzNetworkVirtualAppliance.md @@ -15,7 +15,8 @@ Update or Change a Network Virtual Appliance resource. ``` Update-AzNetworkVirtualAppliance -Name -ResourceGroupName [-Sku ] [-VirtualApplianceAsn ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -103,6 +104,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzNetworkVirtualApplianceConnection.md b/src/Network/Network/help/Update-AzNetworkVirtualApplianceConnection.md index 29593f71b092..273eaf63111c 100644 --- a/src/Network/Network/help/Update-AzNetworkVirtualApplianceConnection.md +++ b/src/Network/Network/help/Update-AzNetworkVirtualApplianceConnection.md @@ -16,21 +16,22 @@ Update or Change a Network Virtual Appliance Connection resource. ``` Update-AzNetworkVirtualApplianceConnection -ResourceGroupName -VirtualApplianceName -Name [-RoutingConfiguration ] [-Force] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceObjectParameterSet ``` Update-AzNetworkVirtualApplianceConnection -VirtualAppliance -Name - [-RoutingConfiguration ] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ResourceIdParameterSet ``` Update-AzNetworkVirtualApplianceConnection -VirtualApplianceResourceId -Name - [-RoutingConfiguration ] [-Force] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-Force] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -73,8 +74,6 @@ RoutingConfiguration : { } ``` - - ## PARAMETERS ### -DefaultProfile @@ -122,6 +121,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. @@ -244,6 +258,7 @@ This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable ## NOTES ## RELATED LINKS + [New-AzRoutingConfiguration](./New-AzRoutingConfiguration.md) [Get-AzNetworkVirtualAppliance](./Get-AzNetworkVirtualAppliance.md) diff --git a/src/Network/Network/help/Update-AzP2sVpnGateway.md b/src/Network/Network/help/Update-AzP2sVpnGateway.md index 92a94d558351..f4f7e857edbe 100644 --- a/src/Network/Network/help/Update-AzP2sVpnGateway.md +++ b/src/Network/Network/help/Update-AzP2sVpnGateway.md @@ -18,7 +18,7 @@ Update-AzP2sVpnGateway -ResourceGroupName -Name [-VpnClientAdd [-P2SConnectionConfiguration ] [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayNameByVpnServerConfigurationObject @@ -28,7 +28,7 @@ Update-AzP2sVpnGateway -ResourceGroupName -Name [-VpnClientAdd [-VpnServerConfiguration ] [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayNameByVpnServerConfigurationResourceId @@ -37,7 +37,8 @@ Update-AzP2sVpnGateway -ResourceGroupName -Name [-VpnClientAdd [-P2SConnectionConfiguration ] -VpnServerConfigurationId [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByP2SVpnGatewayObjectNoVpnServerConfigurationUpdate @@ -46,7 +47,7 @@ Update-AzP2sVpnGateway -InputObject [-VpnClientAddressPool ] [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayObjectByVpnServerConfigurationObject @@ -56,7 +57,7 @@ Update-AzP2sVpnGateway -InputObject [-VpnClientAddressPool ] [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayObjectByVpnServerConfigurationResourceId @@ -65,7 +66,8 @@ Update-AzP2sVpnGateway -InputObject [-VpnClientAddressPool ] -VpnServerConfigurationId [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByP2SVpnGatewayResourceIdNoVpnServerConfigurationUpdate @@ -74,7 +76,7 @@ Update-AzP2sVpnGateway -ResourceId [-VpnClientAddressPool ] [-P2SConnectionConfiguration ] [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayResourceIdByVpnServerConfigurationObject @@ -84,7 +86,7 @@ Update-AzP2sVpnGateway -ResourceId [-VpnClientAddressPool ] [-VpnServerConfiguration ] [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByP2SVpnGatewayResourceIdByVpnServerConfigurationResourceId @@ -93,7 +95,8 @@ Update-AzP2sVpnGateway -ResourceId [-VpnClientAddressPool ] [-P2SConnectionConfiguration ] -VpnServerConfigurationId [-VpnGatewayScaleUnit ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -291,6 +294,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzRouteMap.md b/src/Network/Network/help/Update-AzRouteMap.md index 32d109537068..54141dfa89ec 100644 --- a/src/Network/Network/help/Update-AzRouteMap.md +++ b/src/Network/Network/help/Update-AzRouteMap.md @@ -15,26 +15,29 @@ Update a route map of a VirtualHub. ### ByRouteMapName (Default) ``` Update-AzRouteMap [-ResourceGroupName ] [-VirtualHubName ] [-Name ] - [-RouteMapRule ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-RouteMapRule ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject ``` Update-AzRouteMap [-Name ] [-VirtualHubObject ] [-RouteMapRule ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRouteMapObject ``` Update-AzRouteMap [-InputObject ] [-RouteMapRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByRouteMapResourceId ``` Update-AzRouteMap [-ResourceId ] [-RouteMapRule ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -158,6 +161,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzRouteServer.md b/src/Network/Network/help/Update-AzRouteServer.md index 396eac79b556..f64743a96002 100644 --- a/src/Network/Network/help/Update-AzRouteServer.md +++ b/src/Network/Network/help/Update-AzRouteServer.md @@ -16,14 +16,15 @@ Update an Azure RouteServer. ``` Update-AzRouteServer -ResourceGroupName -RouteServerName [-AllowBranchToBranchTraffic ] [-HubRoutingPreference ] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RouteServerResourceIdParameterSet ``` Update-AzRouteServer [-AllowBranchToBranchTraffic ] -ResourceId - [-HubRoutingPreference ] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-HubRoutingPreference ] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -100,6 +101,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server. diff --git a/src/Network/Network/help/Update-AzRouteServerPeer.md b/src/Network/Network/help/Update-AzRouteServerPeer.md index cd7bacbcb0ca..6ac6b01ef590 100644 --- a/src/Network/Network/help/Update-AzRouteServerPeer.md +++ b/src/Network/Network/help/Update-AzRouteServerPeer.md @@ -15,26 +15,29 @@ Update a Peer in an Azure RouteServer ### RouteServerNameParameterSet (Default) ``` Update-AzRouteServerPeer -ResourceGroupName -RouteServerName [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### RouteServerNPeerNameParameterSet ``` Update-AzRouteServerPeer -ResourceGroupName -PeerName -PeerIp -PeerAsn - -RouteServerName [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -RouteServerName [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### RouteServerNPeerInputObjectParameterSet ``` Update-AzRouteServerPeer -ResourceGroupName -RouteServerName -InputObject - [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ### RouteServerNPeerResourceIdParameterSet ``` Update-AzRouteServerPeer -ResourceGroupName -RouteServerName -ResourceId [-Force] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -166,6 +169,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the route server/peer. diff --git a/src/Network/Network/help/Update-AzVHubRouteTable.md b/src/Network/Network/help/Update-AzVHubRouteTable.md index b4a3b601ce83..1f22865c6a94 100644 --- a/src/Network/Network/help/Update-AzVHubRouteTable.md +++ b/src/Network/Network/help/Update-AzVHubRouteTable.md @@ -15,27 +15,29 @@ Delete a hub route table resource associated with a VirtualHub. ### ByVHubRouteTableName (Default) ``` Update-AzVHubRouteTable -ResourceGroupName -ParentResourceName -Name - [-Route ] [-Label ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-Route ] [-Label ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObject ``` Update-AzVHubRouteTable -Name -ParentObject [-Route ] - [-Label ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Label ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVHubRouteTableObject ``` Update-AzVHubRouteTable -InputObject [-Route ] [-Label ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVHubRouteTableResourceId ``` Update-AzVHubRouteTable -ResourceId [-Route ] [-Label ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -194,6 +196,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVirtualApplianceInboundSecurityRule.md b/src/Network/Network/help/Update-AzVirtualApplianceInboundSecurityRule.md index cb5eef9960d0..b3c99e6b7943 100644 --- a/src/Network/Network/help/Update-AzVirtualApplianceInboundSecurityRule.md +++ b/src/Network/Network/help/Update-AzVirtualApplianceInboundSecurityRule.md @@ -15,25 +15,28 @@ Update the Inbound Security Rule of a Network Virtual Appliance Resource ### ResourceNameParameterSet (Default) ``` Update-AzVirtualApplianceInboundSecurityRule -ResourceGroupName -VirtualApplianceName - -Name -RuleType - -Rule - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + -Name [-RuleType ] + -Rule + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceObjectParameterSet ``` Update-AzVirtualApplianceInboundSecurityRule -VirtualAppliance -Name - -RuleType - -Rule - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RuleType ] + -Rule + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ResourceIdParameterSet ``` Update-AzVirtualApplianceInboundSecurityRule -VirtualApplianceResourceId -Name - -RuleType - -Rule - [-Force] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-RuleType ] + -Rule + [-Force] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -55,7 +58,6 @@ Update-AzVirtualApplianceInboundSecurityRule -ResourceGroupName InboundRuleRg -V The above command creates or updates the Inbound Security rule with the given Rule collection name: ruleCollection2 on the NVA: nva1 with rule type Auto Expire having rules as defined in the rules property. The Inbound Security Rule will created only an NSG rule. - ## PARAMETERS ### -DefaultProfile @@ -103,6 +105,21 @@ Accept pipeline input: False Accept wildcard characters: True ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. @@ -122,7 +139,7 @@ Accept wildcard characters: False Individual rule of the Inbound Security ```yaml -Type: System.Collections.Generic.List`1[Microsoft.Azure.Commands.Network.Models.PSInboundSecurityPropertyRules] +Type: System.Collections.Generic.List`1[Microsoft.Azure.Commands.Network.Models.PSInboundSecurityRulesProperty] Parameter Sets: (All) Aliases: @@ -141,7 +158,7 @@ Type: System.String Parameter Sets: (All) Aliases: -Required: True +Required: False Position: Named Default value: None Accept pipeline input: False diff --git a/src/Network/Network/help/Update-AzVirtualApplianceSite.md b/src/Network/Network/help/Update-AzVirtualApplianceSite.md index 18a3fd9eaf83..2416df0cda0b 100644 --- a/src/Network/Network/help/Update-AzVirtualApplianceSite.md +++ b/src/Network/Network/help/Update-AzVirtualApplianceSite.md @@ -15,7 +15,8 @@ Change or Modify a Virtual Appliance site connected to a Network Virtual Applian ``` Update-AzVirtualApplianceSite -Name -ResourceGroupName -NetworkVirtualApplianceId [-AddresssPrefix ] [-O365Policy ] [-Tag ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -138,6 +139,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVirtualHub.md b/src/Network/Network/help/Update-AzVirtualHub.md index 523505e74dc9..5d6624603a25 100644 --- a/src/Network/Network/help/Update-AzVirtualHub.md +++ b/src/Network/Network/help/Update-AzVirtualHub.md @@ -18,7 +18,8 @@ Update-AzVirtualHub -ResourceGroupName -Name [-AddressPrefix < [-HubVnetConnection ] [-RouteTable ] [-Tag ] [-Sku ] [-PreferredRoutingGateway ] [-HubRoutingPreference ] [-VirtualRouterAsn ] [-VirtualRouterAutoScaleConfiguration ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceId @@ -27,7 +28,8 @@ Update-AzVirtualHub -ResourceId [-AddressPrefix ] [-HubVnetConnection ] [-RouteTable ] [-Tag ] [-Sku ] [-PreferredRoutingGateway ] [-HubRoutingPreference ] [-VirtualRouterAsn ] [-VirtualRouterAutoScaleConfiguration ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObject @@ -36,7 +38,8 @@ Update-AzVirtualHub -InputObject [-AddressPrefix ] [-HubVnetConnection ] [-RouteTable ] [-Tag ] [-Sku ] [-PreferredRoutingGateway ] [-HubRoutingPreference ] [-VirtualRouterAsn ] [-VirtualRouterAutoScaleConfiguration ] - [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -249,6 +252,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVirtualHubBgpConnection.md b/src/Network/Network/help/Update-AzVirtualHubBgpConnection.md index 2cb0fcea14fc..321a138b106d 100644 --- a/src/Network/Network/help/Update-AzVirtualHubBgpConnection.md +++ b/src/Network/Network/help/Update-AzVirtualHubBgpConnection.md @@ -16,64 +16,70 @@ The Update-AzVirtualHubBgpConnection cmdlet updates an existing HubBgpConnection ``` Update-AzVirtualHubBgpConnection -ResourceGroupName -VirtualHubName -Name -PeerIp -PeerAsn -VirtualHubVnetConnection [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubNameByHubVirtualNetworkConnectionResourceId ``` Update-AzVirtualHubBgpConnection -ResourceGroupName -VirtualHubName -Name -PeerIp -PeerAsn -VirtualHubVnetConnectionId [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByHubVirtualNetworkConnectionObject ``` Update-AzVirtualHubBgpConnection -Name -PeerIp -PeerAsn -VirtualHubVnetConnection -VirtualHub [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByHubVirtualNetworkConnectionResourceId ``` Update-AzVirtualHubBgpConnection -Name -PeerIp -PeerAsn -VirtualHubVnetConnectionId -VirtualHub [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubBgpConnectionResourceIdByHubVirtualNetworkConnectionObject ``` Update-AzVirtualHubBgpConnection -PeerIp -PeerAsn -VirtualHubVnetConnection -ResourceId [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubBgpConnectionResourceIdByHubVirtualNetworkConnectionResourceId ``` Update-AzVirtualHubBgpConnection -PeerIp -PeerAsn -VirtualHubVnetConnectionId - -ResourceId [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -ResourceId [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByHubBgpConnectionObjectByHubVirtualNetworkConnectionObject ``` Update-AzVirtualHubBgpConnection [-PeerIp ] [-PeerAsn ] -VirtualHubVnetConnection -InputObject [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubBgpConnectionObjectByHubVirtualNetworkConnectionResourceId ``` Update-AzVirtualHubBgpConnection [-PeerIp ] [-PeerAsn ] -VirtualHubVnetConnectionId - -InputObject [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -InputObject [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByHubBgpConnectionObject ``` Update-AzVirtualHubBgpConnection [-PeerIp ] [-PeerAsn ] [-VirtualHubVnetConnection ] [-VirtualHubVnetConnectionId ] - -InputObject [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -InputObject [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -220,6 +226,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVirtualHubVnetConnection.md b/src/Network/Network/help/Update-AzVirtualHubVnetConnection.md index 616747b0d99d..740541a907fd 100644 --- a/src/Network/Network/help/Update-AzVirtualHubVnetConnection.md +++ b/src/Network/Network/help/Update-AzVirtualHubVnetConnection.md @@ -16,21 +16,23 @@ Updates an existing HubVirtualNetworkConnection. ``` Update-AzVirtualHubVnetConnection -ResourceGroupName -ParentResourceName -Name [-EnableInternetSecurity ] [-RoutingConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubVirtualNetworkConnectionObject ``` Update-AzVirtualHubVnetConnection -InputObject [-EnableInternetSecurity ] [-RoutingConfiguration ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByHubVirtualNetworkConnectionResourceId ``` Update-AzVirtualHubVnetConnection -ResourceId [-EnableInternetSecurity ] - [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + [-RoutingConfiguration ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -168,6 +170,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVirtualNetworkGatewayNatRule.md b/src/Network/Network/help/Update-AzVirtualNetworkGatewayNatRule.md index 28a8f2bbc95e..6480ab27d325 100644 --- a/src/Network/Network/help/Update-AzVirtualNetworkGatewayNatRule.md +++ b/src/Network/Network/help/Update-AzVirtualNetworkGatewayNatRule.md @@ -17,15 +17,16 @@ Updates a Virtual Network Gateway NatRule. Update-AzVirtualNetworkGatewayNatRule -ResourceGroupName -ParentResourceName -Name [-InternalMapping ] [-ExternalMapping ] [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualNetworkGatewayNatRuleResourceId ``` Update-AzVirtualNetworkGatewayNatRule -ResourceId [-InternalMapping ] [-ExternalMapping ] [-InternalPortRange ] [-ExternalPortRange ] - [-IpConfigurationId ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-IpConfigurationId ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVirtualNetworkGatewayNatRuleObject @@ -33,7 +34,8 @@ Update-AzVirtualNetworkGatewayNatRule -ResourceId [-InternalMapping [-InternalMapping ] [-ExternalMapping ] [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -219,6 +221,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVirtualRouter.md b/src/Network/Network/help/Update-AzVirtualRouter.md index 74c90fb2358b..9122c36974c8 100644 --- a/src/Network/Network/help/Update-AzVirtualRouter.md +++ b/src/Network/Network/help/Update-AzVirtualRouter.md @@ -15,13 +15,15 @@ Updates a Virtual Router. ### VirtualRouterNameParameterSet (Default) ``` Update-AzVirtualRouter -ResourceGroupName -RouterName [-AllowBranchToBranchTraffic] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### VirtualRouterResourceIdParameterSet ``` Update-AzVirtualRouter [-AllowBranchToBranchTraffic] -ResourceId - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -75,6 +77,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router. diff --git a/src/Network/Network/help/Update-AzVirtualRouterPeer.md b/src/Network/Network/help/Update-AzVirtualRouterPeer.md index 0b85908c9e2c..c00b824da77e 100644 --- a/src/Network/Network/help/Update-AzVirtualRouterPeer.md +++ b/src/Network/Network/help/Update-AzVirtualRouterPeer.md @@ -15,27 +15,29 @@ Update a Peer in an Azure VirtualRouter ### VirtualRouterNameParameterSet (Default) ``` Update-AzVirtualRouterPeer -ResourceGroupName -VirtualRouterName [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### VirtualRouterPeerNameParameterSet ``` Update-AzVirtualRouterPeer -ResourceGroupName -PeerName -PeerIp -PeerAsn - -VirtualRouterName [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + -VirtualRouterName [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### VirtualRouterPeerObjectParameterSet ``` Update-AzVirtualRouterPeer -ResourceGroupName -VirtualRouterName - -InputObject [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] - [-Confirm] [] + -InputObject [-Force] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### VirtualRouterPeerResourceIdParameterSet ``` Update-AzVirtualRouterPeer -ResourceGroupName -VirtualRouterName -ResourceId - [-Force] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-Force] [-AsJob] [-DefaultProfile ] [-ProgressAction ] [-WhatIf] + [-Confirm] [] ``` ## DESCRIPTION @@ -167,6 +169,21 @@ Accept pipeline input: True (ByPropertyName) Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name of the virtual router/peer. diff --git a/src/Network/Network/help/Update-AzVirtualWan.md b/src/Network/Network/help/Update-AzVirtualWan.md index 5a00522e092a..e682cbdb5f84 100644 --- a/src/Network/Network/help/Update-AzVirtualWan.md +++ b/src/Network/Network/help/Update-AzVirtualWan.md @@ -16,21 +16,24 @@ Updates an Azure Virtual WAN. ``` Update-AzVirtualWan -ResourceGroupName -Name [-AllowVnetToVnetTraffic ] [-AllowBranchToBranchTraffic ] [-Tag ] [-VirtualWANType ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanObject ``` Update-AzVirtualWan -InputObject [-AllowVnetToVnetTraffic ] [-AllowBranchToBranchTraffic ] [-Tag ] [-VirtualWANType ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualWanResourceId ``` Update-AzVirtualWan -ResourceId [-AllowVnetToVnetTraffic ] [-AllowBranchToBranchTraffic ] [-Tag ] [-VirtualWANType ] [-Force] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -166,6 +169,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVpnConnection.md b/src/Network/Network/help/Update-AzVpnConnection.md index 23ac86bdad52..85a01033da0d 100644 --- a/src/Network/Network/help/Update-AzVpnConnection.md +++ b/src/Network/Network/help/Update-AzVpnConnection.md @@ -20,7 +20,7 @@ Update-AzVpnConnection -ResourceGroupName -ParentResourceName [-VpnSiteLinkConnection ] [-EnableInternetSecurity ] [-RoutingConfiguration ] [-VpnLinkConnectionMode ] [-TrafficSelectorPolicy ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnConnectionResourceId @@ -30,7 +30,8 @@ Update-AzVpnConnection -ResourceId [-SharedKey ] [-Connec [-UsePolicyBasedTrafficSelectors ] [-VpnSiteLinkConnection ] [-EnableInternetSecurity ] [-RoutingConfiguration ] [-VpnLinkConnectionMode ] [-TrafficSelectorPolicy ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnConnectionObject @@ -41,7 +42,7 @@ Update-AzVpnConnection -InputObject [-SharedKey [-VpnSiteLinkConnection ] [-EnableInternetSecurity ] [-RoutingConfiguration ] [-VpnLinkConnectionMode ] [-TrafficSelectorPolicy ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -301,6 +302,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVpnGateway.md b/src/Network/Network/help/Update-AzVpnGateway.md index 75b237fe2620..f9826654bd1e 100644 --- a/src/Network/Network/help/Update-AzVpnGateway.md +++ b/src/Network/Network/help/Update-AzVpnGateway.md @@ -17,8 +17,8 @@ Updates a scalable VPN gateway. Update-AzVpnGateway -ResourceGroupName -Name [-VpnConnection ] [-VpnGatewayNatRule ] [-VpnGatewayScaleUnit ] [-BgpPeeringAddress ] [-EnableBgpRouteTranslationForNat ] - [-Tag ] [-Asn ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Asn ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnGatewayObject @@ -26,8 +26,8 @@ Update-AzVpnGateway -ResourceGroupName -Name [-VpnConnection < Update-AzVpnGateway -InputObject [-VpnConnection ] [-VpnGatewayNatRule ] [-VpnGatewayScaleUnit ] [-BgpPeeringAddress ] [-EnableBgpRouteTranslationForNat ] - [-Tag ] [-Asn ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Asn ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnGatewayResourceId @@ -35,8 +35,8 @@ Update-AzVpnGateway -InputObject [-VpnConnection [-VpnConnection ] [-VpnGatewayNatRule ] [-VpnGatewayScaleUnit ] [-BgpPeeringAddress ] [-EnableBgpRouteTranslationForNat ] - [-Tag ] [-Asn ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-Asn ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -247,6 +247,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVpnGatewayNatRule.md b/src/Network/Network/help/Update-AzVpnGatewayNatRule.md index ae23ef01621d..b0755bda175f 100644 --- a/src/Network/Network/help/Update-AzVpnGatewayNatRule.md +++ b/src/Network/Network/help/Update-AzVpnGatewayNatRule.md @@ -17,15 +17,16 @@ Updates a NAT rule associated with VpnGateway. Update-AzVpnGatewayNatRule -ResourceGroupName -ParentResourceName -Name [-Type ] [-Mode ] [-InternalMapping ] [-ExternalMapping ] [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnGatewayNatRuleResourceId ``` Update-AzVpnGatewayNatRule -ResourceId [-Type ] [-Mode ] [-InternalMapping ] [-ExternalMapping ] [-InternalPortRange ] [-ExternalPortRange ] - [-IpConfigurationId ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-IpConfigurationId ] [-AsJob] [-DefaultProfile ] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnGatewayNatRuleObject @@ -33,7 +34,8 @@ Update-AzVpnGatewayNatRule -ResourceId [-Type ] [-Mode Update-AzVpnGatewayNatRule -InputObject [-Type ] [-Mode ] [-InternalMapping ] [-ExternalMapping ] [-InternalPortRange ] [-ExternalPortRange ] [-IpConfigurationId ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -240,6 +242,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/Network/help/Update-AzVpnServerConfiguration.md b/src/Network/Network/help/Update-AzVpnServerConfiguration.md index aa2a220261f6..b1e86d68a08a 100644 --- a/src/Network/Network/help/Update-AzVpnServerConfiguration.md +++ b/src/Network/Network/help/Update-AzVpnServerConfiguration.md @@ -21,7 +21,8 @@ Update-AzVpnServerConfiguration -ResourceGroupName -Name [-Vpn [-RadiusServerRootCertificateFilesList ] [-RadiusClientRootCertificateFilesList ] [-AadTenant ] [-AadAudience ] [-AadIssuer ] [-VpnClientIpsecPolicy ] [-ConfigurationPolicyGroup ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnServerConfigurationObject @@ -33,7 +34,8 @@ Update-AzVpnServerConfiguration -InputObject [-VpnPro [-RadiusServerRootCertificateFilesList ] [-RadiusClientRootCertificateFilesList ] [-AadTenant ] [-AadAudience ] [-AadIssuer ] [-VpnClientIpsecPolicy ] [-ConfigurationPolicyGroup ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnServerConfigurationResourceId @@ -45,7 +47,8 @@ Update-AzVpnServerConfiguration -ResourceId [-VpnProtocol ] [-RadiusServerRootCertificateFilesList ] [-RadiusClientRootCertificateFilesList ] [-AadTenant ] [-AadAudience ] [-AadIssuer ] [-VpnClientIpsecPolicy ] [-ConfigurationPolicyGroup ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -208,6 +211,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -RadiusClientRootCertificateFilesList A list of RadiusClientRootCertificate files' paths diff --git a/src/Network/Network/help/Update-AzVpnServerConfigurationPolicyGroup.md b/src/Network/Network/help/Update-AzVpnServerConfigurationPolicyGroup.md index 843a3c78a247..fe95152da107 100644 --- a/src/Network/Network/help/Update-AzVpnServerConfigurationPolicyGroup.md +++ b/src/Network/Network/help/Update-AzVpnServerConfigurationPolicyGroup.md @@ -19,8 +19,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubNameByVpnServerConfigurationResourceId @@ -30,7 +30,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubObjectByVpnServerConfigurationObject @@ -40,8 +41,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-VpnClientAddressPool ] [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVirtualHubObjectByVpnServerConfigurationResourceId @@ -51,7 +52,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationObject @@ -61,7 +63,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVirtualHubResourceIdByVpnServerConfigurationResourceId @@ -71,7 +74,8 @@ New-AzP2sVpnGateway -ResourceGroupName -Name -VpnGatewayScaleU [-CustomDnsServer ] [-RoutingConfiguration ] [-EnableInternetSecurityFlag] [-DisableInternetSecurityFlag] [-EnableRoutingPreferenceInternetFlag] [-P2SConnectionConfiguration ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ## DESCRIPTION @@ -258,6 +262,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource name. diff --git a/src/Network/Network/help/Update-AzVpnSite.md b/src/Network/Network/help/Update-AzVpnSite.md index e45303004891..28cc45633c06 100644 --- a/src/Network/Network/help/Update-AzVpnSite.md +++ b/src/Network/Network/help/Update-AzVpnSite.md @@ -18,7 +18,7 @@ Update-AzVpnSite -ResourceGroupName -Name [-IpAddress [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteNameByVirtualWanName @@ -27,8 +27,8 @@ Update-AzVpnSite -ResourceGroupName -Name -VirtualWanResourceG -VirtualWanName [-IpAddress ] [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteNameByVirtualWanResourceId @@ -37,7 +37,7 @@ Update-AzVpnSite -ResourceGroupName -Name -VirtualWanId ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteNameByVirtualWanObject @@ -46,7 +46,7 @@ Update-AzVpnSite -ResourceGroupName -Name -VirtualWan ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteObjectByVirtualWanName @@ -55,7 +55,8 @@ Update-AzVpnSite -InputObject -VirtualWanResourceGroupName [-IpAddress ] [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnSiteObjectByVirtualWanResourceId @@ -64,7 +65,7 @@ Update-AzVpnSite -InputObject -VirtualWanId [-IpAddress ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteObjectByVirtualWanObject @@ -73,7 +74,7 @@ Update-AzVpnSite -InputObject -VirtualWan [-IpAddress [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteObjectNoVirtualWanUpdate @@ -82,7 +83,7 @@ Update-AzVpnSite -InputObject [-IpAddress ] [-AddressSpace < [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteResourceIdByVirtualWanName @@ -91,7 +92,8 @@ Update-AzVpnSite -ResourceId -VirtualWanResourceGroupName -Vir [-IpAddress ] [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] - [-DefaultProfile ] [-WhatIf] [-Confirm] [] + [-DefaultProfile ] [-ProgressAction ] [-WhatIf] [-Confirm] + [] ``` ### ByVpnSiteResourceIdByVirtualWanResourceId @@ -100,7 +102,7 @@ Update-AzVpnSite -ResourceId -VirtualWanId [-IpAddress ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteResourceIdByVirtualWanObject @@ -109,7 +111,7 @@ Update-AzVpnSite -ResourceId -VirtualWan [-IpAddress ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] [-Tag ] [-AsJob] [-DefaultProfile ] - [-WhatIf] [-Confirm] [] + [-ProgressAction ] [-WhatIf] [-Confirm] [] ``` ### ByVpnSiteResourceIdNoVirtualWanUpdate @@ -117,8 +119,8 @@ Update-AzVpnSite -ResourceId -VirtualWan [-IpAddress [-IpAddress ] [-AddressSpace ] [-DeviceModel ] [-DeviceVendor ] [-LinkSpeedInMbps ] [-BgpAsn ] [-BgpPeeringAddress ] [-BgpPeeringWeight ] [-VpnSiteLink ] [-O365Policy ] - [-Tag ] [-AsJob] [-DefaultProfile ] [-WhatIf] [-Confirm] - [] + [-Tag ] [-AsJob] [-DefaultProfile ] [-ProgressAction ] + [-WhatIf] [-Confirm] [] ``` ## DESCRIPTION @@ -355,6 +357,21 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ProgressAction +{{ Fill ProgressAction Description }} + +```yaml +Type: System.Management.Automation.ActionPreference +Parameter Sets: (All) +Aliases: proga + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -ResourceGroupName The resource group name. diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psd1 b/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psd1 index 9e8a572cd12b..f081ffa25557 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psd1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psd1 @@ -11,7 +11,7 @@ DotNetFrameworkVersion = '4.7.2' RequiredAssemblies = './bin/Az.NetworkSecurityPerimeter.private.dll' FormatsToProcess = './Az.NetworkSecurityPerimeter.format.ps1xml' - FunctionsToExport = 'Get-AzNetworkSecurityPerimeter', 'Get-AzNetworkSecurityPerimeterAccessRule', 'Get-AzNetworkSecurityPerimeterAssociableResourceType', 'Get-AzNetworkSecurityPerimeterAssociation', 'Get-AzNetworkSecurityPerimeterLink', 'Get-AzNetworkSecurityPerimeterLinkReference', 'Get-AzNetworkSecurityPerimeterProfile', 'New-AzNetworkSecurityPerimeter', 'New-AzNetworkSecurityPerimeterAccessRule', 'New-AzNetworkSecurityPerimeterAssociation', 'New-AzNetworkSecurityPerimeterLink', 'New-AzNetworkSecurityPerimeterProfile', 'Remove-AzNetworkSecurityPerimeter', 'Remove-AzNetworkSecurityPerimeterAccessRule', 'Remove-AzNetworkSecurityPerimeterAssociation', 'Remove-AzNetworkSecurityPerimeterLink', 'Remove-AzNetworkSecurityPerimeterLinkReference', 'Remove-AzNetworkSecurityPerimeterProfile', 'Update-AzNetworkSecurityPerimeterAccessRule', 'Update-AzNetworkSecurityPerimeterAssociation', 'Update-AzNetworkSecurityPerimeterLink' + FunctionsToExport = 'Get-AzNetworkSecurityPerimeter', 'Get-AzNetworkSecurityPerimeterAccessRule', 'Get-AzNetworkSecurityPerimeterAssociableResourceType', 'Get-AzNetworkSecurityPerimeterAssociation', 'Get-AzNetworkSecurityPerimeterLink', 'Get-AzNetworkSecurityPerimeterLinkReference', 'Get-AzNetworkSecurityPerimeterProfile', 'Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile', 'Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile', 'New-AzNetworkSecurityPerimeter', 'New-AzNetworkSecurityPerimeterAccessRule', 'New-AzNetworkSecurityPerimeterAssociation', 'New-AzNetworkSecurityPerimeterLink', 'New-AzNetworkSecurityPerimeterProfile', 'Remove-AzNetworkSecurityPerimeter', 'Remove-AzNetworkSecurityPerimeterAccessRule', 'Remove-AzNetworkSecurityPerimeterAssociation', 'Remove-AzNetworkSecurityPerimeterLink', 'Remove-AzNetworkSecurityPerimeterLinkReference', 'Remove-AzNetworkSecurityPerimeterProfile', 'Update-AzNetworkSecurityPerimeter', 'Update-AzNetworkSecurityPerimeterAccessRule', 'Update-AzNetworkSecurityPerimeterAssociation', 'Update-AzNetworkSecurityPerimeterLink' PrivateData = @{ PSData = @{ Tags = 'Azure', 'ResourceManager', 'ARM', 'PSModule', 'NetworkSecurityPerimeter' diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psm1 b/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psm1 index b3c1b6bc6b5c..666a7e7b7289 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psm1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/Az.NetworkSecurityPerimeter.psm1 @@ -47,37 +47,41 @@ # Ask for the shared functionality table $VTable = Register-AzModule - + # Tweaks the pipeline on module load $instance.OnModuleLoad = $VTable.OnModuleLoad # Following two delegates are added for telemetry $instance.GetTelemetryId = $VTable.GetTelemetryId $instance.Telemetry = $VTable.Telemetry - + + # Delegate to sanitize the output object + $instance.SanitizeOutput = $VTable.SanitizerHandler + + # Delegate to get the telemetry info + $instance.GetTelemetryInfo = $VTable.GetTelemetryInfo # Tweaks the pipeline per call $instance.OnNewRequest = $VTable.OnNewRequest - + # Gets shared parameter values $instance.GetParameterValue = $VTable.GetParameterValue - + # Allows shared module to listen to events from this module $instance.EventListener = $VTable.EventListener - + # Gets shared argument completers $instance.ArgumentCompleter = $VTable.ArgumentCompleter - + # The name of the currently selected Azure profile $instance.ProfileName = $VTable.ProfileName - # Load the custom module $customModulePath = Join-Path $PSScriptRoot './custom/Az.NetworkSecurityPerimeter.custom.psm1' if(Test-Path $customModulePath) { $null = Import-Module -Name $customModulePath } - + # Export nothing to clear implicit exports Export-ModuleMember @@ -97,12 +101,12 @@ # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } - + if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } - + if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/README.md b/src/Network/NetworkSecurityPerimeter.Autorest/README.md index 0e99a30c0522..1520711e1d0a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/README.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/README.md @@ -3,9 +3,6 @@ This directory contains the PowerShell module for the NetworkSecurityPerimeter service. --- -## Status -[![Az.NetworkSecurityPerimeter](https://img.shields.io/powershellgallery/v/Az.NetworkSecurityPerimeter.svg?style=flat-square&label=Az.NetworkSecurityPerimeter "Az.NetworkSecurityPerimeter")](https://www.powershellgallery.com/packages/Az.NetworkSecurityPerimeter/) - ## Info - Modifiable: yes - Generated: all @@ -36,8 +33,8 @@ require: - $(this-folder)/../../readme.azure.noprofile.md input-file: # You need to specify your swagger files here. - - https://github.com/kaushal087/azure-rest-api-specs/blob/7de3d5b29bb67401acd1a799cf7c55b1b7b07185/specification/network/resource-manager/Microsoft.Network/preview/2023-07-01-preview/networkSecurityPerimeter.json -# - C:\repo\azure-rest-api-specs/specification/network/resource-manager/Microsoft.Network/preview/2023-07-01-preview/networkSecurityPerimeter.json + - https://github.com/bhupeshbhatt1985/azure-rest-api-specs/blob/fdc2e7b8efa15b521c7af6b041f226d5a090d5e1/specification/network/resource-manager/Microsoft.Network/preview/2023-08-01-preview/networkSecurityPerimeter.json +# - C:\repo\azure-rest-api-specs/specification/network/resource-manager/Microsoft.Network/preview/2023-08-01-preview/networkSecurityPerimeter.json # If the swagger has not been put in the repo, you may uncomment the following line and refer to it locally # - (this-folder)/relative-path-to-your-swagger diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-linkReferences.json b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-linkReferences.json index e577e5ef04a6..12a4a7161a40 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-linkReferences.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-linkReferences.json @@ -1,6 +1,6 @@ { "resourceType": "networkSecurityPerimeters/linkReferences", - "apiVersion": "2023-07-01-preview", + "apiVersion": "2023-08-01-preview", "learnMore": { "url": "https://learn.microsoft.com/powershell/module/az.network" }, diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-links.json b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-links.json index 8a9c2683d741..681985124a6a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-links.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-links.json @@ -1,6 +1,6 @@ { "resourceType": "networkSecurityPerimeters/links", - "apiVersion": "2023-07-01-preview", + "apiVersion": "2023-08-01-preview", "learnMore": { "url": "https://learn.microsoft.com/powershell/module/az.network" }, diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles-accessRules.json b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles-accessRules.json index 78c157e40599..e705aa471ed5 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles-accessRules.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles-accessRules.json @@ -1,6 +1,6 @@ { "resourceType": "networkSecurityPerimeters/profiles/accessRules", - "apiVersion": "2023-07-01-preview", + "apiVersion": "2023-08-01-preview", "learnMore": { "url": "https://learn.microsoft.com/powershell/module/az.network" }, @@ -53,6 +53,54 @@ } ] }, + { + "name": "Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile", + "description": "Reconcile NSP access rules", + "path": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", + "help": { + "learnMore": { + "url": "https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspaccessrulesreconcile" + }, + "parameterSets": [ + { + "parameters": [ + "-AccessRuleName ", + "-NetworkSecurityPerimeterName ", + "-ProfileName ", + "-ResourceGroupName ", + "[-SubscriptionId ]" + ] + } + ] + }, + "examples": [ + { + "description": "Reconcile NSP access rules", + "parameters": [ + { + "name": "-AccessRuleName", + "value": "[Path.accessRuleName]" + }, + { + "name": "-NetworkSecurityPerimeterName", + "value": "[Path.networkSecurityPerimeterName]" + }, + { + "name": "-ProfileName", + "value": "[Path.profileName]" + }, + { + "name": "-ResourceGroupName", + "value": "[Path.resourceGroupName]" + }, + { + "name": "-SubscriptionId", + "value": "[Path.subscriptionId]" + } + ] + } + ] + }, { "name": "Remove-AzNetworkSecurityPerimeterAccessRule", "description": "Deletes an NSP access rule.", diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles.json b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles.json index bb73f51785eb..9debe75e4a38 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-profiles.json @@ -1,6 +1,6 @@ { "resourceType": "networkSecurityPerimeters/profiles", - "apiVersion": "2023-07-01-preview", + "apiVersion": "2023-08-01-preview", "learnMore": { "url": "https://learn.microsoft.com/powershell/module/az.network" }, diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-resourceAssociations.json b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-resourceAssociations.json index ee80bd7be0bd..e0b1ed8a9bdd 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-resourceAssociations.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters-resourceAssociations.json @@ -1,6 +1,6 @@ { "resourceType": "networkSecurityPerimeters/resourceAssociations", - "apiVersion": "2023-07-01-preview", + "apiVersion": "2023-08-01-preview", "learnMore": { "url": "https://learn.microsoft.com/powershell/module/az.network" }, @@ -48,6 +48,49 @@ } ] }, + { + "name": "Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile", + "description": "Reconcile NSP association", + "path": "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", + "help": { + "learnMore": { + "url": "https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspassociationreconcile" + }, + "parameterSets": [ + { + "parameters": [ + "-AssociationName ", + "-NetworkSecurityPerimeterName ", + "-ResourceGroupName ", + "[-SubscriptionId ]" + ] + } + ] + }, + "examples": [ + { + "description": "Reconcile NSP association", + "parameters": [ + { + "name": "-AssociationName", + "value": "[Path.associationName]" + }, + { + "name": "-NetworkSecurityPerimeterName", + "value": "[Path.networkSecurityPerimeterName]" + }, + { + "name": "-ResourceGroupName", + "value": "[Path.resourceGroupName]" + }, + { + "name": "-SubscriptionId", + "value": "[Path.subscriptionId]" + } + ] + } + ] + }, { "name": "Remove-AzNetworkSecurityPerimeterAssociation", "description": "Deletes an NSP association resource.", diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters.json b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters.json index c04d67647179..0379355eb57c 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/UX/Microsoft.Network/networkSecurityPerimeters.json @@ -1,6 +1,6 @@ { "resourceType": "networkSecurityPerimeters", - "apiVersion": "2023-07-01-preview", + "apiVersion": "2023-08-01-preview", "learnMore": { "url": "https://learn.microsoft.com/powershell/module/az.network" }, diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/build-module.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/build-module.ps1 index e463c47545c9..1906eac63e66 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/build-module.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/build-module.ps1 @@ -12,7 +12,7 @@ # Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code # is regenerated. # ---------------------------------------------------------------------------------- -param([switch]$NotIsolated, [switch]$Run, [switch]$Test, [switch]$Docs, [switch]$Pack, [switch]$Code, [switch]$Release, [switch]$Debugger, [switch]$NoDocs, [switch]$UX) +param([switch]$NotIsolated, [switch]$Run, [switch]$Test, [switch]$Docs, [switch]$Pack, [switch]$Code, [switch]$Release, [switch]$Debugger, [switch]$NoDocs, [switch]$UX, [Switch]$DisableAfterBuildTasks) $ErrorActionPreference = 'Stop' if($PSEdition -ne 'Core') { @@ -177,4 +177,14 @@ if (Test-Path (Join-Path $PSScriptRoot 'generate-portal-ux.ps1')) . (Join-Path $PSScriptRoot 'generate-portal-ux.ps1') } +if (-not $DisableAfterBuildTasks){ + $afterBuildTasksPath = Join-Path $PSScriptRoot '' + $afterBuildTasksArgs = ConvertFrom-Json 'true' -AsHashtable + if(Test-Path -Path $afterBuildTasksPath -PathType leaf){ + Write-Host -ForegroundColor Green 'Running after build tasks...' + . $afterBuildTasksPath @afterBuildTasksArgs + } +} + + Write-Host -ForegroundColor Green '-------------Done-------------' diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 index 33c0e210eb11..54e7539d7974 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/custom/Update-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -172,6 +172,12 @@ function Update-AzNetworkSecurityPerimeterAccessRule { # Phone Numbers ${PhoneNumber}, + [Parameter(HelpMessage = "Service Tags")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String[]] + # Service Tags + ${ServiceTag}, + [Parameter(HelpMessage = "Direction")] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [System.String] @@ -196,7 +202,7 @@ function Update-AzNetworkSecurityPerimeterAccessRule { # 1. GET # body params and AsJob - $bodyParams = 'Tag', 'Location', 'AddressPrefix', 'FullyQualifiedDomainName', 'Direction', 'Subscription', 'EmailAddress', 'PhoneNumber', 'AsJob' + $bodyParams = 'Tag', 'Location', 'AddressPrefix', 'FullyQualifiedDomainName', 'Direction', 'Subscription', 'EmailAddress', 'PhoneNumber', 'ServiceTag', 'AsJob' $bodyParamsMap = @{} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md new file mode 100644 index 000000000000..23b9c955ecfd --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md @@ -0,0 +1,15 @@ +### Example 1: Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules +```powershell +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName MyAccessRule -ProfileName profile -ResourceGroupName ResourceGroup-1 -NetworkSecurityPerimeterName nsp3 +``` + +Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules + +### Example 2: Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules by identity (using pipe) +```powershell + $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject $GETObj +``` + +Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules by identity (using pipe) + diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md new file mode 100644 index 000000000000..c4c605d8f368 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md @@ -0,0 +1,15 @@ +### Example 1: Reconcile NSP association +```powershell +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName association3 -NetworkSecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 +``` + +Reconcile NSP association + +### Example 2: Reconcile NSP association by identity (using pipe) +```powershell + $GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject $GETObj +``` + +Reconcile NSP association by identity (using pipe) + diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/examples/Update-AzNetworkSecurityPerimeter.md b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Update-AzNetworkSecurityPerimeter.md new file mode 100644 index 000000000000..337e31cf3309 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/examples/Update-AzNetworkSecurityPerimeter.md @@ -0,0 +1,28 @@ +### Example 1: Updates a NetworkSecurityPerimeter +```powershell + +Update-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + +``` + +```output +Location Name +-------- ---- + nsp3 +``` + +Updates a NetworkSecurityPerimeter + +### Example 2: Updates a NetworkSecurityPerimeter by identity (using pipe) +```powershell + $GETObj = Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + Update-AzNetworkSecurityPerimeter -InputObject $GETObj +``` + +```output +Location Name +-------- ---- + nsp3 +``` + +Updates a NetworkSecurityPerimeter by identity (using pipe) \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeter.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeter.ps1 index 0b7988c19805..28b2ddcb6fe4 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeter.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeter.ps1 @@ -92,7 +92,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='List')] @@ -191,7 +190,13 @@ begin { List1 = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeter_List1'; } if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAccessRule.ps1 index 13b152e15817..32876851f3a1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -130,21 +130,18 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='GetViaIdentityProfile', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ${ProfileInputObject}, [Parameter(ParameterSetName='List')] @@ -242,7 +239,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterAccessRule_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociableResourceType.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociableResourceType.ps1 index cf03cf87e0ea..d2aebae258e1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociableResourceType.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociableResourceType.ps1 @@ -125,7 +125,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterAssociableResourceType_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociation.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociation.ps1 index 164e684f04fb..ea0a28f383dd 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociation.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterAssociation.ps1 @@ -108,14 +108,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -212,7 +210,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterAssociation_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLink.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLink.ps1 index 4b204ccc1f9a..532df59045e8 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLink.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLink.ps1 @@ -99,14 +99,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -203,7 +201,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterLink_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLinkReference.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLinkReference.ps1 index b6345a44cebe..fe3868eca184 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLinkReference.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterLinkReference.ps1 @@ -99,14 +99,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -203,7 +201,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterLinkReference_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterProfile.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterProfile.ps1 index 835b96f5434e..1269c994ea67 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterProfile.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Get-AzNetworkSecurityPerimeterProfile.ps1 @@ -108,14 +108,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -212,7 +210,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterProfile_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.ps1 new file mode 100644 index 000000000000..286208a0ed06 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.ps1 @@ -0,0 +1,319 @@ + +# ---------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# http://www.apache.org/licenses/LICENSE-2.0 +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code +# is regenerated. +# ---------------------------------------------------------------------------------- + +<# +.Synopsis +Reconcile NSP access rules +.Description +Reconcile NSP access rules +.Example +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName MyAccessRule -ProfileName profile -ResourceGroupName ResourceGroup-1 -NetworkSecurityPerimeterName nsp3 +.Example + $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject $GETObj + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +NETWORKSECURITYPERIMETERINPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +PROFILEINPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. +.Link +https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspaccessrulesreconcile +#> +function Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny])] +[CmdletBinding(DefaultParameterSetName='PostExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityProfile', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityProfileExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the NSP access rule. + ${AccessRuleName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the network security perimeter. + ${NetworkSecurityPerimeterName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the NSP profile. + ${ProfileName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the resource group. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Post')] + [Parameter(ParameterSetName='PostExpanded')] + [Parameter(ParameterSetName='PostViaJsonFilePath')] + [Parameter(ParameterSetName='PostViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The subscription credentials which uniquely identify the Microsoft Azure subscription. + # The subscription ID forms part of the URI for every service call. + ${SubscriptionId}, + + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${NetworkSecurityPerimeterInputObject}, + + [Parameter(ParameterSetName='PostViaIdentityProfile', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityProfileExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${ProfileInputObject}, + + [Parameter(ParameterSetName='Post', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityProfile', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny] + # Anything + ${Parameter}, + + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Path of Json file supplied to the Post operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Json string supplied to the Post operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Post = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_Post'; + PostExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded'; + PostViaIdentity = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity'; + PostViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded'; + PostViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter'; + PostViaIdentityNetworkSecurityPerimeterExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded'; + PostViaIdentityProfile = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile'; + PostViaIdentityProfileExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded'; + PostViaJsonFilePath = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath'; + PostViaJsonString = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString'; + } + if (('Post', 'PostExpanded', 'PostViaJsonFilePath', 'PostViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.ps1 new file mode 100644 index 000000000000..6905cf28820c --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.ps1 @@ -0,0 +1,284 @@ + +# ---------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# http://www.apache.org/licenses/LICENSE-2.0 +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code +# is regenerated. +# ---------------------------------------------------------------------------------- + +<# +.Synopsis +Reconcile NSP association +.Description +Reconcile NSP association +.Example +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName association3 -NetworkSecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 +.Example + $GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject $GETObj + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +NETWORKSECURITYPERIMETERINPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. +.Link +https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspassociationreconcile +#> +function Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny])] +[CmdletBinding(DefaultParameterSetName='PostExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the NSP association. + ${AssociationName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the network security perimeter. + ${NetworkSecurityPerimeterName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the resource group. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Post')] + [Parameter(ParameterSetName='PostExpanded')] + [Parameter(ParameterSetName='PostViaJsonFilePath')] + [Parameter(ParameterSetName='PostViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The subscription credentials which uniquely identify the Microsoft Azure subscription. + # The subscription ID forms part of the URI for every service call. + ${SubscriptionId}, + + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${NetworkSecurityPerimeterInputObject}, + + [Parameter(ParameterSetName='Post', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny] + # Anything + ${Parameter}, + + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Path of Json file supplied to the Post operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Json string supplied to the Post operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Post = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_Post'; + PostExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded'; + PostViaIdentity = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity'; + PostViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded'; + PostViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter'; + PostViaIdentityNetworkSecurityPerimeterExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded'; + PostViaJsonFilePath = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath'; + PostViaJsonString = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString'; + } + if (('Post', 'PostExpanded', 'PostViaJsonFilePath', 'PostViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeter.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeter.ps1 index 47250c929e88..76bd8821f42d 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeter.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeter.ps1 @@ -97,14 +97,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter] # The Network Security Perimeter resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -224,7 +222,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeter_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAccessRule.ps1 index 6e05018d4c55..8bab6d04dfab 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -74,6 +74,7 @@ PARAMETER : The NSP access rule resource [EmailAddress >]: Outbound rules email address format. [FullyQualifiedDomainName >]: Outbound rules fully qualified domain name format. [PhoneNumber >]: Outbound rules phone number format. + [ServiceTag >]: Inbound rules service tag names. [Subscription >]: List of subscription ids [Id ]: Subscription id in the ARM id format. @@ -158,7 +159,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -166,7 +166,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='CreateViaIdentityProfile', Mandatory, ValueFromPipeline)] @@ -174,7 +173,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ${ProfileInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -183,7 +181,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule] # The NSP access rule resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -255,6 +252,16 @@ param( # Outbound rules phone number format. ${PhoneNumber}, + [Parameter(ParameterSetName='CreateExpanded')] + [Parameter(ParameterSetName='CreateViaIdentityExpanded')] + [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeterExpanded')] + [Parameter(ParameterSetName='CreateViaIdentityProfileExpanded')] + [AllowEmptyCollection()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String[]] + # Inbound rules service tag names. + ${ServiceTag}, + [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeterExpanded')] @@ -263,7 +270,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[]] # List of subscription ids - # To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ${Subscription}, [Parameter(ParameterSetName='CreateExpanded')] @@ -374,7 +380,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterAccessRule_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAssociation.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAssociation.ps1 index 12600d367834..b022d6ae681b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAssociation.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterAssociation.ps1 @@ -122,7 +122,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -130,7 +129,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -138,7 +136,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation] # The NSP resource association resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -288,7 +285,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterAssociation_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterLink.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterLink.ps1 index c6ed08dc0992..54c61e138af2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterLink.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterLink.ps1 @@ -64,8 +64,8 @@ NETWORKSECURITYPERIMETERINPUTOBJECT : Identit PARAMETER : The network security perimeter link resource [AutoApprovedRemotePerimeterResourceId ]: Perimeter ARM Id for the remote NSP with which the link gets created in Auto-approval mode. It should be used when the NSP admin have Microsoft.Network/networkSecurityPerimeters/linkPerimeter/action permission on the remote NSP resource. [Description ]: A message passed to the owner of the remote NSP link resource with this connection request. In case of Auto-approved flow, it is default to 'Auto Approved'. Restricted to 140 chars. - [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*']. - [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*']. + [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. + [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. .Link https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterlink #> @@ -119,7 +119,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -127,7 +126,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -135,7 +133,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink] # The network security perimeter link resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -165,7 +162,6 @@ param( [System.String[]] # Local Inbound profile names to which Inbound is allowed. # Use ['*'] to allow inbound to all profiles. - # It's default value is ['*']. ${LocalInboundProfile}, [Parameter(ParameterSetName='CreateExpanded')] @@ -177,7 +173,6 @@ param( # Remote Inbound profile names to which Inbound is allowed. # Use ['*'] to allow inbound to all profiles. # This property can only be updated in auto-approval mode. - # It's default value is ['*']. ${RemoteInboundProfile}, [Parameter(ParameterSetName='CreateViaJsonFilePath', Mandatory)] @@ -276,7 +271,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterLink_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterProfile.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterProfile.ps1 index b3d61037c438..611273d6f60c 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterProfile.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/New-AzNetworkSecurityPerimeterProfile.ps1 @@ -121,7 +121,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -129,7 +128,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -137,7 +135,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile] # The network security perimeter profile resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -262,7 +259,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterProfile_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/ProxyCmdletDefinitions.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/ProxyCmdletDefinitions.ps1 index 77b41d47acc0..10cee7d26378 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/ProxyCmdletDefinitions.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/ProxyCmdletDefinitions.ps1 @@ -130,21 +130,18 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='GetViaIdentityProfile', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ${ProfileInputObject}, [Parameter(ParameterSetName='List')] @@ -242,7 +239,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterAccessRule_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -405,7 +408,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterAssociableResourceType_List'; } if (('List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -551,14 +560,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -655,7 +662,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterAssociation_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -792,14 +805,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -896,7 +907,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterLinkReference_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1033,14 +1050,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -1137,7 +1152,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterLink_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1283,14 +1304,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='GetViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='List')] @@ -1387,7 +1406,13 @@ begin { List = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeterProfile_List'; } if (('Get', 'List') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1517,7 +1542,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='List')] @@ -1616,7 +1640,586 @@ begin { List1 = 'Az.NetworkSecurityPerimeter.private\Get-AzNetworkSecurityPerimeter_List1'; } if (('Get', 'List', 'List1') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} + +<# +.Synopsis +Reconcile NSP access rules +.Description +Reconcile NSP access rules +.Example +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName MyAccessRule -ProfileName profile -ResourceGroupName ResourceGroup-1 -NetworkSecurityPerimeterName nsp3 +.Example + $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject $GETObj + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +NETWORKSECURITYPERIMETERINPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +PROFILEINPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. +.Link +https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspaccessrulesreconcile +#> +function Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny])] +[CmdletBinding(DefaultParameterSetName='PostExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityProfile', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityProfileExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the NSP access rule. + ${AccessRuleName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the network security perimeter. + ${NetworkSecurityPerimeterName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the NSP profile. + ${ProfileName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the resource group. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Post')] + [Parameter(ParameterSetName='PostExpanded')] + [Parameter(ParameterSetName='PostViaJsonFilePath')] + [Parameter(ParameterSetName='PostViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The subscription credentials which uniquely identify the Microsoft Azure subscription. + # The subscription ID forms part of the URI for every service call. + ${SubscriptionId}, + + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${NetworkSecurityPerimeterInputObject}, + + [Parameter(ParameterSetName='PostViaIdentityProfile', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityProfileExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${ProfileInputObject}, + + [Parameter(ParameterSetName='Post', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityProfile', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny] + # Anything + ${Parameter}, + + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Path of Json file supplied to the Post operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Json string supplied to the Post operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Post = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_Post'; + PostExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded'; + PostViaIdentity = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity'; + PostViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded'; + PostViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter'; + PostViaIdentityNetworkSecurityPerimeterExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded'; + PostViaIdentityProfile = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile'; + PostViaIdentityProfileExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded'; + PostViaJsonFilePath = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath'; + PostViaJsonString = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString'; + } + if (('Post', 'PostExpanded', 'PostViaJsonFilePath', 'PostViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} + +<# +.Synopsis +Reconcile NSP association +.Description +Reconcile NSP association +.Example +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName association3 -NetworkSecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 +.Example + $GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject $GETObj + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +NETWORKSECURITYPERIMETERINPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. +.Link +https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspassociationreconcile +#> +function Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny])] +[CmdletBinding(DefaultParameterSetName='PostExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the NSP association. + ${AssociationName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the network security perimeter. + ${NetworkSecurityPerimeterName}, + + [Parameter(ParameterSetName='Post', Mandatory)] + [Parameter(ParameterSetName='PostExpanded', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the resource group. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Post')] + [Parameter(ParameterSetName='PostExpanded')] + [Parameter(ParameterSetName='PostViaJsonFilePath')] + [Parameter(ParameterSetName='PostViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The subscription credentials which uniquely identify the Microsoft Azure subscription. + # The subscription ID forms part of the URI for every service call. + ${SubscriptionId}, + + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeterExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${NetworkSecurityPerimeterInputObject}, + + [Parameter(ParameterSetName='Post', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PostViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny] + # Anything + ${Parameter}, + + [Parameter(ParameterSetName='PostViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Path of Json file supplied to the Post operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='PostViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Json string supplied to the Post operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Post = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_Post'; + PostExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded'; + PostViaIdentity = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity'; + PostViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded'; + PostViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter'; + PostViaIdentityNetworkSecurityPerimeterExpanded = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded'; + PostViaJsonFilePath = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath'; + PostViaJsonString = 'Az.NetworkSecurityPerimeter.private\Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString'; + } + if (('Post', 'PostExpanded', 'PostViaJsonFilePath', 'PostViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -1728,6 +2331,7 @@ PARAMETER : The NSP access rule resource [EmailAddress >]: Outbound rules email address format. [FullyQualifiedDomainName >]: Outbound rules fully qualified domain name format. [PhoneNumber >]: Outbound rules phone number format. + [ServiceTag >]: Inbound rules service tag names. [Subscription >]: List of subscription ids [Id ]: Subscription id in the ARM id format. @@ -1812,7 +2416,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -1820,7 +2423,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='CreateViaIdentityProfile', Mandatory, ValueFromPipeline)] @@ -1828,7 +2430,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ${ProfileInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -1837,7 +2438,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule] # The NSP access rule resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -1909,6 +2509,16 @@ param( # Outbound rules phone number format. ${PhoneNumber}, + [Parameter(ParameterSetName='CreateExpanded')] + [Parameter(ParameterSetName='CreateViaIdentityExpanded')] + [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeterExpanded')] + [Parameter(ParameterSetName='CreateViaIdentityProfileExpanded')] + [AllowEmptyCollection()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String[]] + # Inbound rules service tag names. + ${ServiceTag}, + [Parameter(ParameterSetName='CreateExpanded')] [Parameter(ParameterSetName='CreateViaIdentityExpanded')] [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeterExpanded')] @@ -1917,7 +2527,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[]] # List of subscription ids - # To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ${Subscription}, [Parameter(ParameterSetName='CreateExpanded')] @@ -2028,7 +2637,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterAccessRule_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2188,7 +2803,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -2196,7 +2810,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -2204,7 +2817,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation] # The NSP resource association resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -2354,7 +2966,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterAssociation_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2456,8 +3074,8 @@ NETWORKSECURITYPERIMETERINPUTOBJECT : Identit PARAMETER : The network security perimeter link resource [AutoApprovedRemotePerimeterResourceId ]: Perimeter ARM Id for the remote NSP with which the link gets created in Auto-approval mode. It should be used when the NSP admin have Microsoft.Network/networkSecurityPerimeters/linkPerimeter/action permission on the remote NSP resource. [Description ]: A message passed to the owner of the remote NSP link resource with this connection request. In case of Auto-approved flow, it is default to 'Auto Approved'. Restricted to 140 chars. - [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*']. - [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*']. + [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. + [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. .Link https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterlink #> @@ -2511,7 +3129,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -2519,7 +3136,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -2527,7 +3143,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink] # The network security perimeter link resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -2557,7 +3172,6 @@ param( [System.String[]] # Local Inbound profile names to which Inbound is allowed. # Use ['*'] to allow inbound to all profiles. - # It's default value is ['*']. ${LocalInboundProfile}, [Parameter(ParameterSetName='CreateExpanded')] @@ -2569,7 +3183,6 @@ param( # Remote Inbound profile names to which Inbound is allowed. # Use ['*'] to allow inbound to all profiles. # This property can only be updated in auto-approval mode. - # It's default value is ['*']. ${RemoteInboundProfile}, [Parameter(ParameterSetName='CreateViaJsonFilePath', Mandatory)] @@ -2668,7 +3281,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterLink_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -2827,7 +3446,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='CreateViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] @@ -2835,7 +3453,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] @@ -2843,7 +3460,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile] # The network security perimeter profile resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -2968,7 +3584,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeterProfile_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3103,14 +3725,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='Create', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter] # The Network Security Perimeter resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter(ParameterSetName='CreateExpanded')] @@ -3230,7 +3850,13 @@ begin { CreateViaJsonString = 'Az.NetworkSecurityPerimeter.private\New-AzNetworkSecurityPerimeter_CreateViaJsonString'; } if (('Create', 'CreateExpanded', 'CreateViaJsonFilePath', 'CreateViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3390,21 +4016,18 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='DeleteViaIdentityProfile', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ${ProfileInputObject}, [Parameter()] @@ -3494,7 +4117,13 @@ begin { DeleteViaIdentityProfile = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3633,14 +4262,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -3741,7 +4368,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -3876,14 +4509,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -3984,7 +4615,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4119,14 +4756,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -4227,7 +4862,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4366,14 +5007,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -4462,7 +5101,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4581,7 +5226,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] @@ -4669,7 +5313,264 @@ begin { DeleteViaIdentity = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeter_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} + +<# +.Synopsis +Patch Tags for a Network Security Perimeter. +.Description +Patch Tags for a Network Security Perimeter. +.Example + +Update-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + +.Example + $GETObj = Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + Update-AzNetworkSecurityPerimeter -InputObject $GETObj + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +PARAMETER : Update tags request. + [Tag ]: List of tags for Network Security Perimeter + [(Any) ]: This indicates any property can be added to this object. +.Link +https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeter +#> +function Update-AzNetworkSecurityPerimeter { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter])] +[CmdletBinding(DefaultParameterSetName='PatchExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='Patch', Mandatory)] + [Parameter(ParameterSetName='PatchExpanded', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonString', Mandatory)] + [Alias('NetworkSecurityPerimeterName', 'SecurityPerimeterName', 'NSPName')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the network security perimeter. + ${Name}, + + [Parameter(ParameterSetName='Patch', Mandatory)] + [Parameter(ParameterSetName='PatchExpanded', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the resource group. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Patch')] + [Parameter(ParameterSetName='PatchExpanded')] + [Parameter(ParameterSetName='PatchViaJsonFilePath')] + [Parameter(ParameterSetName='PatchViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The subscription credentials which uniquely identify the Microsoft Azure subscription. + # The subscription ID forms part of the URI for every service call. + ${SubscriptionId}, + + [Parameter(ParameterSetName='PatchViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PatchViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='Patch', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PatchViaIdentity', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest] + # Update tags request. + ${Parameter}, + + [Parameter(ParameterSetName='PatchExpanded')] + [Parameter(ParameterSetName='PatchViaIdentityExpanded')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequestTags]))] + [System.Collections.Hashtable] + # List of tags for Network Security Perimeter + ${Tag}, + + [Parameter(ParameterSetName='PatchViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Path of Json file supplied to the Patch operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='PatchViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Json string supplied to the Patch operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Patch = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_Patch'; + PatchExpanded = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchExpanded'; + PatchViaIdentity = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaIdentity'; + PatchViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaIdentityExpanded'; + PatchViaJsonFilePath = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaJsonFilePath'; + PatchViaJsonString = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaJsonString'; + } + if (('Patch', 'PatchExpanded', 'PatchViaJsonFilePath', 'PatchViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -4745,7 +5646,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT : Identity parameter. +INPUTOBJECT : Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. [AccessRuleName ]: The name of the NSP access rule. [AssociationName ]: The name of the NSP association. [Id ]: Resource identity path @@ -4844,6 +5745,12 @@ param( # Phone Numbers ${PhoneNumber}, + [Parameter()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String[]] + # Service Tags + ${ServiceTag}, + [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [System.String] @@ -4854,7 +5761,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[]] # Subscription ids - # To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ${Subscription}, [Parameter()] @@ -4947,7 +5853,13 @@ begin { UpdateViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.custom\Update-AzNetworkSecurityPerimeterAccessRule'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -5023,7 +5935,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT : Identity parameter. +INPUTOBJECT : Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. [AccessRuleName ]: The name of the NSP access rule. [AssociationName ]: The name of the NSP association. [Id ]: Resource identity path @@ -5197,7 +6109,13 @@ begin { UpdateViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.custom\Update-AzNetworkSecurityPerimeterAssociation'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) @@ -5271,7 +6189,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT : Identity parameter. +INPUTOBJECT : Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. [AccessRuleName ]: The name of the NSP access rule. [AssociationName ]: The name of the NSP association. [Id ]: Resource identity path @@ -5445,7 +6363,13 @@ begin { UpdateViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.custom\Update-AzNetworkSecurityPerimeterLink'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeter.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeter.ps1 index b4c8fbf1fe45..2a86bfb474ce 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeter.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeter.ps1 @@ -81,7 +81,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter()] @@ -169,7 +168,13 @@ begin { DeleteViaIdentity = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeter_DeleteViaIdentity'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAccessRule.ps1 index cb35dd3eb623..22f50011f90b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -122,21 +122,18 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter(ParameterSetName='DeleteViaIdentityProfile', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ${ProfileInputObject}, [Parameter()] @@ -226,7 +223,13 @@ begin { DeleteViaIdentityProfile = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAssociation.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAssociation.ps1 index 260ac56bddbe..27370ed2ba5e 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAssociation.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterAssociation.ps1 @@ -101,14 +101,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -209,7 +207,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLink.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLink.ps1 index 6b471c57bbe5..18fcdbfc4300 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLink.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLink.ps1 @@ -97,14 +97,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -205,7 +203,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLinkReference.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLinkReference.ps1 index 5e80930cac57..1975d5b232d9 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLinkReference.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterLinkReference.ps1 @@ -97,14 +97,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -205,7 +203,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterProfile.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterProfile.ps1 index 569872313501..344ec7412801 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterProfile.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Remove-AzNetworkSecurityPerimeterProfile.ps1 @@ -101,14 +101,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(ParameterSetName='DeleteViaIdentityNetworkSecurityPerimeter', Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ${NetworkSecurityPerimeterInputObject}, [Parameter()] @@ -197,7 +195,13 @@ begin { DeleteViaIdentityNetworkSecurityPerimeter = 'Az.NetworkSecurityPerimeter.private\Remove-AzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter'; } if (('Delete') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeter.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeter.ps1 new file mode 100644 index 000000000000..35cb6cfee413 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeter.ps1 @@ -0,0 +1,266 @@ + +# ---------------------------------------------------------------------------------- +# Copyright (c) Microsoft Corporation. All rights reserved. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# http://www.apache.org/licenses/LICENSE-2.0 +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. +# Code generated by Microsoft (R) AutoRest Code Generator.Changes may cause incorrect behavior and will be lost if the code +# is regenerated. +# ---------------------------------------------------------------------------------- + +<# +.Synopsis +Patch Tags for a Network Security Perimeter. +.Description +Patch Tags for a Network Security Perimeter. +.Example + +Update-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + +.Example + $GETObj = Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + Update-AzNetworkSecurityPerimeter -InputObject $GETObj + +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +.Inputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest +.Outputs +Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter +.Notes +COMPLEX PARAMETER PROPERTIES + +To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. + +INPUTOBJECT : Identity Parameter + [AccessRuleName ]: The name of the NSP access rule. + [AssociationName ]: The name of the NSP association. + [Id ]: Resource identity path + [LinkName ]: The name of the NSP link. + [LinkReferenceName ]: The name of the NSP linkReference. + [Location ]: The location of network security perimeter. + [NetworkSecurityPerimeterName ]: The name of the network security perimeter. + [ProfileName ]: The name of the NSP profile. + [ResourceGroupName ]: The name of the resource group. + [SubscriptionId ]: The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call. + +PARAMETER : Update tags request. + [Tag ]: List of tags for Network Security Perimeter + [(Any) ]: This indicates any property can be added to this object. +.Link +https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeter +#> +function Update-AzNetworkSecurityPerimeter { +[OutputType([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter])] +[CmdletBinding(DefaultParameterSetName='PatchExpanded', PositionalBinding=$false, SupportsShouldProcess, ConfirmImpact='Medium')] +param( + [Parameter(ParameterSetName='Patch', Mandatory)] + [Parameter(ParameterSetName='PatchExpanded', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonString', Mandatory)] + [Alias('NetworkSecurityPerimeterName', 'SecurityPerimeterName', 'NSPName')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the network security perimeter. + ${Name}, + + [Parameter(ParameterSetName='Patch', Mandatory)] + [Parameter(ParameterSetName='PatchExpanded', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonFilePath', Mandatory)] + [Parameter(ParameterSetName='PatchViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [System.String] + # The name of the resource group. + ${ResourceGroupName}, + + [Parameter(ParameterSetName='Patch')] + [Parameter(ParameterSetName='PatchExpanded')] + [Parameter(ParameterSetName='PatchViaJsonFilePath')] + [Parameter(ParameterSetName='PatchViaJsonString')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo(Script='(Get-AzContext).Subscription.Id')] + [System.String] + # The subscription credentials which uniquely identify the Microsoft Azure subscription. + # The subscription ID forms part of the URI for every service call. + ${SubscriptionId}, + + [Parameter(ParameterSetName='PatchViaIdentity', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PatchViaIdentityExpanded', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] + # Identity Parameter + ${InputObject}, + + [Parameter(ParameterSetName='Patch', Mandatory, ValueFromPipeline)] + [Parameter(ParameterSetName='PatchViaIdentity', Mandatory, ValueFromPipeline)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest] + # Update tags request. + ${Parameter}, + + [Parameter(ParameterSetName='PatchExpanded')] + [Parameter(ParameterSetName='PatchViaIdentityExpanded')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info(PossibleTypes=([Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequestTags]))] + [System.Collections.Hashtable] + # List of tags for Network Security Perimeter + ${Tag}, + + [Parameter(ParameterSetName='PatchViaJsonFilePath', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Path of Json file supplied to the Patch operation + ${JsonFilePath}, + + [Parameter(ParameterSetName='PatchViaJsonString', Mandatory)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String] + # Json string supplied to the Patch operation + ${JsonString}, + + [Parameter()] + [Alias('AzureRMContext', 'AzureCredential')] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Azure')] + [System.Management.Automation.PSObject] + # The DefaultProfile parameter is not functional. + # Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + ${DefaultProfile}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Wait for .NET debugger to attach + ${Break}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be appended to the front of the pipeline + ${HttpPipelineAppend}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[]] + # SendAsync Pipeline Steps to be prepended to the front of the pipeline + ${HttpPipelinePrepend}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Uri] + # The URI for the proxy server to use + ${Proxy}, + + [Parameter(DontShow)] + [ValidateNotNull()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.PSCredential] + # Credentials for a proxy server to use for the remote call + ${ProxyCredential}, + + [Parameter(DontShow)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Runtime')] + [System.Management.Automation.SwitchParameter] + # Use the default credentials for the proxy + ${ProxyUseDefaultCredentials} +) + +begin { + try { + $outBuffer = $null + if ($PSBoundParameters.TryGetValue('OutBuffer', [ref]$outBuffer)) { + $PSBoundParameters['OutBuffer'] = 1 + } + $parameterSet = $PSCmdlet.ParameterSetName + + if ($null -eq [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion) { + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PowerShellVersion = $PSVersionTable.PSVersion.ToString() + } + $preTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + if ($preTelemetryId -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId =(New-Guid).ToString() + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Create', $MyInvocation, $parameterSet, $PSCmdlet) + } else { + $internalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + if ($internalCalledCmdlets -eq '') { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $MyInvocation.MyCommand.Name + } else { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets += ',' + $MyInvocation.MyCommand.Name + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = 'internal' + } + + $mapping = @{ + Patch = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_Patch'; + PatchExpanded = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchExpanded'; + PatchViaIdentity = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaIdentity'; + PatchViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaIdentityExpanded'; + PatchViaJsonFilePath = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaJsonFilePath'; + PatchViaJsonString = 'Az.NetworkSecurityPerimeter.private\Update-AzNetworkSecurityPerimeter_PatchViaJsonString'; + } + if (('Patch', 'PatchExpanded', 'PatchViaJsonFilePath', 'PatchViaJsonString') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } + } + $cmdInfo = Get-Command -Name $mapping[$parameterSet] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + if ($null -ne $MyInvocation.MyCommand -and [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets -notcontains $MyInvocation.MyCommand.Name -and [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ContainsPreviewAttribute($cmdInfo, $MyInvocation)){ + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessPreviewMessageAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Utilities.Common.AzurePSCmdlet]::PromptedPreviewMessageCmdlets.Enqueue($MyInvocation.MyCommand.Name) + } + $wrappedCmd = $ExecutionContext.InvokeCommand.GetCommand(($mapping[$parameterSet]), [System.Management.Automation.CommandTypes]::Cmdlet) + $scriptCmd = {& $wrappedCmd @PSBoundParameters} + $steppablePipeline = $scriptCmd.GetSteppablePipeline($MyInvocation.CommandOrigin) + $steppablePipeline.Begin($PSCmdlet) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} + +process { + try { + $steppablePipeline.Process($_) + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } + + finally { + $backupTelemetryId = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId + $backupInternalCalledCmdlets = [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + +} +end { + try { + $steppablePipeline.End() + + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $backupTelemetryId + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::InternalCalledCmdlets = $backupInternalCalledCmdlets + if ($preTelemetryId -eq '') { + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.module]::Instance.Telemetry.Invoke('Send', $MyInvocation, $parameterSet, $PSCmdlet) + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + } + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::TelemetryId = $preTelemetryId + + } catch { + [Microsoft.WindowsAzure.Commands.Common.MetricHelper]::ClearTelemetryContext() + throw + } +} +} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAccessRule.ps1 index 2f773b5c2f08..6b75e372ff78 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -38,7 +38,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT : Identity parameter. +INPUTOBJECT : Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. [AccessRuleName ]: The name of the NSP access rule. [AssociationName ]: The name of the NSP association. [Id ]: Resource identity path @@ -137,6 +137,12 @@ param( # Phone Numbers ${PhoneNumber}, + [Parameter()] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] + [System.String[]] + # Service Tags + ${ServiceTag}, + [Parameter()] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [System.String] @@ -147,7 +153,6 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[]] # Subscription ids - # To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ${Subscription}, [Parameter()] @@ -240,7 +245,13 @@ begin { UpdateViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.custom\Update-AzNetworkSecurityPerimeterAccessRule'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAssociation.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAssociation.ps1 index fa0ee74d1da2..86b661bf1bb0 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAssociation.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterAssociation.ps1 @@ -38,7 +38,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT : Identity parameter. +INPUTOBJECT : Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. [AccessRuleName ]: The name of the NSP access rule. [AssociationName ]: The name of the NSP association. [Id ]: Resource identity path @@ -212,7 +212,13 @@ begin { UpdateViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.custom\Update-AzNetworkSecurityPerimeterAssociation'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterLink.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterLink.ps1 index c264243d27f3..5fc185b02abc 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterLink.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/exports/Update-AzNetworkSecurityPerimeterLink.ps1 @@ -36,7 +36,7 @@ COMPLEX PARAMETER PROPERTIES To create the parameters described below, construct a hash table containing the appropriate properties. For information on hash tables, run Get-Help about_Hash_Tables. -INPUTOBJECT : Identity parameter. +INPUTOBJECT : Identity parameter. To construct, see NOTES section for INPUTOBJECT properties and create a hash table. [AccessRuleName ]: The name of the NSP access rule. [AssociationName ]: The name of the NSP association. [Id ]: Resource identity path @@ -210,7 +210,13 @@ begin { UpdateViaIdentityExpanded = 'Az.NetworkSecurityPerimeter.custom\Update-AzNetworkSecurityPerimeterLink'; } if (('UpdateExpanded') -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('SubscriptionId') ) { - $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + $testPlayback = $false + $PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object { if ($_) { $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) } } + if ($testPlayback) { + $PSBoundParameters['SubscriptionId'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1') + } else { + $PSBoundParameters['SubscriptionId'] = (Get-AzContext).Subscription.Id + } } $cmdInfo = Get-Command -Name $mapping[$parameterSet] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.MessageAttributeHelper]::ProcessCustomAttributesAtRuntime($cmdInfo, $MyInvocation, $parameterSet, $PSCmdlet) diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/Module.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/Module.cs index b2defbeb5be1..186895e65aea 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/Module.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/Module.cs @@ -17,6 +17,8 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter using SignalDelegate = global::System.Func, global::System.Threading.Tasks.Task>; using EventListenerDelegate = global::System.Func, global::System.Func, global::System.Threading.Tasks.Task>, global::System.Management.Automation.InvocationInfo, string, string, string, global::System.Exception, global::System.Threading.Tasks.Task>; using NextDelegate = global::System.Func, global::System.Threading.Tasks.Task>, global::System.Threading.Tasks.Task>; + using SanitizerDelegate = global::System.Action; + using GetTelemetryInfoDelegate = global::System.Func>; /// A class that contains the module-common code and data. public partial class Module @@ -26,12 +28,20 @@ public partial class Module public global::System.Net.Http.HttpClientHandler _handler = new global::System.Net.Http.HttpClientHandler(); + private static bool _init = false; + + private static readonly global::System.Object _initLock = new global::System.Object(); + + private static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module _instance; + /// the ISendAsync pipeline instance private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline _pipeline; /// the ISendAsync pipeline instance (when proxy is enabled) private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline _pipelineWithProxy; + private static readonly global::System.Object _singletonLock = new global::System.Object(); + public bool _useProxy = false; public global::System.Net.WebProxy _webProxy = new global::System.Net.WebProxy(); @@ -51,11 +61,11 @@ public partial class Module /// The delegate to get the telemetry Id. public GetTelemetryIdDelegate GetTelemetryId { get; set; } - /// Backing field for property. - private static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module _instance; + /// The delegate to get the telemetry info. + public GetTelemetryInfoDelegate GetTelemetryInfo { get; set; } /// the singleton of this module class - public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module Instance => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module._instance?? (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module._instance = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module()); + public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module Instance { get { if (_instance == null) { lock (_singletonLock) { if (_instance == null) { _instance = new Module(); }}} return _instance; } } /// The Name of this module public string Name => @"Az.NetworkSecurityPerimeter"; @@ -72,6 +82,9 @@ public partial class Module /// The ResourceID for this module (azure arm). public string ResourceId => @"Az.NetworkSecurityPerimeter"; + /// The delegate to call in WriteObject to sanitize the output object. + public SanitizerDelegate SanitizeOutput { get; set; } + /// The delegate for creating a telemetry. public TelemetryDelegate Telemetry { get; set; } @@ -117,9 +130,17 @@ public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpP /// Initialization steps performed after the module is loaded. public void Init() { - OnModuleLoad?.Invoke( ResourceId, Name ,(step)=> { _pipeline.Prepend(step); } , (step)=> { _pipeline.Append(step); } ); - OnModuleLoad?.Invoke( ResourceId, Name ,(step)=> { _pipelineWithProxy.Prepend(step); } , (step)=> { _pipelineWithProxy.Append(step); } ); - CustomInit(); + if (_init == false) + { + lock (_initLock) { + if (_init == false) { + OnModuleLoad?.Invoke( ResourceId, Name ,(step)=> { _pipeline.Prepend(step); } , (step)=> { _pipeline.Append(step); } ); + OnModuleLoad?.Invoke( ResourceId, Name ,(step)=> { _pipelineWithProxy.Prepend(step); } , (step)=> { _pipelineWithProxy.Append(step); } ); + CustomInit(); + _init = true; + } + } + } } /// Creates the module instance. diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.PowerShell.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.PowerShell.cs new file mode 100644 index 000000000000..95353055c402 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.PowerShell.cs @@ -0,0 +1,156 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models +{ + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + + /// Anything + [System.ComponentModel.TypeConverter(typeof(AnyTypeConverter))] + public partial class Any + { + + /// + /// AfterDeserializeDictionary will be called after the deserialization has finished, allowing customization of the + /// object before it is returned. Implement this method in a partial class to enable this behavior + /// + /// The global::System.Collections.IDictionary content that should be used. + + partial void AfterDeserializeDictionary(global::System.Collections.IDictionary content); + + /// + /// AfterDeserializePSObject will be called after the deserialization has finished, allowing customization of the object + /// before it is returned. Implement this method in a partial class to enable this behavior + /// + /// The global::System.Management.Automation.PSObject content that should be used. + + partial void AfterDeserializePSObject(global::System.Management.Automation.PSObject content); + + /// + /// BeforeDeserializeDictionary will be called before the deserialization has commenced, allowing complete customization + /// of the object before it is deserialized. + /// If you wish to disable the default deserialization entirely, return true in the output + /// parameter. + /// Implement this method in a partial class to enable this behavior. + /// + /// The global::System.Collections.IDictionary content that should be used. + /// Determines if the rest of the serialization should be processed, or if the method should return + /// instantly. + + partial void BeforeDeserializeDictionary(global::System.Collections.IDictionary content, ref bool returnNow); + + /// + /// BeforeDeserializePSObject will be called before the deserialization has commenced, allowing complete customization + /// of the object before it is deserialized. + /// If you wish to disable the default deserialization entirely, return true in the output + /// parameter. + /// Implement this method in a partial class to enable this behavior. + /// + /// The global::System.Management.Automation.PSObject content that should be used. + /// Determines if the rest of the serialization should be processed, or if the method should return + /// instantly. + + partial void BeforeDeserializePSObject(global::System.Management.Automation.PSObject content, ref bool returnNow); + + /// + /// OverrideToString will be called if it is implemented. Implement this method in a partial class to enable this behavior + /// + /// /// instance serialized to a string, normally it is a Json + /// /// set returnNow to true if you provide a customized OverrideToString function + + partial void OverrideToString(ref string stringResult, ref bool returnNow); + + /// + /// Deserializes a into a new instance of . + /// + /// The global::System.Collections.IDictionary content that should be used. + internal Any(global::System.Collections.IDictionary content) + { + bool returnNow = false; + BeforeDeserializeDictionary(content, ref returnNow); + if (returnNow) + { + return; + } + // actually deserialize + AfterDeserializeDictionary(content); + } + + /// + /// Deserializes a into a new instance of . + /// + /// The global::System.Management.Automation.PSObject content that should be used. + internal Any(global::System.Management.Automation.PSObject content) + { + bool returnNow = false; + BeforeDeserializePSObject(content, ref returnNow); + if (returnNow) + { + return; + } + // actually deserialize + AfterDeserializePSObject(content); + } + + /// + /// Deserializes a into an instance of . + /// + /// The global::System.Collections.IDictionary content that should be used. + /// + /// an instance of . + /// + public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny DeserializeFromDictionary(global::System.Collections.IDictionary content) + { + return new Any(content); + } + + /// + /// Deserializes a into an instance of . + /// + /// The global::System.Management.Automation.PSObject content that should be used. + /// + /// an instance of . + /// + public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny DeserializeFromPSObject(global::System.Management.Automation.PSObject content) + { + return new Any(content); + } + + /// + /// Creates a new instance of , deserializing the content from a json string. + /// + /// a string containing a JSON serialized instance of this model. + /// an instance of the model class. + public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny FromJsonString(string jsonText) => FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(jsonText)); + + /// Serializes this instance to a json string. + + /// a containing this model serialized to JSON text. + public string ToJsonString() => ToJson(null, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeAll)?.ToString(); + + public override string ToString() + { + var returnNow = false; + var result = global::System.String.Empty; + OverrideToString(ref result, ref returnNow); + if (returnNow) + { + return result; + } + return ToJsonString(); + } + } + /// Anything + [System.ComponentModel.TypeConverter(typeof(AnyTypeConverter))] + public partial interface IAny + + { + + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.TypeConverter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.TypeConverter.cs new file mode 100644 index 000000000000..f40715147a0e --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.TypeConverter.cs @@ -0,0 +1,146 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models +{ + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + + /// + /// A PowerShell PSTypeConverter to support converting to an instance of + /// + public partial class AnyTypeConverter : global::System.Management.Automation.PSTypeConverter + { + + /// + /// Determines if the converter can convert the parameter to the parameter. + /// + /// the to convert from + /// the to convert to + /// + /// true if the converter can convert the parameter to the parameter, otherwise false. + /// + public override bool CanConvertFrom(object sourceValue, global::System.Type destinationType) => CanConvertFrom(sourceValue); + + /// + /// Determines if the converter can convert the parameter to the type. + /// + /// the instance to check if it can be converted to the type. + /// + /// true if the instance could be converted to a type, otherwise false + /// + public static bool CanConvertFrom(dynamic sourceValue) + { + if (null == sourceValue) + { + return true; + } + global::System.Type type = sourceValue.GetType(); + if (typeof(global::System.Management.Automation.PSObject).IsAssignableFrom(type)) + { + // we say yest to PSObjects + return true; + } + if (typeof(global::System.Collections.IDictionary).IsAssignableFrom(type)) + { + // we say yest to Hashtables/dictionaries + return true; + } + try + { + if (null != sourceValue.ToJsonString()) + { + return true; + } + } + catch + { + // Not one of our objects + } + try + { + string text = sourceValue.ToString()?.Trim(); + return true == text?.StartsWith("{") && true == text?.EndsWith("}") && Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(text).Type == Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonType.Object; + } + catch + { + // Doesn't look like it can be treated as JSON + } + return false; + } + + /// + /// Determines if the parameter can be converted to the + /// parameter + /// + /// the to convert from + /// the to convert to + /// + /// true if the converter can convert the parameter to the parameter, otherwise false + /// + public override bool CanConvertTo(object sourceValue, global::System.Type destinationType) => false; + + /// + /// Converts the parameter to the parameter using and + /// + /// the to convert from + /// the to convert to + /// not used by this TypeConverter. + /// when set to true, will ignore the case when converting. + /// + /// an instance of , or null if there is no suitable conversion. + /// + public override object ConvertFrom(object sourceValue, global::System.Type destinationType, global::System.IFormatProvider formatProvider, bool ignoreCase) => ConvertFrom(sourceValue); + + /// + /// Converts the parameter into an instance of + /// + /// the value to convert into an instance of . + /// + /// an instance of , or null if there is no suitable conversion. + /// + public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny ConvertFrom(dynamic sourceValue) + { + if (null == sourceValue) + { + return null; + } + global::System.Type type = sourceValue.GetType(); + if (typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny).IsAssignableFrom(type)) + { + return sourceValue; + } + try + { + return Any.FromJsonString(typeof(string) == sourceValue.GetType() ? sourceValue : sourceValue.ToJsonString());; + } + catch + { + // Unable to use JSON pattern + } + if (typeof(global::System.Management.Automation.PSObject).IsAssignableFrom(type)) + { + return Any.DeserializeFromPSObject(sourceValue); + } + if (typeof(global::System.Collections.IDictionary).IsAssignableFrom(type)) + { + return Any.DeserializeFromDictionary(sourceValue); + } + return null; + } + + /// NotImplemented -- this will return null + /// the to convert from + /// the to convert to + /// not used by this TypeConverter. + /// when set to true, will ignore the case when converting. + /// will always return null. + public override object ConvertTo(object sourceValue, global::System.Type destinationType, global::System.IFormatProvider formatProvider, bool ignoreCase) => null; + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.cs new file mode 100644 index 000000000000..55dbe2118597 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.cs @@ -0,0 +1,34 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + + /// Anything + public partial class Any : + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAnyInternal + { + + /// Creates an new instance. + public Any() + { + + } + } + /// Anything + public partial interface IAny : + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IJsonSerializable + { + + } + /// Anything + internal partial interface IAnyInternal + + { + + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.json.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.json.cs new file mode 100644 index 000000000000..df0faf8d9d3e --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/Any.json.cs @@ -0,0 +1,106 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + + /// Anything + public partial class Any + { + + /// + /// AfterFromJson will be called after the json deserialization has finished, allowing customization of the object + /// before it is returned. Implement this method in a partial class to enable this behavior + /// + /// The JsonNode that should be deserialized into this object. + + partial void AfterFromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject json); + + /// + /// AfterToJson will be called after the json serialization has finished, allowing customization of the before it is returned. Implement this method in a partial class to enable this behavior + /// + /// The JSON container that the serialization result will be placed in. + + partial void AfterToJson(ref Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject container); + + /// + /// BeforeFromJson will be called before the json deserialization has commenced, allowing complete customization of + /// the object before it is deserialized. + /// If you wish to disable the default deserialization entirely, return true in the + /// output parameter. + /// Implement this method in a partial class to enable this behavior. + /// + /// The JsonNode that should be deserialized into this object. + /// Determines if the rest of the deserialization should be processed, or if the method should return + /// instantly. + + partial void BeforeFromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject json, ref bool returnNow); + + /// + /// BeforeToJson will be called before the json serialization has commenced, allowing complete customization of the + /// object before it is serialized. + /// If you wish to disable the default serialization entirely, return true in the output + /// parameter. + /// Implement this method in a partial class to enable this behavior. + /// + /// The JSON container that the serialization result will be placed in. + /// Determines if the rest of the serialization should be processed, or if the method should return + /// instantly. + + partial void BeforeToJson(ref Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject container, ref bool returnNow); + + /// + /// Deserializes a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject into a new instance of . + /// + /// A Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject instance to deserialize from. + internal Any(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject json) + { + bool returnNow = false; + BeforeFromJson(json, ref returnNow); + if (returnNow) + { + return; + } + AfterFromJson(json); + } + + /// + /// Deserializes a into an instance of Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny. + /// + /// a to deserialize from. + /// + /// an instance of Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny. + /// + public static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode node) + { + return node is Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject json ? new Any(json) : null; + } + + /// + /// Serializes this instance of into a . + /// + /// The container to serialize this object into. If the caller + /// passes in null, a new instance will be created and returned to the caller. + /// Allows the caller to choose the depth of the serialization. See . + /// + /// a serialized instance of as a . + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode ToJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject container, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode) + { + container = container ?? new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonObject(); + + bool returnNow = false; + BeforeToJson(ref container, ref returnNow); + if (returnNow) + { + return container; + } + AfterToJson(ref container); + return container; + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.PowerShell.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.PowerShell.cs index 4e64ec0afe83..944b8aedec7f 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.PowerShell.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.PowerShell.cs @@ -165,6 +165,10 @@ internal NspAccessRule(global::System.Collections.IDictionary content) { ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).PhoneNumber = (System.Collections.Generic.List) content.GetValueForProperty("PhoneNumber",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).PhoneNumber, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); } + if (content.Contains("ServiceTag")) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).ServiceTag = (System.Collections.Generic.List) content.GetValueForProperty("ServiceTag",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).ServiceTag, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); + } AfterDeserializeDictionary(content); } @@ -238,6 +242,10 @@ internal NspAccessRule(global::System.Management.Automation.PSObject content) { ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).PhoneNumber = (System.Collections.Generic.List) content.GetValueForProperty("PhoneNumber",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).PhoneNumber, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); } + if (content.Contains("ServiceTag")) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).ServiceTag = (System.Collections.Generic.List) content.GetValueForProperty("ServiceTag",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRuleInternal)this).ServiceTag, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); + } AfterDeserializePSObject(content); } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.cs index 9d3eee1d4381..2879b548590b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRule.cs @@ -85,6 +85,10 @@ public partial class NspAccessRule : [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public string ResourceGroupName { get => (new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(this.Id).Success ? new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(this.Id).Groups["resourceGroupName"].Value : null); } + /// Inbound rules service tag names. + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] + public System.Collections.Generic.List ServiceTag { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)Property).ServiceTag; set => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)Property).ServiceTag = value ?? null /* arrayOf */; } + /// List of subscription ids [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List Subscription { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)Property).Subscription; set => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)Property).Subscription = value ?? null /* arrayOf */; } @@ -199,6 +203,17 @@ public partial interface INspAccessRule : PossibleTypes = new [] { typeof(string) })] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PSArgumentCompleterAttribute("Succeeded", "Creating", "Updating", "Deleting", "Accepted", "Failed")] string ProvisioningState { get; } + /// Inbound rules service tag names. + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Read = true, + Create = true, + Update = true, + Description = @"Inbound rules service tag names.", + SerializedName = @"serviceTags", + PossibleTypes = new [] { typeof(string) })] + System.Collections.Generic.List ServiceTag { get; set; } /// List of subscription ids [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -234,6 +249,8 @@ internal partial interface INspAccessRuleInternal : /// The provisioning state of the scope assignment resource. [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PSArgumentCompleterAttribute("Succeeded", "Creating", "Updating", "Deleting", "Accepted", "Failed")] string ProvisioningState { get; set; } + /// Inbound rules service tag names. + System.Collections.Generic.List ServiceTag { get; set; } /// List of subscription ids System.Collections.Generic.List Subscription { get; set; } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.PowerShell.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.PowerShell.cs index 22fac139d7a5..b0f918dd627b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.PowerShell.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.PowerShell.cs @@ -143,6 +143,10 @@ internal NspAccessRuleProperties(global::System.Collections.IDictionary content) { ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).PhoneNumber = (System.Collections.Generic.List) content.GetValueForProperty("PhoneNumber",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).PhoneNumber, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); } + if (content.Contains("ServiceTag")) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).ServiceTag = (System.Collections.Generic.List) content.GetValueForProperty("ServiceTag",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).ServiceTag, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); + } AfterDeserializeDictionary(content); } @@ -192,6 +196,10 @@ internal NspAccessRuleProperties(global::System.Management.Automation.PSObject c { ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).PhoneNumber = (System.Collections.Generic.List) content.GetValueForProperty("PhoneNumber",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).PhoneNumber, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); } + if (content.Contains("ServiceTag")) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).ServiceTag = (System.Collections.Generic.List) content.GetValueForProperty("ServiceTag",((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRulePropertiesInternal)this).ServiceTag, __y => TypeConverterExtensions.SelectToList(__y, global::System.Convert.ToString)); + } AfterDeserializePSObject(content); } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.cs index a999771cbf5f..4868aea1cff8 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.cs @@ -68,6 +68,13 @@ public partial class NspAccessRuleProperties : [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public string ProvisioningState { get => this._provisioningState; } + /// Backing field for property. + private System.Collections.Generic.List _serviceTag; + + /// Inbound rules service tag names. + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] + public System.Collections.Generic.List ServiceTag { get => this._serviceTag; set => this._serviceTag = value; } + /// Backing field for property. private System.Collections.Generic.List _subscription; @@ -164,6 +171,17 @@ public partial interface INspAccessRuleProperties : PossibleTypes = new [] { typeof(string) })] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PSArgumentCompleterAttribute("Succeeded", "Creating", "Updating", "Deleting", "Accepted", "Failed")] string ProvisioningState { get; } + /// Inbound rules service tag names. + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Read = true, + Create = true, + Update = true, + Description = @"Inbound rules service tag names.", + SerializedName = @"serviceTags", + PossibleTypes = new [] { typeof(string) })] + System.Collections.Generic.List ServiceTag { get; set; } /// List of subscription ids [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -197,6 +215,8 @@ internal partial interface INspAccessRulePropertiesInternal /// The provisioning state of the scope assignment resource. [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PSArgumentCompleterAttribute("Succeeded", "Creating", "Updating", "Deleting", "Accepted", "Failed")] string ProvisioningState { get; set; } + /// Inbound rules service tag names. + System.Collections.Generic.List ServiceTag { get; set; } /// List of subscription ids System.Collections.Generic.List Subscription { get; set; } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.json.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.json.cs index b28413e58caf..4f2207b23b4e 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.json.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspAccessRuleProperties.json.cs @@ -85,6 +85,7 @@ internal NspAccessRuleProperties(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecur {_networkSecurityPerimeter = If( json?.PropertyT("networkSecurityPerimeters"), out var __jsonNetworkSecurityPerimeters) ? If( __jsonNetworkSecurityPerimeters as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonArray, out var __g) ? new global::System.Func>(()=> global::System.Linq.Enumerable.ToList(global::System.Linq.Enumerable.Select(__g, (__f)=>(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IPerimeterBasedAccessRule) (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.PerimeterBasedAccessRule.FromJson(__f) )) ))() : null : _networkSecurityPerimeter;} {_emailAddress = If( json?.PropertyT("emailAddresses"), out var __jsonEmailAddresses) ? If( __jsonEmailAddresses as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonArray, out var __b) ? new global::System.Func>(()=> global::System.Linq.Enumerable.ToList(global::System.Linq.Enumerable.Select(__b, (__a)=>(string) (__a is Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonString ___z ? (string)(___z.ToString()) : null)) ))() : null : _emailAddress;} {_phoneNumber = If( json?.PropertyT("phoneNumbers"), out var __jsonPhoneNumbers) ? If( __jsonPhoneNumbers as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonArray, out var ___w) ? new global::System.Func>(()=> global::System.Linq.Enumerable.ToList(global::System.Linq.Enumerable.Select(___w, (___v)=>(string) (___v is Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonString ___u ? (string)(___u.ToString()) : null)) ))() : null : _phoneNumber;} + {_serviceTag = If( json?.PropertyT("serviceTags"), out var __jsonServiceTags) ? If( __jsonServiceTags as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonArray, out var ___r) ? new global::System.Func>(()=> global::System.Linq.Enumerable.ToList(global::System.Linq.Enumerable.Select(___r, (___q)=>(string) (___q is Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonString ___p ? (string)(___p.ToString()) : null)) ))() : null : _serviceTag;} AfterFromJson(json); } @@ -169,6 +170,15 @@ public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json. } container.Add("phoneNumbers",___x); } + if (null != this._serviceTag) + { + var ___s = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.XNodeArray(); + foreach( var ___t in this._serviceTag ) + { + AddIf(null != (((object)___t)?.ToString()) ? (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode) new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonString(___t.ToString()) : null ,___s.Add); + } + container.Add("serviceTags",___s); + } AfterToJson(ref container); return container; } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLink.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLink.cs index 5046d34a1f66..e83b35211f89 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLink.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLink.cs @@ -42,8 +42,7 @@ public partial class NspLink : public string Id { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IProxyResourceInternal)__proxyResource).Id; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List LocalInboundProfile { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkPropertiesInternal)Property).LocalInboundProfile; set => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkPropertiesInternal)Property).LocalInboundProfile = value ?? null /* arrayOf */; } @@ -105,7 +104,7 @@ public partial class NspLink : /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List RemoteInboundProfile { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkPropertiesInternal)Property).RemoteInboundProfile; set => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkPropertiesInternal)Property).RemoteInboundProfile = value ?? null /* arrayOf */; } @@ -189,8 +188,7 @@ public partial interface INspLink : PossibleTypes = new [] { typeof(string) })] string Description { get; set; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -198,7 +196,7 @@ public partial interface INspLink : Read = true, Create = true, Update = true, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List LocalInboundProfile { get; set; } @@ -230,7 +228,7 @@ public partial interface INspLink : string ProvisioningState { get; } /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -238,7 +236,7 @@ public partial interface INspLink : Read = true, Create = true, Update = true, - Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].", + Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List RemoteInboundProfile { get; set; } @@ -307,8 +305,7 @@ internal partial interface INspLinkInternal : /// string Description { get; set; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// System.Collections.Generic.List LocalInboundProfile { get; set; } /// @@ -323,7 +320,7 @@ internal partial interface INspLinkInternal : string ProvisioningState { get; set; } /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// System.Collections.Generic.List RemoteInboundProfile { get; set; } /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkProperties.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkProperties.cs index 33061e614903..5c77cd574cc7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkProperties.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkProperties.cs @@ -39,8 +39,7 @@ public partial class NspLinkProperties : private System.Collections.Generic.List _localInboundProfile; /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public System.Collections.Generic.List LocalInboundProfile { get => this._localInboundProfile; set => this._localInboundProfile = value; } @@ -85,7 +84,7 @@ public partial class NspLinkProperties : /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public System.Collections.Generic.List RemoteInboundProfile { get => this._remoteInboundProfile; set => this._remoteInboundProfile = value; } @@ -160,8 +159,7 @@ public partial interface INspLinkProperties : PossibleTypes = new [] { typeof(string) })] string Description { get; set; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -169,7 +167,7 @@ public partial interface INspLinkProperties : Read = true, Create = true, Update = true, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List LocalInboundProfile { get; set; } @@ -201,7 +199,7 @@ public partial interface INspLinkProperties : string ProvisioningState { get; } /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -209,7 +207,7 @@ public partial interface INspLinkProperties : Read = true, Create = true, Update = true, - Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].", + Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List RemoteInboundProfile { get; set; } @@ -278,8 +276,7 @@ internal partial interface INspLinkPropertiesInternal /// string Description { get; set; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// System.Collections.Generic.List LocalInboundProfile { get; set; } /// @@ -292,7 +289,7 @@ internal partial interface INspLinkPropertiesInternal string ProvisioningState { get; set; } /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// System.Collections.Generic.List RemoteInboundProfile { get; set; } /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReference.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReference.cs index 2cee78a97e03..60eecd79b50d 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReference.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReference.cs @@ -35,15 +35,14 @@ public partial class NspLinkReference : public string Id { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IProxyResourceInternal)__proxyResource).Id; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List LocalInboundProfile { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReferencePropertiesInternal)Property).LocalInboundProfile; set => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReferencePropertiesInternal)Property).LocalInboundProfile = value ?? null /* arrayOf */; } /// - /// Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default - /// value is ['*']. + /// Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value + /// is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List LocalOutboundProfile { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReferencePropertiesInternal)Property).LocalOutboundProfile; } @@ -104,14 +103,14 @@ public partial class NspLinkReference : /// /// Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote - /// perimeter. This property can only be updated from remote perimeter. + /// perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List RemoteInboundProfile { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReferencePropertiesInternal)Property).RemoteInboundProfile; } /// /// Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles - /// at remote perimeter. This property can only be updated from remote perimeter. + /// at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Inlined)] public System.Collections.Generic.List RemoteOutboundProfile { get => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReferencePropertiesInternal)Property).RemoteOutboundProfile; } @@ -180,8 +179,7 @@ public partial interface INspLinkReference : PossibleTypes = new [] { typeof(string) })] string Description { get; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -189,13 +187,13 @@ public partial interface INspLinkReference : Read = true, Create = true, Update = true, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List LocalInboundProfile { get; set; } /// - /// Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default - /// value is ['*']. + /// Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value + /// is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -203,7 +201,7 @@ public partial interface INspLinkReference : Read = true, Create = false, Update = false, - Description = @"Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default value is ['*'].", + Description = @"Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it.", SerializedName = @"localOutboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List LocalOutboundProfile { get; } @@ -221,7 +219,7 @@ public partial interface INspLinkReference : string ProvisioningState { get; } /// /// Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote - /// perimeter. This property can only be updated from remote perimeter. + /// perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -229,13 +227,13 @@ public partial interface INspLinkReference : Read = true, Create = false, Update = false, - Description = @"Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote perimeter. This property can only be updated from remote perimeter.", + Description = @"Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List RemoteInboundProfile { get; } /// /// Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles - /// at remote perimeter. This property can only be updated from remote perimeter. + /// at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -243,7 +241,7 @@ public partial interface INspLinkReference : Read = true, Create = false, Update = false, - Description = @"Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles at remote perimeter. This property can only be updated from remote perimeter.", + Description = @"Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter.", SerializedName = @"remoteOutboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List RemoteOutboundProfile { get; } @@ -306,13 +304,12 @@ internal partial interface INspLinkReferenceInternal : /// string Description { get; set; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// System.Collections.Generic.List LocalInboundProfile { get; set; } /// - /// Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default - /// value is ['*']. + /// Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value + /// is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it. /// System.Collections.Generic.List LocalOutboundProfile { get; set; } /// Properties of the network security perimeter linkReference resource. @@ -322,12 +319,12 @@ internal partial interface INspLinkReferenceInternal : string ProvisioningState { get; set; } /// /// Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote - /// perimeter. This property can only be updated from remote perimeter. + /// perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// System.Collections.Generic.List RemoteInboundProfile { get; set; } /// /// Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles - /// at remote perimeter. This property can only be updated from remote perimeter. + /// at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// System.Collections.Generic.List RemoteOutboundProfile { get; set; } /// Remote NSP Guid with which the link is created. diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReferenceProperties.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReferenceProperties.cs index 46a4554da497..a72abc109d24 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReferenceProperties.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/Models/NspLinkReferenceProperties.cs @@ -27,8 +27,7 @@ public partial class NspLinkReferenceProperties : private System.Collections.Generic.List _localInboundProfile; /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public System.Collections.Generic.List LocalInboundProfile { get => this._localInboundProfile; set => this._localInboundProfile = value; } @@ -37,8 +36,8 @@ public partial class NspLinkReferenceProperties : private System.Collections.Generic.List _localOutboundProfile; /// - /// Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default - /// value is ['*']. + /// Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value + /// is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public System.Collections.Generic.List LocalOutboundProfile { get => this._localOutboundProfile; } @@ -79,7 +78,7 @@ public partial class NspLinkReferenceProperties : /// /// Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote - /// perimeter. This property can only be updated from remote perimeter. + /// perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public System.Collections.Generic.List RemoteInboundProfile { get => this._remoteInboundProfile; } @@ -89,7 +88,7 @@ public partial class NspLinkReferenceProperties : /// /// Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles - /// at remote perimeter. This property can only be updated from remote perimeter. + /// at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Origin(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.PropertyOrigin.Owned)] public System.Collections.Generic.List RemoteOutboundProfile { get => this._remoteOutboundProfile; } @@ -149,8 +148,7 @@ public partial interface INspLinkReferenceProperties : PossibleTypes = new [] { typeof(string) })] string Description { get; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -158,13 +156,13 @@ public partial interface INspLinkReferenceProperties : Read = true, Create = true, Update = true, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List LocalInboundProfile { get; set; } /// - /// Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default - /// value is ['*']. + /// Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value + /// is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -172,7 +170,7 @@ public partial interface INspLinkReferenceProperties : Read = true, Create = false, Update = false, - Description = @"Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default value is ['*'].", + Description = @"Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it.", SerializedName = @"localOutboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List LocalOutboundProfile { get; } @@ -190,7 +188,7 @@ public partial interface INspLinkReferenceProperties : string ProvisioningState { get; } /// /// Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote - /// perimeter. This property can only be updated from remote perimeter. + /// perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -198,13 +196,13 @@ public partial interface INspLinkReferenceProperties : Read = true, Create = false, Update = false, - Description = @"Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote perimeter. This property can only be updated from remote perimeter.", + Description = @"Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List RemoteInboundProfile { get; } /// /// Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles - /// at remote perimeter. This property can only be updated from remote perimeter. + /// at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, @@ -212,7 +210,7 @@ public partial interface INspLinkReferenceProperties : Read = true, Create = false, Update = false, - Description = @"Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles at remote perimeter. This property can only be updated from remote perimeter.", + Description = @"Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter.", SerializedName = @"remoteOutboundProfiles", PossibleTypes = new [] { typeof(string) })] System.Collections.Generic.List RemoteOutboundProfile { get; } @@ -275,13 +273,12 @@ internal partial interface INspLinkReferencePropertiesInternal /// string Description { get; set; } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// System.Collections.Generic.List LocalInboundProfile { get; set; } /// - /// Local Outbound profile names from which Outbound is allowed. Use ['*'] to allow outbound from all profiles. It's default - /// value is ['*']. + /// Local Outbound profile names from which Outbound is allowed. In current version, it is readonly property and it's value + /// is set to ['*'] to allow outbound from all profiles. In later version, user will be able to modify it. /// System.Collections.Generic.List LocalOutboundProfile { get; set; } /// The provisioning state of the NSP LinkReference resource. @@ -289,12 +286,12 @@ internal partial interface INspLinkReferencePropertiesInternal string ProvisioningState { get; set; } /// /// Remote Inbound profile names to which Inbound is allowed. ['*'] value implies inbound is allowed to all profiles at remote - /// perimeter. This property can only be updated from remote perimeter. + /// perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// System.Collections.Generic.List RemoteInboundProfile { get; set; } /// /// Remote Outbound profile names from which Outbound is allowed. ['*'] value implies outbound is allowed from all profiles - /// at remote perimeter. This property can only be updated from remote perimeter. + /// at remote perimeter. This property can only be updated from corresponding link resource present in remote perimeter. /// System.Collections.Generic.List RemoteOutboundProfile { get; set; } /// Remote NSP Guid with which the link is created. diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/NetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/NetworkSecurityPerimeter.cs index ec650d3e5cc7..9a6c6743f86a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/NetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/api/NetworkSecurityPerimeter.cs @@ -15,7 +15,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter public partial class NetworkSecurityPerimeter { - /// Create a Network Security Perimeter. + /// Update a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -33,7 +33,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersCreateOrUpdate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -66,7 +66,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a Network Security Perimeter. + /// Update a Network Security Perimeter. /// /// Parameter supplied to create or update the network security perimeter. /// a delegate that is called when the remote service returns 200 (OK). @@ -81,7 +81,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersCreateOrUpdateViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -126,7 +126,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a Network Security Perimeter. + /// Update a Network Security Perimeter. /// /// Parameter supplied to create or update the network security perimeter. /// an instance that will receive events. @@ -138,7 +138,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersCreateOrUpdateViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -183,7 +183,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a Network Security Perimeter. + /// Update a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -200,7 +200,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersCreateOrUpdateViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -233,7 +233,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a Network Security Perimeter. + /// Update a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -247,7 +247,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersCreateOrUpdateViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -280,7 +280,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a Network Security Perimeter. + /// Update a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -295,7 +295,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersCreateOrUpdateWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -496,7 +496,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -538,7 +538,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -673,7 +673,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersGet(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -714,7 +714,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -765,7 +765,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -819,7 +819,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1000,7 +1000,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersList(string subscriptionId, string resourceGroupName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1049,7 +1049,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListBySubscription(string subscriptionId, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1095,7 +1095,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListBySubscriptionViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1149,7 +1149,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListBySubscriptionViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1204,7 +1204,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListBySubscriptionWithResult(string subscriptionId, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1389,7 +1389,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1446,7 +1446,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1505,7 +1505,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersListWithResult(string subscriptionId, string resourceGroupName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1676,16 +1676,13 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network access rule. + /// Patch Tags for a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// The name of the NSP access rule. - /// Parameters that hold the NspAccessRule resource to be created/updated. + /// Parameter supplied to the network security perimeter. /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 201 (Created). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. @@ -1694,9 +1691,9 @@ public partial class NetworkSecurityPerimeter /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatch(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1708,10 +1705,6 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(resourceGroupName) + "/providers/Microsoft.Network/networkSecurityPerimeters/" + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) - + "/profiles/" - + global::System.Uri.EscapeDataString(profileName) - + "/accessRules/" - + global::System.Uri.EscapeDataString(accessRuleName) + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -1720,7 +1713,7 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Patch, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } @@ -1729,15 +1722,14 @@ public partial class NetworkSecurityPerimeter request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesCreateOrUpdate_Call (request, onOk,onCreated,onDefault,eventListener,sender); + await this.NetworkSecurityPerimetersPatch_Call (request, onOk,onDefault,eventListener,sender); } } - /// Create a network access rule. + /// Patch Tags for a Network Security Perimeter. /// - /// Parameters that hold the NspAccessRule resource to be created/updated. + /// Parameter supplied to the network security perimeter. /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 201 (Created). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. @@ -1746,26 +1738,24 @@ public partial class NetworkSecurityPerimeter /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatchViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { // verify that Identity format is an exact match for uri - var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); if (!_match.Success) { - throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}'"); + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}'"); } // replace URI parameters with values from identity var subscriptionId = _match.Groups["subscriptionId"].Value; var resourceGroupName = _match.Groups["resourceGroupName"].Value; var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; - var profileName = _match.Groups["profileName"].Value; - var accessRuleName = _match.Groups["accessRuleName"].Value; // construct URL var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( "/subscriptions/" @@ -1774,10 +1764,6 @@ public partial class NetworkSecurityPerimeter + resourceGroupName + "/providers/Microsoft.Network/networkSecurityPerimeters/" + networkSecurityPerimeterName - + "/profiles/" - + profileName - + "/accessRules/" - + accessRuleName + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -1786,7 +1772,7 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Patch, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } @@ -1795,40 +1781,38 @@ public partial class NetworkSecurityPerimeter request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesCreateOrUpdate_Call (request, onOk,onCreated,onDefault,eventListener,sender); + await this.NetworkSecurityPerimetersPatch_Call (request, onOk,onDefault,eventListener,sender); } } - /// Create a network access rule. + /// Patch Tags for a Network Security Perimeter. /// - /// Parameters that hold the NspAccessRule resource to be created/updated. + /// Parameter supplied to the network security perimeter. /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// Allows the caller to choose the depth of the serialization. See . /// - /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatchViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { // verify that Identity format is an exact match for uri - var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); if (!_match.Success) { - throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}'"); + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}'"); } // replace URI parameters with values from identity var subscriptionId = _match.Groups["subscriptionId"].Value; var resourceGroupName = _match.Groups["resourceGroupName"].Value; var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; - var profileName = _match.Groups["profileName"].Value; - var accessRuleName = _match.Groups["accessRuleName"].Value; // construct URL var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( "/subscriptions/" @@ -1837,10 +1821,6 @@ public partial class NetworkSecurityPerimeter + resourceGroupName + "/providers/Microsoft.Network/networkSecurityPerimeters/" + networkSecurityPerimeterName - + "/profiles/" - + profileName - + "/accessRules/" - + accessRuleName + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -1849,7 +1829,7 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Patch, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } @@ -1858,20 +1838,17 @@ public partial class NetworkSecurityPerimeter request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesCreateOrUpdateWithResult_Call (request, eventListener,sender); + return await this.NetworkSecurityPerimetersPatchWithResult_Call (request, eventListener,sender); } } - /// Create a network access rule. + /// Patch Tags for a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// The name of the NSP access rule. - /// Json string supplied to the NspAccessRulesCreateOrUpdate operation + /// Json string supplied to the NetworkSecurityPerimetersPatch operation /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 201 (Created). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. @@ -1879,9 +1856,9 @@ public partial class NetworkSecurityPerimeter /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatchViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1893,10 +1870,6 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(resourceGroupName) + "/providers/Microsoft.Network/networkSecurityPerimeters/" + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) - + "/profiles/" - + global::System.Uri.EscapeDataString(profileName) - + "/accessRules/" - + global::System.Uri.EscapeDataString(accessRuleName) + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -1905,7 +1878,7 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Patch, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } @@ -1914,27 +1887,25 @@ public partial class NetworkSecurityPerimeter request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesCreateOrUpdate_Call (request, onOk,onCreated,onDefault,eventListener,sender); + await this.NetworkSecurityPerimetersPatch_Call (request, onOk,onDefault,eventListener,sender); } } - /// Create a network access rule. + /// Patch Tags for a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// The name of the NSP access rule. - /// Json string supplied to the NspAccessRulesCreateOrUpdate operation + /// Json string supplied to the NetworkSecurityPerimetersPatch operation /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// - /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatchViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -1946,10 +1917,6 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(resourceGroupName) + "/providers/Microsoft.Network/networkSecurityPerimeters/" + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) - + "/profiles/" - + global::System.Uri.EscapeDataString(profileName) - + "/accessRules/" - + global::System.Uri.EscapeDataString(accessRuleName) + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -1958,7 +1925,7 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Patch, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } @@ -1967,28 +1934,26 @@ public partial class NetworkSecurityPerimeter request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesCreateOrUpdateWithResult_Call (request, eventListener,sender); + return await this.NetworkSecurityPerimetersPatchWithResult_Call (request, eventListener,sender); } } - /// Create a network access rule. + /// Patch Tags for a Network Security Perimeter. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// The name of the NSP access rule. - /// Parameters that hold the NspAccessRule resource to be created/updated. + /// Parameter supplied to the network security perimeter. /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// Allows the caller to choose the depth of the serialization. See . /// - /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + public async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatchWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2000,10 +1965,6 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(resourceGroupName) + "/providers/Microsoft.Network/networkSecurityPerimeters/" + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) - + "/profiles/" - + global::System.Uri.EscapeDataString(profileName) - + "/accessRules/" - + global::System.Uri.EscapeDataString(accessRuleName) + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -2012,7 +1973,7 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Patch, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } @@ -2021,21 +1982,21 @@ public partial class NetworkSecurityPerimeter request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesCreateOrUpdateWithResult_Call (request, eventListener,sender); + return await this.NetworkSecurityPerimetersPatchWithResult_Call (request, eventListener,sender); } } /// - /// Actual wire call for method. + /// Actual wire call for method. /// /// the prepared HttpRequestMessage to send. /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// - /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + internal async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatchWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { using( NoSynchronizationContext ) { @@ -2054,13 +2015,7 @@ public partial class NetworkSecurityPerimeter case global::System.Net.HttpStatusCode.OK: { await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } - var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); - return await _result; - } - case global::System.Net.HttpStatusCode.Created: - { - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } - var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NetworkSecurityPerimeter.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); return await _result; } default: @@ -2093,10 +2048,9 @@ public partial class NetworkSecurityPerimeter } } - /// Actual wire call for method. + /// Actual wire call for method. /// the prepared HttpRequestMessage to send. /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 201 (Created). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. @@ -2104,7 +2058,7 @@ public partial class NetworkSecurityPerimeter /// /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdate_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + internal async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatch_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { using( NoSynchronizationContext ) { @@ -2123,13 +2077,7 @@ public partial class NetworkSecurityPerimeter case global::System.Net.HttpStatusCode.OK: { await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); - break; - } - case global::System.Net.HttpStatusCode.Created: - { - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onCreated(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NetworkSecurityPerimeter.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); break; } default: @@ -2151,53 +2099,51 @@ public partial class NetworkSecurityPerimeter } /// - /// Validation method for method. Call this like the actual call, but you will + /// Validation method for method. Call this like the actual call, but you will /// get validation events back. /// /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// The name of the NSP access rule. - /// Parameters that hold the NspAccessRule resource to be created/updated. + /// Parameter supplied to the network security perimeter. /// an instance that will receive events. /// /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdate_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + internal async global::System.Threading.Tasks.Task NetworkSecurityPerimetersPatch_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) { using( NoSynchronizationContext ) { await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); - await eventListener.AssertNotNull(nameof(profileName),profileName); - await eventListener.AssertNotNull(nameof(accessRuleName),accessRuleName); await eventListener.AssertNotNull(nameof(body), body); await eventListener.AssertObjectIsValid(nameof(body), body); } } - /// Deletes an NSP access rule. + /// Update a network access rule. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. /// The name of the NSP profile. /// The name of the NSP access rule. + /// Parameters that hold the NspAccessRule resource to be created/updated. /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 204 (NoContent). + /// a delegate that is called when the remote service returns 201 (Created). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2221,29 +2167,35 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Delete, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesDelete_Call (request, onOk,onNoContent,onDefault,eventListener,sender); + await this.NspAccessRulesCreateOrUpdate_Call (request, onOk,onCreated,onDefault,eventListener,sender); } } - /// Deletes an NSP access rule. + /// Update a network access rule. /// + /// Parameters that hold the NspAccessRule resource to be created/updated. /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 204 (NoContent). + /// a delegate that is called when the remote service returns 201 (Created). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2281,99 +2233,594 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Delete, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesDelete_Call (request, onOk,onNoContent,onDefault,eventListener,sender); + await this.NspAccessRulesCreateOrUpdate_Call (request, onOk,onCreated,onDefault,eventListener,sender); } } - /// Actual wire call for method. - /// the prepared HttpRequestMessage to send. - /// a delegate that is called when the remote service returns 200 (OK). - /// a delegate that is called when the remote service returns 204 (NoContent). - /// a delegate that is called when the remote service returns default (any response code not handled - /// elsewhere). + /// Update a network access rule. + /// + /// Parameters that hold the NspAccessRule resource to be created/updated. /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// - /// A that will be complete when handling of the response is completed. + /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesDelete_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters using( NoSynchronizationContext ) { - global::System.Net.Http.HttpResponseMessage _response = null; - try - { - var sendTask = sender.SendAsync(request, eventListener); - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return; } - _response = await sendTask; - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return; } - var _contentType = _response.Content.Headers.ContentType?.MediaType; + // verify that Identity format is an exact match for uri - switch ( _response.StatusCode ) - { - case global::System.Net.HttpStatusCode.OK: - { - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onOk(_response); - break; - } - case global::System.Net.HttpStatusCode.NoContent: - { - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onNoContent(_response); - break; - } - default: - { - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onDefault(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); - break; - } - } - } - finally + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + if (!_match.Success) { - // finally statements - await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); - _response?.Dispose(); - request?.Dispose(); + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}'"); } - } - } - /// - /// Validation method for method. Call this like the actual call, but you will get validation - /// events back. - /// - /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The - /// subscription ID forms part of the URI for every service call. - /// The name of the resource group. - /// The name of the network security perimeter. - /// The name of the NSP profile. - /// The name of the NSP access rule. - /// an instance that will receive events. - /// - /// A that will be complete when handling of the response is completed. - /// - internal async global::System.Threading.Tasks.Task NspAccessRulesDelete_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) - { - using( NoSynchronizationContext ) - { - await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); - await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); - await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); - await eventListener.AssertNotNull(nameof(profileName),profileName); - await eventListener.AssertNotNull(nameof(accessRuleName),accessRuleName); + // replace URI parameters with values from identity + var subscriptionId = _match.Groups["subscriptionId"].Value; + var resourceGroupName = _match.Groups["resourceGroupName"].Value; + var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; + var profileName = _match.Groups["profileName"].Value; + var accessRuleName = _match.Groups["accessRuleName"].Value; + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + subscriptionId + + "/resourceGroups/" + + resourceGroupName + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + networkSecurityPerimeterName + + "/profiles/" + + profileName + + "/accessRules/" + + accessRuleName + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesCreateOrUpdateWithResult_Call (request, eventListener,sender); } } - /// Gets the specified NSP access rule by name. + /// Update a network access rule. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Json string supplied to the NspAccessRulesCreateOrUpdate operation + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns 201 (Created). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(jsonString, global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesCreateOrUpdate_Call (request, onOk,onCreated,onDefault,eventListener,sender); + } + } + + /// Update a network access rule. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Json string supplied to the NspAccessRulesCreateOrUpdate operation + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(jsonString, global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesCreateOrUpdateWithResult_Call (request, eventListener,sender); + } + } + + /// Update a network access rule. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Parameters that hold the NspAccessRule resource to be created/updated. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Put, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesCreateOrUpdateWithResult_Call (request, eventListener,sender); + } + } + + /// + /// Actual wire call for method. + /// + /// the prepared HttpRequestMessage to send. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdateWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return null; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + return await _result; + } + case global::System.Net.HttpStatusCode.Created: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + return await _result; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + // Error Response : default + var code = (await _result)?.Code; + var message = (await _result)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(_response, await _result); + throw ex; + } + else + { + throw new global::System.Exception($"[{code}] : {message}"); + } + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// Actual wire call for method. + /// the prepared HttpRequestMessage to send. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns 201 (Created). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdate_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + case global::System.Net.HttpStatusCode.Created: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onCreated(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onDefault(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// + /// Validation method for method. Call this like the actual call, but you will + /// get validation events back. + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Parameters that hold the NspAccessRule resource to be created/updated. + /// an instance that will receive events. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesCreateOrUpdate_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + { + using( NoSynchronizationContext ) + { + await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); + await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); + await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); + await eventListener.AssertNotNull(nameof(profileName),profileName); + await eventListener.AssertNotNull(nameof(accessRuleName),accessRuleName); + await eventListener.AssertNotNull(nameof(body), body); + await eventListener.AssertObjectIsValid(nameof(body), body); + } + } + + /// Deletes an NSP access rule. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns 204 (NoContent). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Delete, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesDelete_Call (request, onOk,onNoContent,onDefault,eventListener,sender); + } + } + + /// Deletes an NSP access rule. + /// + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns 204 (NoContent). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // verify that Identity format is an exact match for uri + + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + if (!_match.Success) + { + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}'"); + } + + // replace URI parameters with values from identity + var subscriptionId = _match.Groups["subscriptionId"].Value; + var resourceGroupName = _match.Groups["resourceGroupName"].Value; + var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; + var profileName = _match.Groups["profileName"].Value; + var accessRuleName = _match.Groups["accessRuleName"].Value; + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + subscriptionId + + "/resourceGroups/" + + resourceGroupName + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + networkSecurityPerimeterName + + "/profiles/" + + profileName + + "/accessRules/" + + accessRuleName + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Delete, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesDelete_Call (request, onOk,onNoContent,onDefault,eventListener,sender); + } + } + + /// Actual wire call for method. + /// the prepared HttpRequestMessage to send. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns 204 (NoContent). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesDelete_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onOk(_response); + break; + } + case global::System.Net.HttpStatusCode.NoContent: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onNoContent(_response); + break; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onDefault(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// + /// Validation method for method. Call this like the actual call, but you will get validation + /// events back. + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// an instance that will receive events. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesDelete_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + { + using( NoSynchronizationContext ) + { + await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); + await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); + await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); + await eventListener.AssertNotNull(nameof(profileName),profileName); + await eventListener.AssertNotNull(nameof(accessRuleName),accessRuleName); + } + } + + /// Gets the specified NSP access rule by name. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -2390,7 +2837,738 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAccessRulesGet(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesGet_Call (request, onOk,onDefault,eventListener,sender); + } + } + + /// Gets the specified NSP access rule by name. + /// + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // verify that Identity format is an exact match for uri + + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + if (!_match.Success) + { + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}'"); + } + + // replace URI parameters with values from identity + var subscriptionId = _match.Groups["subscriptionId"].Value; + var resourceGroupName = _match.Groups["resourceGroupName"].Value; + var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; + var profileName = _match.Groups["profileName"].Value; + var accessRuleName = _match.Groups["accessRuleName"].Value; + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + subscriptionId + + "/resourceGroups/" + + resourceGroupName + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + networkSecurityPerimeterName + + "/profiles/" + + profileName + + "/accessRules/" + + accessRuleName + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesGet_Call (request, onOk,onDefault,eventListener,sender); + } + } + + /// Gets the specified NSP access rule by name. + /// + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // verify that Identity format is an exact match for uri + + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + if (!_match.Success) + { + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}'"); + } + + // replace URI parameters with values from identity + var subscriptionId = _match.Groups["subscriptionId"].Value; + var resourceGroupName = _match.Groups["resourceGroupName"].Value; + var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; + var profileName = _match.Groups["profileName"].Value; + var accessRuleName = _match.Groups["accessRuleName"].Value; + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + subscriptionId + + "/resourceGroups/" + + resourceGroupName + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + networkSecurityPerimeterName + + "/profiles/" + + profileName + + "/accessRules/" + + accessRuleName + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesGetWithResult_Call (request, eventListener,sender); + } + } + + /// Gets the specified NSP access rule by name. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesGetWithResult_Call (request, eventListener,sender); + } + } + + /// Actual wire call for method. + /// the prepared HttpRequestMessage to send. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesGetWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return null; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + return await _result; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + // Error Response : default + var code = (await _result)?.Code; + var message = (await _result)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(_response, await _result); + throw ex; + } + else + { + throw new global::System.Exception($"[{code}] : {message}"); + } + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// Actual wire call for method. + /// the prepared HttpRequestMessage to send. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesGet_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onDefault(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// + /// Validation method for method. Call this like the actual call, but you will get validation + /// events back. + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// an instance that will receive events. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesGet_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + { + using( NoSynchronizationContext ) + { + await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); + await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); + await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); + await eventListener.AssertNotNull(nameof(profileName),profileName); + await eventListener.AssertNotNull(nameof(accessRuleName),accessRuleName); + } + } + + /// Lists the NSP access rules in the specified NSP profile. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// An optional query parameter which specifies the maximum number of records to be returned by the server. + /// SkipToken is only used if a previous operation returned a partial result. If a previous response + /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting + /// point to use for subsequent calls. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesList(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + + "&" + + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) + + "&" + + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesList_Call (request, onOk,onDefault,eventListener,sender); + } + } + + /// Lists the NSP access rules in the specified NSP profile. + /// + /// An optional query parameter which specifies the maximum number of records to be returned by the server. + /// SkipToken is only used if a previous operation returned a partial result. If a previous response + /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting + /// point to use for subsequent calls. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // verify that Identity format is an exact match for uri + + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + if (!_match.Success) + { + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules'"); + } + + // replace URI parameters with values from identity + var subscriptionId = _match.Groups["subscriptionId"].Value; + var resourceGroupName = _match.Groups["resourceGroupName"].Value; + var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; + var profileName = _match.Groups["profileName"].Value; + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + subscriptionId + + "/resourceGroups/" + + resourceGroupName + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + networkSecurityPerimeterName + + "/profiles/" + + profileName + + "/accessRules" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + + "&" + + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) + + "&" + + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesList_Call (request, onOk,onDefault,eventListener,sender); + } + } + + /// Lists the NSP access rules in the specified NSP profile. + /// + /// An optional query parameter which specifies the maximum number of records to be returned by the server. + /// SkipToken is only used if a previous operation returned a partial result. If a previous response + /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting + /// point to use for subsequent calls. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // verify that Identity format is an exact match for uri + + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + if (!_match.Success) + { + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules'"); + } + + // replace URI parameters with values from identity + var subscriptionId = _match.Groups["subscriptionId"].Value; + var resourceGroupName = _match.Groups["resourceGroupName"].Value; + var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; + var profileName = _match.Groups["profileName"].Value; + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + subscriptionId + + "/resourceGroups/" + + resourceGroupName + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + networkSecurityPerimeterName + + "/profiles/" + + profileName + + "/accessRules" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + + "&" + + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) + + "&" + + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesListWithResult_Call (request, eventListener,sender); + } + } + + /// Lists the NSP access rules in the specified NSP profile. + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// An optional query parameter which specifies the maximum number of records to be returned by the server. + /// SkipToken is only used if a previous operation returned a partial result. If a previous response + /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting + /// point to use for subsequent calls. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesListWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + + "&" + + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) + + "&" + + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesListWithResult_Call (request, eventListener,sender); + } + } + + /// Actual wire call for method. + /// the prepared HttpRequestMessage to send. + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesListWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return null; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRuleListResult.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + return await _result; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + // Error Response : default + var code = (await _result)?.Code; + var message = (await _result)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(_response, await _result); + throw ex; + } + else + { + throw new global::System.Exception($"[{code}] : {message}"); + } + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// Actual wire call for method. + /// the prepared HttpRequestMessage to send. + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesList_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + using( NoSynchronizationContext ) + { + global::System.Net.Http.HttpResponseMessage _response = null; + try + { + var sendTask = sender.SendAsync(request, eventListener); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeCall, request); if( eventListener.Token.IsCancellationRequested ) { return; } + _response = await sendTask; + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.ResponseCreated, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress, "intentional placeholder", 100); if( eventListener.Token.IsCancellationRequested ) { return; } + var _contentType = _response.Content.Headers.ContentType?.MediaType; + + switch ( _response.StatusCode ) + { + case global::System.Net.HttpStatusCode.OK: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRuleListResult.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + default: + { + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } + await onDefault(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.CloudError.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + break; + } + } + } + finally + { + // finally statements + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Finally, request, _response); + _response?.Dispose(); + request?.Dispose(); + } + } + } + + /// + /// Validation method for method. Call this like the actual call, but you will get validation + /// events back. + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// An optional query parameter which specifies the maximum number of records to be returned by the server. + /// SkipToken is only used if a previous operation returned a partial result. If a previous response + /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting + /// point to use for subsequent calls. + /// an instance that will receive events. + /// + /// A that will be complete when handling of the response is completed. + /// + internal async global::System.Threading.Tasks.Task NspAccessRulesList_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + { + using( NoSynchronizationContext ) + { + await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); + await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); + await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); + await eventListener.AssertNotNull(nameof(profileName),profileName); + await eventListener.AssertIsGreaterThanOrEqual(nameof(Top),Top,1); + await eventListener.AssertIsLessThanOrEqual(nameof(Top),Top,20); + await eventListener.AssertNotNull(nameof(SkipToken),SkipToken); + } + } + + /// Reconcile NSP access rules + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Parameters for NSP access rule reconcile + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesReconcilePost(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + { + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2406,6 +3584,7 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(profileName) + "/accessRules/" + global::System.Uri.EscapeDataString(accessRuleName) + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -2414,28 +3593,34 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesGet_Call (request, onOk,onDefault,eventListener,sender); + await this.NspAccessRulesReconcilePost_Call (request, onOk,onDefault,eventListener,sender); } } - /// Gets the specified NSP access rule by name. + /// Reconcile NSP access rules /// + /// Parameters for NSP access rule reconcile /// a delegate that is called when the remote service returns 200 (OK). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAccessRulesReconcilePostViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2465,6 +3650,7 @@ public partial class NetworkSecurityPerimeter + profileName + "/accessRules/" + accessRuleName + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -2473,26 +3659,32 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesGet_Call (request, onOk,onDefault,eventListener,sender); + await this.NspAccessRulesReconcilePost_Call (request, onOk,onDefault,eventListener,sender); } } - /// Gets the specified NSP access rule by name. + /// Reconcile NSP access rules /// + /// Parameters for NSP access rule reconcile /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// - /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAccessRulesReconcilePostViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2519,9 +3711,120 @@ public partial class NetworkSecurityPerimeter + "/providers/Microsoft.Network/networkSecurityPerimeters/" + networkSecurityPerimeterName + "/profiles/" - + profileName + + profileName + + "/accessRules/" + + accessRuleName + + "/reconcile" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAccessRulesReconcilePostWithResult_Call (request, eventListener,sender); + } + } + + /// Reconcile NSP access rules + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Json string supplied to the NspAccessRulesReconcilePost operation + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesReconcilePostViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + + "/accessRules/" + + global::System.Uri.EscapeDataString(accessRuleName) + + "/reconcile" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(jsonString, global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAccessRulesReconcilePost_Call (request, onOk,onDefault,eventListener,sender); + } + } + + /// Reconcile NSP access rules + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP profile. + /// The name of the NSP access rule. + /// Json string supplied to the NspAccessRulesReconcilePost operation + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAccessRulesReconcilePostViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/profiles/" + + global::System.Uri.EscapeDataString(profileName) + "/accessRules/" - + accessRuleName + + global::System.Uri.EscapeDataString(accessRuleName) + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -2530,31 +3833,37 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(jsonString, global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesGetWithResult_Call (request, eventListener,sender); + return await this.NspAccessRulesReconcilePostWithResult_Call (request, eventListener,sender); } } - /// Gets the specified NSP access rule by name. + /// Reconcile NSP access rules /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. /// The name of the NSP profile. /// The name of the NSP access rule. + /// Parameters for NSP access rule reconcile /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// - /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAccessRulesReconcilePostWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2570,6 +3879,7 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(profileName) + "/accessRules/" + global::System.Uri.EscapeDataString(accessRuleName) + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); @@ -2578,24 +3888,30 @@ public partial class NetworkSecurityPerimeter // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesGetWithResult_Call (request, eventListener,sender); + return await this.NspAccessRulesReconcilePostWithResult_Call (request, eventListener,sender); } } - /// Actual wire call for method. + /// + /// Actual wire call for method. + /// /// the prepared HttpRequestMessage to send. /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// - /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesGetWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + internal async global::System.Threading.Tasks.Task NspAccessRulesReconcilePostWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { using( NoSynchronizationContext ) { @@ -2614,7 +3930,7 @@ public partial class NetworkSecurityPerimeter case global::System.Net.HttpStatusCode.OK: { await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } - var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); return await _result; } default: @@ -2647,7 +3963,7 @@ public partial class NetworkSecurityPerimeter } } - /// Actual wire call for method. + /// Actual wire call for method. /// the prepared HttpRequestMessage to send. /// a delegate that is called when the remote service returns 200 (OK). /// a delegate that is called when the remote service returns default (any response code not handled @@ -2657,7 +3973,7 @@ public partial class NetworkSecurityPerimeter /// /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesGet_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + internal async global::System.Threading.Tasks.Task NspAccessRulesReconcilePost_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { using( NoSynchronizationContext ) { @@ -2676,7 +3992,7 @@ public partial class NetworkSecurityPerimeter case global::System.Net.HttpStatusCode.OK: { await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRule.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); break; } default: @@ -2698,8 +4014,8 @@ public partial class NetworkSecurityPerimeter } /// - /// Validation method for method. Call this like the actual call, but you will get validation - /// events back. + /// Validation method for method. Call this like the actual call, but you will + /// get validation events back. /// /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. @@ -2707,11 +4023,12 @@ public partial class NetworkSecurityPerimeter /// The name of the network security perimeter. /// The name of the NSP profile. /// The name of the NSP access rule. + /// Parameters for NSP access rule reconcile /// an instance that will receive events. /// /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesGet_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + internal async global::System.Threading.Tasks.Task NspAccessRulesReconcilePost_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, string accessRuleName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) { using( NoSynchronizationContext ) { @@ -2720,30 +4037,30 @@ public partial class NetworkSecurityPerimeter await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); await eventListener.AssertNotNull(nameof(profileName),profileName); await eventListener.AssertNotNull(nameof(accessRuleName),accessRuleName); + await eventListener.AssertNotNull(nameof(body), body); + await eventListener.AssertObjectIsValid(nameof(body), body); } } - /// Lists the NSP access rules in the specified NSP profile. + /// Reconcile NSP association /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// An optional query parameter which specifies the maximum number of records to be returned by the server. - /// SkipToken is only used if a previous operation returned a partial result. If a previous response - /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting - /// point to use for subsequent calls. + /// The name of the NSP association. + /// Parameters for NSP association reconcile /// a delegate that is called when the remote service returns 200 (OK). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesList(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAssociationReconcilePost(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2755,63 +4072,61 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(resourceGroupName) + "/providers/Microsoft.Network/networkSecurityPerimeters/" + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) - + "/profiles/" - + global::System.Uri.EscapeDataString(profileName) - + "/accessRules" + + "/resourceAssociations/" + + global::System.Uri.EscapeDataString(associationName) + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) - + "&" - + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) - + "&" - + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesList_Call (request, onOk,onDefault,eventListener,sender); + await this.NspAssociationReconcilePost_Call (request, onOk,onDefault,eventListener,sender); } } - /// Lists the NSP access rules in the specified NSP profile. + /// Reconcile NSP association /// - /// An optional query parameter which specifies the maximum number of records to be returned by the server. - /// SkipToken is only used if a previous operation returned a partial result. If a previous response - /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting - /// point to use for subsequent calls. + /// Parameters for NSP association reconcile /// a delegate that is called when the remote service returns 200 (OK). /// a delegate that is called when the remote service returns default (any response code not handled /// elsewhere). /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAssociationReconcilePostViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { // verify that Identity format is an exact match for uri - var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/resourceAssociations/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); if (!_match.Success) { - throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules'"); + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}'"); } // replace URI parameters with values from identity var subscriptionId = _match.Groups["subscriptionId"].Value; var resourceGroupName = _match.Groups["resourceGroupName"].Value; var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; - var profileName = _match.Groups["profileName"].Value; + var associationName = _match.Groups["associationName"].Value; // construct URL var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( "/subscriptions/" @@ -2820,61 +4135,59 @@ public partial class NetworkSecurityPerimeter + resourceGroupName + "/providers/Microsoft.Network/networkSecurityPerimeters/" + networkSecurityPerimeterName - + "/profiles/" - + profileName - + "/accessRules" + + "/resourceAssociations/" + + associationName + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) - + "&" - + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) - + "&" - + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } // make the call - await this.NspAccessRulesList_Call (request, onOk,onDefault,eventListener,sender); + await this.NspAssociationReconcilePost_Call (request, onOk,onDefault,eventListener,sender); } } - /// Lists the NSP access rules in the specified NSP profile. + /// Reconcile NSP association /// - /// An optional query parameter which specifies the maximum number of records to be returned by the server. - /// SkipToken is only used if a previous operation returned a partial result. If a previous response - /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting - /// point to use for subsequent calls. + /// Parameters for NSP association reconcile /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . /// - /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAssociationReconcilePostViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { // verify that Identity format is an exact match for uri - var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/profiles/(?[^/]+)/accessRules$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); + var _match = new global::System.Text.RegularExpressions.Regex("^/subscriptions/(?[^/]+)/resourceGroups/(?[^/]+)/providers/Microsoft.Network/networkSecurityPerimeters/(?[^/]+)/resourceAssociations/(?[^/]+)$", global::System.Text.RegularExpressions.RegexOptions.IgnoreCase).Match(viaIdentity); if (!_match.Success) { - throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules'"); + throw new global::System.Exception("Invalid identity for URI '/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}'"); } // replace URI parameters with values from identity var subscriptionId = _match.Groups["subscriptionId"].Value; var resourceGroupName = _match.Groups["resourceGroupName"].Value; var networkSecurityPerimeterName = _match.Groups["networkSecurityPerimeterName"].Value; - var profileName = _match.Groups["profileName"].Value; + var associationName = _match.Groups["associationName"].Value; // construct URL var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( "/subscriptions/" @@ -2883,49 +4196,99 @@ public partial class NetworkSecurityPerimeter + resourceGroupName + "/providers/Microsoft.Network/networkSecurityPerimeters/" + networkSecurityPerimeterName - + "/profiles/" - + profileName - + "/accessRules" + + "/resourceAssociations/" + + associationName + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) - + "&" - + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) - + "&" - + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesListWithResult_Call (request, eventListener,sender); + return await this.NspAssociationReconcilePostWithResult_Call (request, eventListener,sender); } } - /// Lists the NSP access rules in the specified NSP profile. + /// Reconcile NSP association /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// An optional query parameter which specifies the maximum number of records to be returned by the server. - /// SkipToken is only used if a previous operation returned a partial result. If a previous response - /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting - /// point to use for subsequent calls. + /// The name of the NSP association. + /// Json string supplied to the NspAssociationReconcilePost operation + /// a delegate that is called when the remote service returns 200 (OK). + /// a delegate that is called when the remote service returns default (any response code not handled + /// elsewhere). /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// - /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAssociationReconcilePostViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/resourceAssociations/" + + global::System.Uri.EscapeDataString(associationName) + + "/reconcile" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return; } + // set body content + request.Content = new global::System.Net.Http.StringContent(jsonString, global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return; } + // make the call + await this.NspAssociationReconcilePost_Call (request, onOk,onDefault,eventListener,sender); + } + } + + /// Reconcile NSP association + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP association. + /// Json string supplied to the NspAssociationReconcilePost operation + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// + /// A that will be complete when handling of the response is completed. /// - public async global::System.Threading.Tasks.Task NspAccessRulesListWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + public async global::System.Threading.Tasks.Task NspAssociationReconcilePostViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -2937,39 +4300,93 @@ public partial class NetworkSecurityPerimeter + global::System.Uri.EscapeDataString(resourceGroupName) + "/providers/Microsoft.Network/networkSecurityPerimeters/" + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) - + "/profiles/" - + global::System.Uri.EscapeDataString(profileName) - + "/accessRules" + + "/resourceAssociations/" + + global::System.Uri.EscapeDataString(associationName) + + "/reconcile" + "?" + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) - + "&" - + (null == Top ? global::System.String.Empty : "$top=" + global::System.Uri.EscapeDataString(Top.ToString())) - + "&" - + (string.IsNullOrEmpty(SkipToken) ? global::System.String.Empty : "$skipToken=" + global::System.Uri.EscapeDataString(SkipToken)) ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } // generate request object var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); - var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Get, _url); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(jsonString, global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } // make the call - return await this.NspAccessRulesListWithResult_Call (request, eventListener,sender); + return await this.NspAssociationReconcilePostWithResult_Call (request, eventListener,sender); } } - /// Actual wire call for method. + /// Reconcile NSP association + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The + /// subscription ID forms part of the URI for every service call. + /// The name of the resource group. + /// The name of the network security perimeter. + /// The name of the NSP association. + /// Parameters for NSP association reconcile + /// an instance that will receive events. + /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. + /// Allows the caller to choose the depth of the serialization. See . + /// + /// A that will be complete when handling of the response is completed. + /// + public async global::System.Threading.Tasks.Task NspAssociationReconcilePostWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) + { + var apiVersion = @"2023-08-01-preview"; + // Constant Parameters + using( NoSynchronizationContext ) + { + // construct URL + var pathAndQuery = global::System.Text.RegularExpressions.Regex.Replace( + "/subscriptions/" + + global::System.Uri.EscapeDataString(subscriptionId) + + "/resourceGroups/" + + global::System.Uri.EscapeDataString(resourceGroupName) + + "/providers/Microsoft.Network/networkSecurityPerimeters/" + + global::System.Uri.EscapeDataString(networkSecurityPerimeterName) + + "/resourceAssociations/" + + global::System.Uri.EscapeDataString(associationName) + + "/reconcile" + + "?" + + "api-version=" + global::System.Uri.EscapeDataString(apiVersion) + ,"\\?&*$|&*$|(\\?)&+|(&)&+","$1$2"); + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.URLCreated, pathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + // generate request object + var _url = new global::System.Uri($"https://management.azure.com{pathAndQuery}"); + var request = new global::System.Net.Http.HttpRequestMessage(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Method.Post, _url); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.RequestCreated, request.RequestUri.PathAndQuery); if( eventListener.Token.IsCancellationRequested ) { return null; } + + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.HeaderParametersAdded); if( eventListener.Token.IsCancellationRequested ) { return null; } + // set body content + request.Content = new global::System.Net.Http.StringContent(null != body ? body.ToJson(null, serializationMode).ToString() : @"{}", global::System.Text.Encoding.UTF8); + request.Content.Headers.ContentType = global::System.Net.Http.Headers.MediaTypeHeaderValue.Parse("application/json"); + await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BodyContentSet); if( eventListener.Token.IsCancellationRequested ) { return null; } + // make the call + return await this.NspAssociationReconcilePostWithResult_Call (request, eventListener,sender); + } + } + + /// + /// Actual wire call for method. + /// /// the prepared HttpRequestMessage to send. /// an instance that will receive events. /// an instance of an Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync pipeline to use to make the request. /// - /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesListWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + internal async global::System.Threading.Tasks.Task NspAssociationReconcilePostWithResult_Call(global::System.Net.Http.HttpRequestMessage request, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { using( NoSynchronizationContext ) { @@ -2988,7 +4405,7 @@ public partial class NetworkSecurityPerimeter case global::System.Net.HttpStatusCode.OK: { await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return null; } - var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRuleListResult.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); + var _result = _response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) ); return await _result; } default: @@ -3021,7 +4438,7 @@ public partial class NetworkSecurityPerimeter } } - /// Actual wire call for method. + /// Actual wire call for method. /// the prepared HttpRequestMessage to send. /// a delegate that is called when the remote service returns 200 (OK). /// a delegate that is called when the remote service returns default (any response code not handled @@ -3031,7 +4448,7 @@ public partial class NetworkSecurityPerimeter /// /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesList_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) + internal async global::System.Threading.Tasks.Task NspAssociationReconcilePost_Call(global::System.Net.Http.HttpRequestMessage request, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { using( NoSynchronizationContext ) { @@ -3050,7 +4467,7 @@ public partial class NetworkSecurityPerimeter case global::System.Net.HttpStatusCode.OK: { await eventListener.Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.BeforeResponseDispatch, _response); if( eventListener.Token.IsCancellationRequested ) { return; } - await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.NspAccessRuleListResult.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); + await onOk(_response,_response.Content.ReadAsStringAsync().ContinueWith( body => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any.FromJson(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Json.JsonNode.Parse(body.Result)) )); break; } default: @@ -3072,37 +4489,33 @@ public partial class NetworkSecurityPerimeter } /// - /// Validation method for method. Call this like the actual call, but you will get validation - /// events back. + /// Validation method for method. Call this like the actual call, but you will + /// get validation events back. /// /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. /// The name of the network security perimeter. - /// The name of the NSP profile. - /// An optional query parameter which specifies the maximum number of records to be returned by the server. - /// SkipToken is only used if a previous operation returned a partial result. If a previous response - /// contains a nextLink element, the value of the nextLink element will include a skipToken parameter that specifies a starting - /// point to use for subsequent calls. + /// The name of the NSP association. + /// Parameters for NSP association reconcile /// an instance that will receive events. /// /// A that will be complete when handling of the response is completed. /// - internal async global::System.Threading.Tasks.Task NspAccessRulesList_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) + internal async global::System.Threading.Tasks.Task NspAssociationReconcilePost_Validate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener) { using( NoSynchronizationContext ) { await eventListener.AssertNotNull(nameof(subscriptionId),subscriptionId); await eventListener.AssertNotNull(nameof(resourceGroupName),resourceGroupName); await eventListener.AssertNotNull(nameof(networkSecurityPerimeterName),networkSecurityPerimeterName); - await eventListener.AssertNotNull(nameof(profileName),profileName); - await eventListener.AssertIsGreaterThanOrEqual(nameof(Top),Top,1); - await eventListener.AssertIsLessThanOrEqual(nameof(Top),Top,20); - await eventListener.AssertNotNull(nameof(SkipToken),SkipToken); + await eventListener.AssertNotNull(nameof(associationName),associationName); + await eventListener.AssertNotNull(nameof(body), body); + await eventListener.AssertObjectIsValid(nameof(body), body); } } - /// Create a NSP resource association. + /// Update a NSP resource association. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -3121,7 +4534,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsCreateOrUpdate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3156,7 +4569,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a NSP resource association. + /// Update a NSP resource association. /// /// Parameters that hold the NspAssociation resource to be created/updated. /// a delegate that is called when the remote service returns 200 (OK). @@ -3171,7 +4584,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsCreateOrUpdateViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3219,7 +4632,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a NSP resource association. + /// Update a NSP resource association. /// /// Parameters that hold the NspAssociation resource to be created/updated. /// an instance that will receive events. @@ -3231,7 +4644,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsCreateOrUpdateViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3279,7 +4692,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a NSP resource association. + /// Update a NSP resource association. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -3297,7 +4710,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsCreateOrUpdateViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3332,7 +4745,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a NSP resource association. + /// Update a NSP resource association. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -3347,7 +4760,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsCreateOrUpdateViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3382,7 +4795,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a NSP resource association. + /// Update a NSP resource association. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -3398,7 +4811,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsCreateOrUpdateWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3602,7 +5015,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3646,7 +5059,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3879,7 +5292,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsGet(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3922,7 +5335,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -3976,7 +5389,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4034,7 +5447,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string associationName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4218,7 +5631,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsList(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4268,7 +5681,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4328,7 +5741,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4391,7 +5804,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspAssociationsListWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4581,7 +5994,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkReferenceName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4625,7 +6038,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4855,7 +6268,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesGet(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkReferenceName, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4898,7 +6311,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -4952,7 +6365,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5010,7 +6423,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkReferenceName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5196,7 +6609,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesList(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5248,7 +6661,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5310,7 +6723,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5375,7 +6788,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinkReferencesListWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5548,7 +6961,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create NSP link resource. + /// Update NSP link resource. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -5567,7 +6980,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksCreateOrUpdate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5602,7 +7015,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create NSP link resource. + /// Update NSP link resource. /// /// Parameters that hold the NspLink resource to be created/updated. /// a delegate that is called when the remote service returns 200 (OK). @@ -5617,7 +7030,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksCreateOrUpdateViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5665,7 +7078,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create NSP link resource. + /// Update NSP link resource. /// /// Parameters that hold the NspLink resource to be created/updated. /// an instance that will receive events. @@ -5677,7 +7090,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksCreateOrUpdateViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5725,7 +7138,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create NSP link resource. + /// Update NSP link resource. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -5743,7 +7156,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksCreateOrUpdateViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5778,7 +7191,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create NSP link resource. + /// Update NSP link resource. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -5793,7 +7206,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksCreateOrUpdateViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -5828,7 +7241,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create NSP link resource. + /// Update NSP link resource. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -5844,7 +7257,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksCreateOrUpdateWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6046,7 +7459,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6090,7 +7503,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6320,7 +7733,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksGet(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6363,7 +7776,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6417,7 +7830,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6475,7 +7888,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string linkName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6659,7 +8072,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksList(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6709,7 +8122,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6769,7 +8182,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -6832,7 +8245,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspLinksListWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7005,7 +8418,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network profile. + /// Update a network profile. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -7024,7 +8437,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesCreateOrUpdate(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7059,7 +8472,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network profile. + /// Update a network profile. /// /// Parameters that hold the NspProfile resource to be created/updated. /// a delegate that is called when the remote service returns 200 (OK). @@ -7074,7 +8487,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesCreateOrUpdateViaIdentity(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile body, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7122,7 +8535,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network profile. + /// Update a network profile. /// /// Parameters that hold the NspProfile resource to be created/updated. /// an instance that will receive events. @@ -7134,7 +8547,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesCreateOrUpdateViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7182,7 +8595,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network profile. + /// Update a network profile. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -7200,7 +8613,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesCreateOrUpdateViaJsonString(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, global::System.String jsonString, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onCreated, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7235,7 +8648,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network profile. + /// Update a network profile. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -7250,7 +8663,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesCreateOrUpdateViaJsonStringWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, global::System.String jsonString, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7285,7 +8698,7 @@ public partial class NetworkSecurityPerimeter } } - /// Create a network profile. + /// Update a network profile. /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The /// subscription ID forms part of the URI for every service call. /// The name of the resource group. @@ -7301,7 +8714,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesCreateOrUpdateWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile body, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode serializationMode = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeCreate|Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SerializationMode.IncludeUpdate) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7505,7 +8918,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesDelete(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7549,7 +8962,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesDeleteViaIdentity(global::System.String viaIdentity, global::System.Func onOk, global::System.Func onNoContent, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7690,7 +9103,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesGet(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7733,7 +9146,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesGetViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7787,7 +9200,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesGetViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -7845,7 +9258,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesGetWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, string profileName, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8029,7 +9442,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesList(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8079,7 +9492,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesListViaIdentity(global::System.String viaIdentity, int? Top, string SkipToken, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8139,7 +9552,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesListViaIdentityWithResult(global::System.String viaIdentity, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8202,7 +9615,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task NspProfilesListWithResult(string subscriptionId, string resourceGroupName, string networkSecurityPerimeterName, int? Top, string SkipToken, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8391,7 +9804,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task PerimeterAssociableResourceTypesList(string subscriptionId, string location, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8433,7 +9846,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task PerimeterAssociableResourceTypesListViaIdentity(global::System.String viaIdentity, global::System.Func, global::System.Threading.Tasks.Task> onOk, global::System.Func, global::System.Threading.Tasks.Task> onDefault, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8484,7 +9897,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task PerimeterAssociableResourceTypesListViaIdentityWithResult(global::System.String viaIdentity, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { @@ -8537,7 +9950,7 @@ public partial class NetworkSecurityPerimeter /// public async global::System.Threading.Tasks.Task PerimeterAssociableResourceTypesListWithResult(string subscriptionId, string location, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener eventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.ISendAsync sender) { - var apiVersion = @"2023-07-01-preview"; + var apiVersion = @"2023-08-01-preview"; // Constant Parameters using( NoSynchronizationContext ) { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_Get.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_Get.cs index 7af8f2cb5054..fe343875befb 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_Get.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_Get.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP access rule by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAccessRule_Get : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -248,6 +248,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -421,6 +439,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentity.cs index bfb0f8163910..e7dfddf7e08c 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP access rule by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -175,6 +175,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -373,6 +391,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityNetworkSecurityPerimeter.cs index 9f9c125236a2..273d634de75c 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP access rule by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -205,6 +205,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -397,6 +415,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityProfile.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityProfile.cs index ec1344dfc03d..81ef42c75cbf 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityProfile.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityProfile.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP access rule by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAccessRule_GetViaIdentityProfile : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -386,6 +404,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_List.cs index 047343aef9ff..2b1b582d4bf3 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAccessRule_List.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Lists the NSP access rules in the specified NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAccessRule_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -273,6 +273,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -446,6 +464,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociableResourceType_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociableResourceType_List.cs index d22c1c751d4e..8eaea9e49010 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociableResourceType_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociableResourceType_List.cs @@ -20,7 +20,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IPerimeterAssociableResource))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the list of resources that are onboarded with NSP. These resources can be associated with a network security perimeter")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/providers/Microsoft.Network/locations/{location}/perimeterAssociableResourceTypes", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/providers/Microsoft.Network/locations/{location}/perimeterAssociableResourceTypes", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAssociableResourceType_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -211,6 +211,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -384,6 +402,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_Get.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_Get.cs index c9caeef6cb30..7d459f06668e 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_Get.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_Get.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP association by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAssociation_Get : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -233,6 +233,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -406,6 +424,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentity.cs index 6b8d8dbb5164..b18eee057825 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP association by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAssociation_GetViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -175,6 +175,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -369,6 +387,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentityNetworkSecurityPerimeter.cs index 3dc4a4913c7a..3d7c9042fe6b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_GetViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP association by name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAssociation_GetViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -382,6 +400,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_List.cs index 071bd9ed9965..ae2ceee66314 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterAssociation_List.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Lists the NSP resource associations.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterAssociation_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -258,6 +258,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -431,6 +449,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_Get.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_Get.cs index 3abab9ce2c81..03ec69d8d8b7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_Get.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_Get.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReference))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP linkReference resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLinkReference_Get : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -233,6 +233,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -406,6 +424,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentity.cs index 9bc096b072cf..cb672872fe72 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReference))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP linkReference resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -175,6 +175,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -369,6 +387,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentityNetworkSecurityPerimeter.cs index 4856f775466f..6d63715be3c3 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReference))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP linkReference resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLinkReference_GetViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -382,6 +400,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_List.cs index 7fb974e05537..5f6da5872ec1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLinkReference_List.cs @@ -20,7 +20,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLinkReference))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Lists the NSP LinkReference resources in the specified network security perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLinkReference_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -260,6 +260,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -433,6 +451,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_Get.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_Get.cs index a600a18a1431..fb95f161c962 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_Get.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_Get.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLink_Get : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -233,6 +233,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -406,6 +424,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentity.cs index 63addcf011e3..8f9b6992d0aa 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLink_GetViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -175,6 +175,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -369,6 +387,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentityNetworkSecurityPerimeter.cs index e7670958412d..47e4fbb03315 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_GetViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLink_GetViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -382,6 +400,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_List.cs index 1445dbc71578..c081eb9b9ffc 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterLink_List.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Lists the NSP Link resources in the specified network security perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterLink_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -258,6 +258,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -431,6 +449,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_Get.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_Get.cs index a36e5662618f..9db6ec8fca48 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_Get.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_Get.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterProfile_Get : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -233,6 +233,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -406,6 +424,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentity.cs index ac022a93c3dd..2f4ce42a9317 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterProfile_GetViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -175,6 +175,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -369,6 +387,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentityNetworkSecurityPerimeter.cs index 7b358c664c2c..e0e49f5ac158 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_GetViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterProfile_GetViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -382,6 +400,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_List.cs index 77b6270a8b5e..0916ff044d41 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeterProfile_List.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Lists the NSP profiles in the specified network security perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeterProfile_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -258,6 +258,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -431,6 +449,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_Get.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_Get.cs index 287933486d0c..27c5a931e6c2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_Get.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_Get.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified network security perimeter by the name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeter_Get : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -218,6 +218,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -391,6 +409,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_GetViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_GetViaIdentity.cs index c4583c623af5..e5c79368c227 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_GetViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_GetViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Gets the specified network security perimeter by the name.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeter_GetViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -175,6 +175,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -365,6 +383,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List.cs index 7567f8688d00..7e4eff0769d1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"List all network security perimeters in a subscription.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/providers/Microsoft.Network/networkSecurityPerimeters", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/providers/Microsoft.Network/networkSecurityPerimeters", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeter_List : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -229,6 +229,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -402,6 +420,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List1.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List1.cs index 520afbb945d8..d59f6d37b70a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List1.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/GetAzNetworkSecurityPerimeter_List1.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"List network security perimeters in a resource group.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters", ApiVersion = "2023-08-01-preview")] public partial class GetAzNetworkSecurityPerimeter_List1 : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -243,6 +243,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// @@ -416,6 +434,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_Post.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_Post.cs new file mode 100644 index 000000000000..7e3813026ed2 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_Post.cs @@ -0,0 +1,552 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_Post", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_Post : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private string _profileName; + + /// The name of the NSP profile. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP profile.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP profile.", + SerializedName = @"profileName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ProfileName { get => this._profileName; set => this._profileName = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_Post() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAccessRulesReconcilePost(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, ProfileName, AccessRuleName, Parameter, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,ProfileName=ProfileName,AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded.cs new file mode 100644 index 000000000000..272aee0b1895 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded.cs @@ -0,0 +1,542 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private string _profileName; + + /// The name of the NSP profile. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP profile.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP profile.", + SerializedName = @"profileName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ProfileName { get => this._profileName; set => this._profileName = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the + /// cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAccessRulesReconcilePost(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, ProfileName, AccessRuleName, _parametersBody, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,ProfileName=ProfileName,AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity.cs new file mode 100644 index 000000000000..5ce7fa7952a4 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity.cs @@ -0,0 +1,511 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _inputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity InputObject { get => this._inputObject; set => this._inputObject = value; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentity() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (InputObject?.Id != null) + { + await this.Client.NspAccessRulesReconcilePostViaIdentity(InputObject.Id, Parameter, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == InputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ProfileName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ProfileName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.AccessRuleName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.AccessRuleName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + await this.Client.NspAccessRulesReconcilePost(InputObject.SubscriptionId ?? null, InputObject.ResourceGroupName ?? null, InputObject.NetworkSecurityPerimeterName ?? null, InputObject.ProfileName ?? null, InputObject.AccessRuleName ?? null, Parameter, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded.cs new file mode 100644 index 000000000000..d9463c25065f --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded.cs @@ -0,0 +1,500 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _inputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity InputObject { get => this._inputObject; set => this._inputObject = value; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (InputObject?.Id != null) + { + await this.Client.NspAccessRulesReconcilePostViaIdentity(InputObject.Id, _parametersBody, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == InputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ProfileName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ProfileName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.AccessRuleName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.AccessRuleName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + await this.Client.NspAccessRulesReconcilePost(InputObject.SubscriptionId ?? null, InputObject.ResourceGroupName ?? null, InputObject.NetworkSecurityPerimeterName ?? null, InputObject.ProfileName ?? null, InputObject.AccessRuleName ?? null, _parametersBody, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter.cs new file mode 100644 index 000000000000..045e787211c2 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter.cs @@ -0,0 +1,532 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _networkSecurityPerimeterInputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity NetworkSecurityPerimeterInputObject { get => this._networkSecurityPerimeterInputObject; set => this._networkSecurityPerimeterInputObject = value; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private string _profileName; + + /// The name of the NSP profile. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP profile.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP profile.", + SerializedName = @"profileName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ProfileName { get => this._profileName; set => this._profileName = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeter() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (NetworkSecurityPerimeterInputObject?.Id != null) + { + this.NetworkSecurityPerimeterInputObject.Id += $"/profiles/{(global::System.Uri.EscapeDataString(this.ProfileName.ToString()))}/accessRules/{(global::System.Uri.EscapeDataString(this.AccessRuleName.ToString()))}"; + await this.Client.NspAccessRulesReconcilePostViaIdentity(NetworkSecurityPerimeterInputObject.Id, Parameter, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == NetworkSecurityPerimeterInputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + await this.Client.NspAccessRulesReconcilePost(NetworkSecurityPerimeterInputObject.SubscriptionId ?? null, NetworkSecurityPerimeterInputObject.ResourceGroupName ?? null, NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName ?? null, ProfileName, AccessRuleName, Parameter, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { ProfileName=ProfileName,AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs new file mode 100644 index 000000000000..370b346aec73 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs @@ -0,0 +1,521 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _networkSecurityPerimeterInputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity NetworkSecurityPerimeterInputObject { get => this._networkSecurityPerimeterInputObject; set => this._networkSecurityPerimeterInputObject = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private string _profileName; + + /// The name of the NSP profile. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP profile.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP profile.", + SerializedName = @"profileName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ProfileName { get => this._profileName; set => this._profileName = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (NetworkSecurityPerimeterInputObject?.Id != null) + { + this.NetworkSecurityPerimeterInputObject.Id += $"/profiles/{(global::System.Uri.EscapeDataString(this.ProfileName.ToString()))}/accessRules/{(global::System.Uri.EscapeDataString(this.AccessRuleName.ToString()))}"; + await this.Client.NspAccessRulesReconcilePostViaIdentity(NetworkSecurityPerimeterInputObject.Id, _parametersBody, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == NetworkSecurityPerimeterInputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + await this.Client.NspAccessRulesReconcilePost(NetworkSecurityPerimeterInputObject.SubscriptionId ?? null, NetworkSecurityPerimeterInputObject.ResourceGroupName ?? null, NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName ?? null, ProfileName, AccessRuleName, _parametersBody, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { ProfileName=ProfileName,AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile.cs new file mode 100644 index 000000000000..f18cb516252d --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile.cs @@ -0,0 +1,522 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _profileInputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity ProfileInputObject { get => this._profileInputObject; set => this._profileInputObject = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfile() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (ProfileInputObject?.Id != null) + { + this.ProfileInputObject.Id += $"/accessRules/{(global::System.Uri.EscapeDataString(this.AccessRuleName.ToString()))}"; + await this.Client.NspAccessRulesReconcilePostViaIdentity(ProfileInputObject.Id, Parameter, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == ProfileInputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + if (null == ProfileInputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + if (null == ProfileInputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + if (null == ProfileInputObject.ProfileName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.ProfileName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + await this.Client.NspAccessRulesReconcilePost(ProfileInputObject.SubscriptionId ?? null, ProfileInputObject.ResourceGroupName ?? null, ProfileInputObject.NetworkSecurityPerimeterName ?? null, ProfileInputObject.ProfileName ?? null, AccessRuleName, Parameter, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded.cs new file mode 100644 index 000000000000..9c237cf3d9e1 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded.cs @@ -0,0 +1,511 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _profileInputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity ProfileInputObject { get => this._profileInputObject; set => this._profileInputObject = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaIdentityProfileExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (ProfileInputObject?.Id != null) + { + this.ProfileInputObject.Id += $"/accessRules/{(global::System.Uri.EscapeDataString(this.AccessRuleName.ToString()))}"; + await this.Client.NspAccessRulesReconcilePostViaIdentity(ProfileInputObject.Id, _parametersBody, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == ProfileInputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + if (null == ProfileInputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + if (null == ProfileInputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + if (null == ProfileInputObject.ProfileName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("ProfileInputObject has null value for ProfileInputObject.ProfileName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, ProfileInputObject) ); + } + await this.Client.NspAccessRulesReconcilePost(ProfileInputObject.SubscriptionId ?? null, ProfileInputObject.ResourceGroupName ?? null, ProfileInputObject.NetworkSecurityPerimeterName ?? null, ProfileInputObject.ProfileName ?? null, AccessRuleName, _parametersBody, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath.cs new file mode 100644 index 000000000000..489e7e019053 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath.cs @@ -0,0 +1,555 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + public global::System.String _jsonString; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// Backing field for property. + private string _jsonFilePath; + + /// Path of Json file supplied to the Post operation + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Path of Json file supplied to the Post operation")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Path of Json file supplied to the Post operation", + SerializedName = @"JsonFilePath", + PossibleTypes = new [] { typeof(string) })] + public string JsonFilePath { get => this._jsonFilePath; set { if (!System.IO.File.Exists(value)) { throw new Exception("Cannot find File " + value); } this._jsonString = System.IO.File.ReadAllText(value); this._jsonFilePath = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private string _profileName; + + /// The name of the NSP profile. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP profile.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP profile.", + SerializedName = @"profileName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ProfileName { get => this._profileName; set => this._profileName = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonFilePath() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAccessRulesReconcilePostViaJsonString(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, ProfileName, AccessRuleName, _jsonString, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,ProfileName=ProfileName,AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString.cs new file mode 100644 index 000000000000..828d1106e857 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString.cs @@ -0,0 +1,553 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP access rules + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP access rules")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}/reconcile", ApiVersion = "2023-08-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] + public partial class InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _accessRuleName; + + /// The name of the NSP access rule. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP access rule.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP access rule.", + SerializedName = @"accessRuleName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AccessRuleName { get => this._accessRuleName; set => this._accessRuleName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// Backing field for property. + private string _jsonString; + + /// Json string supplied to the Post operation + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Json string supplied to the Post operation")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Json string supplied to the Post operation", + SerializedName = @"JsonString", + PossibleTypes = new [] { typeof(string) })] + public string JsonString { get => this._jsonString; set => this._jsonString = value; } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// Backing field for property. + private string _profileName; + + /// The name of the NSP profile. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP profile.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP profile.", + SerializedName = @"profileName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ProfileName { get => this._profileName; set => this._profileName = value; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAccessRulesReconcile_PostViaJsonString() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAccessRulesReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAccessRulesReconcilePostViaJsonString(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, ProfileName, AccessRuleName, _jsonString, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,ProfileName=ProfileName,AccessRuleName=AccessRuleName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_Post.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_Post.cs new file mode 100644 index 000000000000..c4abe75d9c6f --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_Post.cs @@ -0,0 +1,538 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_Post", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_Post : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _associationName; + + /// The name of the NSP association. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP association.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP association.", + SerializedName = @"associationName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AssociationName { get => this._associationName; set => this._associationName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_Post() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAssociationReconcilePost(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, AssociationName, Parameter, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,AssociationName=AssociationName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded.cs new file mode 100644 index 000000000000..538cf8f6816e --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded.cs @@ -0,0 +1,528 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _associationName; + + /// The name of the NSP association. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP association.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP association.", + SerializedName = @"associationName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AssociationName { get => this._associationName; set => this._associationName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the + /// cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAssociationReconcilePost(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, AssociationName, _parametersBody, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,AssociationName=AssociationName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity.cs new file mode 100644 index 000000000000..bec28a4cbb8d --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity.cs @@ -0,0 +1,507 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _inputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity InputObject { get => this._inputObject; set => this._inputObject = value; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentity() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (InputObject?.Id != null) + { + await this.Client.NspAssociationReconcilePostViaIdentity(InputObject.Id, Parameter, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == InputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.AssociationName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.AssociationName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + await this.Client.NspAssociationReconcilePost(InputObject.SubscriptionId ?? null, InputObject.ResourceGroupName ?? null, InputObject.NetworkSecurityPerimeterName ?? null, InputObject.AssociationName ?? null, Parameter, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded.cs new file mode 100644 index 000000000000..b2c6fd665571 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded.cs @@ -0,0 +1,496 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _inputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity InputObject { get => this._inputObject; set => this._inputObject = value; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (InputObject?.Id != null) + { + await this.Client.NspAssociationReconcilePostViaIdentity(InputObject.Id, _parametersBody, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == InputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.AssociationName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.AssociationName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + await this.Client.NspAssociationReconcilePost(InputObject.SubscriptionId ?? null, InputObject.ResourceGroupName ?? null, InputObject.NetworkSecurityPerimeterName ?? null, InputObject.AssociationName ?? null, _parametersBody, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter.cs new file mode 100644 index 000000000000..c1e975590872 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter.cs @@ -0,0 +1,518 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _associationName; + + /// The name of the NSP association. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP association.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP association.", + SerializedName = @"associationName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AssociationName { get => this._associationName; set => this._associationName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _networkSecurityPerimeterInputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity NetworkSecurityPerimeterInputObject { get => this._networkSecurityPerimeterInputObject; set => this._networkSecurityPerimeterInputObject = value; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parameter; + + /// Anything + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Anything", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Anything", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeter() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (NetworkSecurityPerimeterInputObject?.Id != null) + { + this.NetworkSecurityPerimeterInputObject.Id += $"/resourceAssociations/{(global::System.Uri.EscapeDataString(this.AssociationName.ToString()))}"; + await this.Client.NspAssociationReconcilePostViaIdentity(NetworkSecurityPerimeterInputObject.Id, Parameter, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == NetworkSecurityPerimeterInputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + await this.Client.NspAssociationReconcilePost(NetworkSecurityPerimeterInputObject.SubscriptionId ?? null, NetworkSecurityPerimeterInputObject.ResourceGroupName ?? null, NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName ?? null, AssociationName, Parameter, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { AssociationName=AssociationName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs new file mode 100644 index 000000000000..532d3edb6f17 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded.cs @@ -0,0 +1,507 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Anything + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.Any(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _associationName; + + /// The name of the NSP association. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP association.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP association.", + SerializedName = @"associationName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AssociationName { get => this._associationName; set => this._associationName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _networkSecurityPerimeterInputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity NetworkSecurityPerimeterInputObject { get => this._networkSecurityPerimeterInputObject; set => this._networkSecurityPerimeterInputObject = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaIdentityNetworkSecurityPerimeterExpanded() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (NetworkSecurityPerimeterInputObject?.Id != null) + { + this.NetworkSecurityPerimeterInputObject.Id += $"/resourceAssociations/{(global::System.Uri.EscapeDataString(this.AssociationName.ToString()))}"; + await this.Client.NspAssociationReconcilePostViaIdentity(NetworkSecurityPerimeterInputObject.Id, _parametersBody, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == NetworkSecurityPerimeterInputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + if (null == NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("NetworkSecurityPerimeterInputObject has null value for NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, NetworkSecurityPerimeterInputObject) ); + } + await this.Client.NspAssociationReconcilePost(NetworkSecurityPerimeterInputObject.SubscriptionId ?? null, NetworkSecurityPerimeterInputObject.ResourceGroupName ?? null, NetworkSecurityPerimeterInputObject.NetworkSecurityPerimeterName ?? null, AssociationName, _parametersBody, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { AssociationName=AssociationName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath.cs new file mode 100644 index 000000000000..87e9fd022573 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath.cs @@ -0,0 +1,541 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + public global::System.String _jsonString; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _associationName; + + /// The name of the NSP association. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP association.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP association.", + SerializedName = @"associationName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AssociationName { get => this._associationName; set => this._associationName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// Backing field for property. + private string _jsonFilePath; + + /// Path of Json file supplied to the Post operation + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Path of Json file supplied to the Post operation")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Path of Json file supplied to the Post operation", + SerializedName = @"JsonFilePath", + PossibleTypes = new [] { typeof(string) })] + public string JsonFilePath { get => this._jsonFilePath; set { if (!System.IO.File.Exists(value)) { throw new Exception("Cannot find File " + value); } this._jsonString = System.IO.File.ReadAllText(value); this._jsonFilePath = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonFilePath() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAssociationReconcilePostViaJsonString(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, AssociationName, _jsonString, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,AssociationName=AssociationName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString.cs new file mode 100644 index 000000000000..5b1597f8fe42 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString.cs @@ -0,0 +1,539 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Reconcile NSP association + /// + /// [OpenAPI] Post=>POST:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsLifecycle.Invoke, @"AzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Reconcile NSP association")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}/reconcile", ApiVersion = "2023-08-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] + public partial class InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Backing field for property. + private string _associationName; + + /// The name of the NSP association. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the NSP association.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the NSP association.", + SerializedName = @"associationName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string AssociationName { get => this._associationName; set => this._associationName = value; } + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// Backing field for property. + private string _jsonString; + + /// Json string supplied to the Post operation + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Json string supplied to the Post operation")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Json string supplied to the Post operation", + SerializedName = @"JsonString", + PossibleTypes = new [] { typeof(string) })] + public string JsonString { get => this._jsonString; set => this._jsonString = value; } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _networkSecurityPerimeterName; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string NetworkSecurityPerimeterName { get => this._networkSecurityPerimeterName; set => this._networkSecurityPerimeterName = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public InvokeAzNetworkSecurityPerimeterNspAssociationReconcile_PostViaJsonString() + { + + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NspAssociationReconcilePost' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NspAssociationReconcilePostViaJsonString(SubscriptionId, ResourceGroupName, NetworkSecurityPerimeterName, AssociationName, _jsonString, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,NetworkSecurityPerimeterName=NetworkSecurityPerimeterName,AssociationName=AssociationName}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_Create.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_Create.cs index fddaab19d7e3..ad1e672a2765 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_Create.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_Create.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_Create : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -274,6 +274,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -447,6 +465,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateExpanded.cs index 03a2fd910acf..61c85553326a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -262,6 +262,18 @@ public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateExpanded : gl [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] public string SecurityPerimeterName { get => this._securityPerimeterName; set => this._securityPerimeterName = value; } + /// Inbound rules service tag names. + [global::System.Management.Automation.AllowEmptyCollection] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Inbound rules service tag names.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Description = @"Inbound rules service tag names.", + SerializedName = @"serviceTags", + PossibleTypes = new [] { typeof(string) })] + public string[] ServiceTag { get => _parametersBody.ServiceTag?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.ServiceTag = (value != null ? new System.Collections.Generic.List(value) : null); } + /// List of subscription ids [global::System.Management.Automation.AllowEmptyCollection] [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "List of subscription ids")] @@ -370,6 +382,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -543,6 +573,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentity.cs index 44e791e709ef..d68c1e5f4e11 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentity.cs @@ -19,7 +19,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -202,6 +202,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -403,6 +421,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityExpanded.cs index 55fcfc1ec98e..9962c11057eb 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -211,6 +211,18 @@ public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityEx [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + /// Inbound rules service tag names. + [global::System.Management.Automation.AllowEmptyCollection] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Inbound rules service tag names.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Description = @"Inbound rules service tag names.", + SerializedName = @"serviceTags", + PossibleTypes = new [] { typeof(string) })] + public string[] ServiceTag { get => _parametersBody.ServiceTag?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.ServiceTag = (value != null ? new System.Collections.Generic.List(value) : null); } + /// List of subscription ids [global::System.Management.Automation.AllowEmptyCollection] [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "List of subscription ids")] @@ -297,6 +309,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -499,6 +529,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeter.cs index 516bc7a32240..e309a4245ef4 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -231,6 +231,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -426,6 +444,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs index 082f94742f55..86481e1341c3 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNetworkSecurityPerimeterExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -241,6 +241,18 @@ public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityNe [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + /// Inbound rules service tag names. + [global::System.Management.Automation.AllowEmptyCollection] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Inbound rules service tag names.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Description = @"Inbound rules service tag names.", + SerializedName = @"serviceTags", + PossibleTypes = new [] { typeof(string) })] + public string[] ServiceTag { get => _parametersBody.ServiceTag?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.ServiceTag = (value != null ? new System.Collections.Generic.List(value) : null); } + /// List of subscription ids [global::System.Management.Automation.AllowEmptyCollection] [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "List of subscription ids")] @@ -327,6 +339,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -522,6 +552,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfile.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfile.cs index fde1dcac6739..934e2de6b00f 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfile.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfile.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfile : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -216,6 +216,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -415,6 +433,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfileExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfileExpanded.cs index 75691d815359..15a9e4e25322 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfileExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfileExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityProfileExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -226,6 +226,18 @@ public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaIdentityPr [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + /// Inbound rules service tag names. + [global::System.Management.Automation.AllowEmptyCollection] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Inbound rules service tag names.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Description = @"Inbound rules service tag names.", + SerializedName = @"serviceTags", + PossibleTypes = new [] { typeof(string) })] + public string[] ServiceTag { get => _parametersBody.ServiceTag?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.ServiceTag = (value != null ? new System.Collections.Generic.List(value) : null); } + /// List of subscription ids [global::System.Management.Automation.AllowEmptyCollection] [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "List of subscription ids")] @@ -312,6 +324,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -511,6 +541,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonFilePath.cs index d6dbfab1bdc3..a34c2252c925 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonFilePath.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonFilePath.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonFilePath : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -276,6 +276,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -450,6 +468,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonString.cs index d2b3c19babd8..e564ba454930 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonString.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonString.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterAccessRule_CreateViaJsonString : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -274,6 +274,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -447,6 +465,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_Create.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_Create.cs index 36aff23cea1f..8f3006383c4a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_Create.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_Create.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAssociation_Create : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -432,6 +450,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateExpanded.cs index f6f2a9f67e04..f9f729c96f1b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -317,6 +317,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -490,6 +508,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentity.cs index 7194ff602940..e8ea5a45d628 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentity.cs @@ -19,7 +19,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -202,6 +202,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -399,6 +417,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityExpanded.cs index dfe212b349dd..576ef806b2c7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -457,6 +475,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeter.cs index bfe476493aa1..7c3082c69fc8 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -216,6 +216,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -411,6 +429,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs index 0fa0f2e7dbb1..ed7944613a06 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateViaIdentityNetworkSecurityPerimeterExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -274,6 +274,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -469,6 +487,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonFilePath.cs index 9bfbad215ec2..30773b528bcc 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonFilePath.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonFilePath.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonFilePath : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -261,6 +261,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -435,6 +453,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonString.cs index db151e4a28d8..c945981e6b67 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonString.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonString.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a NSP resource association.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterAssociation_CreateViaJsonString : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -432,6 +450,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_Create.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_Create.cs index ea5a2b602a70..87fc7582c8e6 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_Create.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_Create.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterLink_Create : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -432,6 +450,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateExpanded.cs index aef250870c7a..31d023dc3abc 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterLink_CreateExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -120,16 +120,15 @@ public partial class NewAzNetworkSecurityPerimeterLink_CreateExpanded : global:: public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [global::System.Management.Automation.AllowEmptyCollection] - [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].")] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, ReadOnly = false, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] public string[] LocalInboundProfile { get => _parametersBody.LocalInboundProfile?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.LocalInboundProfile = (value != null ? new System.Collections.Generic.List(value) : null); } @@ -180,15 +179,15 @@ public partial class NewAzNetworkSecurityPerimeterLink_CreateExpanded : global:: /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [global::System.Management.Automation.AllowEmptyCollection] - [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].")] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, ReadOnly = false, - Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].", + Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] public string[] RemoteInboundProfile { get => _parametersBody.RemoteInboundProfile?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.RemoteInboundProfile = (value != null ? new System.Collections.Generic.List(value) : null); } @@ -306,6 +305,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -479,6 +496,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentity.cs index 017d1a77841c..54ed194e9ab1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentity.cs @@ -19,7 +19,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -202,6 +202,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -399,6 +417,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded.cs index 0de1fb050ff1..db229c0dee41 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -128,16 +128,15 @@ public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [global::System.Management.Automation.AllowEmptyCollection] - [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].")] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, ReadOnly = false, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] public string[] LocalInboundProfile { get => _parametersBody.LocalInboundProfile?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.LocalInboundProfile = (value != null ? new System.Collections.Generic.List(value) : null); } @@ -173,15 +172,15 @@ public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityExpanded /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [global::System.Management.Automation.AllowEmptyCollection] - [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].")] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, ReadOnly = false, - Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].", + Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] public string[] RemoteInboundProfile { get => _parametersBody.RemoteInboundProfile?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.RemoteInboundProfile = (value != null ? new System.Collections.Generic.List(value) : null); } @@ -248,6 +247,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -445,6 +462,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeter.cs index ca0b3dde4229..d65a20001ef6 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -216,6 +216,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -411,6 +429,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs index c2b0d9ea6f34..8d9f142f65ce 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkSecurityPerimeterExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -120,16 +120,15 @@ public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkS public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } /// - /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value - /// is ['*']. + /// Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. /// [global::System.Management.Automation.AllowEmptyCollection] - [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].")] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, ReadOnly = false, - Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*'].", + Description = @"Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles.", SerializedName = @"localInboundProfiles", PossibleTypes = new [] { typeof(string) })] public string[] LocalInboundProfile { get => _parametersBody.LocalInboundProfile?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.LocalInboundProfile = (value != null ? new System.Collections.Generic.List(value) : null); } @@ -188,15 +187,15 @@ public partial class NewAzNetworkSecurityPerimeterLink_CreateViaIdentityNetworkS /// /// Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can - /// only be updated in auto-approval mode. It's default value is ['*']. + /// only be updated in auto-approval mode. /// [global::System.Management.Automation.AllowEmptyCollection] - [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].")] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( Required = false, ReadOnly = false, - Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*'].", + Description = @"Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode.", SerializedName = @"remoteInboundProfiles", PossibleTypes = new [] { typeof(string) })] public string[] RemoteInboundProfile { get => _parametersBody.RemoteInboundProfile?.ToArray() ?? null /* fixedArrayOf */; set => _parametersBody.RemoteInboundProfile = (value != null ? new System.Collections.Generic.List(value) : null); } @@ -263,6 +262,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -458,6 +475,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonFilePath.cs index d077b48fd011..7733748e451b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonFilePath.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonFilePath.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterLink_CreateViaJsonFilePath : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -261,6 +261,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -434,6 +452,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonString.cs index e718be262db3..1b52098128b2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonString.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterLink_CreateViaJsonString.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create NSP link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterLink_CreateViaJsonString : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -432,6 +450,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_Create.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_Create.cs index 7df21fece634..ced934f3bc6b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_Create.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_Create.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterProfile_Create : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -432,6 +450,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateExpanded.cs index bfd626ff0797..cf70b888bc44 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterProfile_CreateExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -283,6 +283,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -456,6 +474,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentity.cs index c2fcd6fe920f..baa90f810860 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentity.cs @@ -19,7 +19,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterProfile_CreateViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -202,6 +202,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -399,6 +417,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityExpanded.cs index ea6c7dec9b55..8b44ef91372f 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -225,6 +225,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -423,6 +441,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeter.cs index 152092373435..766337606c8f 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -216,6 +216,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -411,6 +429,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs index 21fa744092a6..f410bc7e06fb 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeterExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeterProfile_CreateViaIdentityNetworkSecurityPerimeterExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -240,6 +240,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -435,6 +453,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonFilePath.cs index 9123cacb2277..8ed9c2f43891 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonFilePath.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonFilePath.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterProfile_CreateViaJsonFilePath : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -261,6 +261,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -434,6 +452,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonString.cs index c9c1bb804a0a..55b98680a812 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonString.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeterProfile_CreateViaJsonString.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a network profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeterProfile_CreateViaJsonString : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -259,6 +259,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -432,6 +450,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_Create.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_Create.cs index 96b83e8d14a8..bf6be9e814f2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_Create.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_Create.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a Network Security Perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeter_Create : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -244,6 +244,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -417,6 +435,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateExpanded.cs index e7a14eac8dc5..da64da737d3a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a Network Security Perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeter_CreateExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -268,6 +268,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -441,6 +459,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentity.cs index fea3447f17e4..4eba69ce26a7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentity.cs @@ -19,7 +19,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a Network Security Perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeter_CreateViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -202,6 +202,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -395,6 +413,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentityExpanded.cs index 47dacb4bb293..d1d746ebd37b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentityExpanded.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaIdentityExpanded.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a Network Security Perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class NewAzNetworkSecurityPerimeter_CreateViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -225,6 +225,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -418,6 +436,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonFilePath.cs index 825911be1449..942dc65ef987 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonFilePath.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonFilePath.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a Network Security Perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeter_CreateViaJsonFilePath : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -246,6 +246,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -419,6 +437,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonString.cs index 52a6cabc8d49..d4201334e669 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonString.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/NewAzNetworkSecurityPerimeter_CreateViaJsonString.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Create a Network Security Perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] public partial class NewAzNetworkSecurityPerimeter_CreateViaJsonString : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, @@ -244,6 +244,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -417,6 +435,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// a delegate that is called when the remote service returns 201 (Created). /// the raw response message as an global::System.Net.Http.HttpResponseMessage. /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_Delete.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_Delete.cs index e44237268e94..2dabb58accda 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_Delete.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_Delete.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAccessRule_Delete : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -263,6 +263,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -436,6 +454,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentity.cs index 76cebd994956..3f23c0572079 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -391,6 +409,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityNetworkSecurityPerimeter.cs index fc5efb1a1d02..20cf2879d8d1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -220,6 +220,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -415,6 +433,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile.cs index 641c59db2cb9..4c3c44686077 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP access rule.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}/accessRules/{accessRuleName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAccessRule_DeleteViaIdentityProfile : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -205,6 +205,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -404,6 +422,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_Delete.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_Delete.cs index ff204f7afcd0..6eba5d47b008 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_Delete.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_Delete.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP association resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAssociation_Delete : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -285,6 +285,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -504,6 +522,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentity.cs index ec0276fd061f..32843604b746 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP association resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -225,6 +225,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -469,6 +487,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter.cs index 2a177c474ec6..9f87079f8d30 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP association resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/resourceAssociations/{associationName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterAssociation_DeleteViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -241,6 +241,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -482,6 +500,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_Delete.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_Delete.cs index c0e79c9cc305..7cbf94e600e4 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_Delete.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_Delete.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP LinkReference resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterLinkReference_Delete : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -285,6 +285,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -504,6 +522,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentity.cs index 6fa26b693bc1..ee1455df7930 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP LinkReference resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -225,6 +225,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -469,6 +487,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter.cs index a97ac2d499f2..3df848893288 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP LinkReference resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/linkReferences/{linkReferenceName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterLinkReference_DeleteViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -241,6 +241,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -482,6 +500,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_Delete.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_Delete.cs index 41fc92b6ac27..e797906aa43e 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_Delete.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_Delete.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP Link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterLink_Delete : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -285,6 +285,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -504,6 +522,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentity.cs index 3122b1a9600d..8e554db0e452 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP Link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -223,6 +223,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -466,6 +484,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter.cs index 8d6bc1737895..314860cb2144 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP Link resource.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/links/{linkName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterLink_DeleteViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -241,6 +241,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -482,6 +500,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_Delete.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_Delete.cs index 8aab414b6190..377a161601ae 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_Delete.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_Delete.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterProfile_Delete : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -248,6 +248,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -421,6 +439,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentity.cs index 640f2ab8ebff..18f536bdecf1 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -387,6 +405,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter.cs index 6c0dd16207e9..cb79067f8010 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes an NSP profile.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}/profiles/{profileName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeterProfile_DeleteViaIdentityNetworkSecurityPerimeter : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -205,6 +205,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -400,6 +418,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_Delete.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_Delete.cs index 17ac2b68c4d6..f86c644645c5 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_Delete.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_Delete.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes a network security perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeter_Delete : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -233,6 +233,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -406,6 +424,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_DeleteViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_DeleteViaIdentity.cs index baa3e508547e..f9c39f1d2096 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_DeleteViaIdentity.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/RemoveAzNetworkSecurityPerimeter_DeleteViaIdentity.cs @@ -18,7 +18,7 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets [global::System.Management.Automation.OutputType(typeof(bool))] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Deletes a network security perimeter.")] [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] - [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-07-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] public partial class RemoveAzNetworkSecurityPerimeter_DeleteViaIdentity : global::System.Management.Automation.PSCmdlet, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext @@ -190,6 +190,24 @@ protected override void EndProcessing() // Flush buffer WriteObject(_firstResponse); } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } } /// Handles/Dispatches events during the call to the REST service. @@ -383,6 +401,21 @@ protected override void StopProcessing() base.StopProcessing(); } + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + /// /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). /// diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_Patch.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_Patch.cs new file mode 100644 index 000000000000..e13873b540d0 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_Patch.cs @@ -0,0 +1,525 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Patch Tags for a Network Security Perimeter. + /// + /// [OpenAPI] Patch=>PATCH:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsData.Update, @"AzNetworkSecurityPerimeter_Patch", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Patch Tags for a Network Security Perimeter.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] + public partial class UpdateAzNetworkSecurityPerimeter_Patch : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _name; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::System.Management.Automation.Alias("NetworkSecurityPerimeterName", "SecurityPerimeterName", "NSPName")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string Name { get => this._name; set => this._name = value; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest _parameter; + + /// Update tags request. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Update tags request.", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Update tags request.", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NetworkSecurityPerimetersPatch' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NetworkSecurityPerimetersPatch(SubscriptionId, ResourceGroupName, Name, Parameter, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,Name=Name}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public UpdateAzNetworkSecurityPerimeter_Patch() + { + + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchExpanded.cs new file mode 100644 index 000000000000..14094d34730a --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchExpanded.cs @@ -0,0 +1,526 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Patch Tags for a Network Security Perimeter. + /// + /// [OpenAPI] Patch=>PATCH:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsData.Update, @"AzNetworkSecurityPerimeter_PatchExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Patch Tags for a Network Security Perimeter.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] + public partial class UpdateAzNetworkSecurityPerimeter_PatchExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Update tags request. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.UpdateTagsRequest(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _name; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::System.Management.Automation.Alias("NetworkSecurityPerimeterName", "SecurityPerimeterName", "NSPName")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string Name { get => this._name; set => this._name = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// List of tags for Network Security Perimeter + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ExportAs(typeof(global::System.Collections.Hashtable))] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "List of tags for Network Security Perimeter")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Description = @"List of tags for Network Security Perimeter", + SerializedName = @"tags", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequestTags) })] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequestTags Tag { get => _parametersBody.Tag ?? null /* object */; set => _parametersBody.Tag = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NetworkSecurityPerimetersPatch' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NetworkSecurityPerimetersPatch(SubscriptionId, ResourceGroupName, Name, _parametersBody, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,Name=Name}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public UpdateAzNetworkSecurityPerimeter_PatchExpanded() + { + + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentity.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentity.cs new file mode 100644 index 000000000000..bbaa630e384e --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentity.cs @@ -0,0 +1,502 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Patch Tags for a Network Security Perimeter. + /// + /// [OpenAPI] Patch=>PATCH:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsData.Update, @"AzNetworkSecurityPerimeter_PatchViaIdentity", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Patch Tags for a Network Security Perimeter.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] + public partial class UpdateAzNetworkSecurityPerimeter_PatchViaIdentity : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _inputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity InputObject { get => this._inputObject; set => this._inputObject = value; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest _parameter; + + /// Update tags request. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Update tags request.", ValueFromPipeline = true)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Update tags request.", + SerializedName = @"parameters", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest Parameter { get => this._parameter; set => this._parameter = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NetworkSecurityPerimetersPatch' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (InputObject?.Id != null) + { + await this.Client.NetworkSecurityPerimetersPatchViaIdentity(InputObject.Id, Parameter, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == InputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + await this.Client.NetworkSecurityPerimetersPatch(InputObject.SubscriptionId ?? null, InputObject.ResourceGroupName ?? null, InputObject.NetworkSecurityPerimeterName ?? null, Parameter, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public UpdateAzNetworkSecurityPerimeter_PatchViaIdentity() + { + + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentityExpanded.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentityExpanded.cs new file mode 100644 index 000000000000..063af74c14c3 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaIdentityExpanded.cs @@ -0,0 +1,503 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Patch Tags for a Network Security Perimeter. + /// + /// [OpenAPI] Patch=>PATCH:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsData.Update, @"AzNetworkSecurityPerimeter_PatchViaIdentityExpanded", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Patch Tags for a Network Security Perimeter.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] + public partial class UpdateAzNetworkSecurityPerimeter_PatchViaIdentityExpanded : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// Update tags request. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest _parametersBody = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.UpdateTagsRequest(); + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Backing field for property. + private Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity _inputObject; + + /// Identity Parameter + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Identity Parameter", ValueFromPipeline = true)] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity InputObject { get => this._inputObject; set => this._inputObject = value; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// List of tags for Network Security Perimeter + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ExportAs(typeof(global::System.Collections.Hashtable))] + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "List of tags for Network Security Perimeter")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Body)] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = false, + ReadOnly = false, + Description = @"List of tags for Network Security Perimeter", + SerializedName = @"tags", + PossibleTypes = new [] { typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequestTags) })] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequestTags Tag { get => _parametersBody.Tag ?? null /* object */; set => _parametersBody.Tag = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NetworkSecurityPerimetersPatch' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + if (InputObject?.Id != null) + { + await this.Client.NetworkSecurityPerimetersPatchViaIdentity(InputObject.Id, _parametersBody, onOk, onDefault, this, Pipeline); + } + else + { + // try to call with PATH parameters from Input Object + if (null == InputObject.SubscriptionId) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.SubscriptionId"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.ResourceGroupName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.ResourceGroupName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + if (null == InputObject.NetworkSecurityPerimeterName) + { + ThrowTerminatingError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception("InputObject has null value for InputObject.NetworkSecurityPerimeterName"),string.Empty, global::System.Management.Automation.ErrorCategory.InvalidArgument, InputObject) ); + } + await this.Client.NetworkSecurityPerimetersPatch(InputObject.SubscriptionId ?? null, InputObject.ResourceGroupName ?? null, InputObject.NetworkSecurityPerimeterName ?? null, _parametersBody, onOk, onDefault, this, Pipeline); + } + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public UpdateAzNetworkSecurityPerimeter_PatchViaIdentityExpanded() + { + + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonFilePath.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonFilePath.cs new file mode 100644 index 000000000000..f30b63f1b993 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonFilePath.cs @@ -0,0 +1,527 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Patch Tags for a Network Security Perimeter. + /// + /// [OpenAPI] Patch=>PATCH:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsData.Update, @"AzNetworkSecurityPerimeter_PatchViaJsonFilePath", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Patch Tags for a Network Security Perimeter.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] + public partial class UpdateAzNetworkSecurityPerimeter_PatchViaJsonFilePath : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + public global::System.String _jsonString; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// Backing field for property. + private string _jsonFilePath; + + /// Path of Json file supplied to the Patch operation + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Path of Json file supplied to the Patch operation")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Path of Json file supplied to the Patch operation", + SerializedName = @"JsonFilePath", + PossibleTypes = new [] { typeof(string) })] + public string JsonFilePath { get => this._jsonFilePath; set { if (!System.IO.File.Exists(value)) { throw new Exception("Cannot find File " + value); } this._jsonString = System.IO.File.ReadAllText(value); this._jsonFilePath = value; } } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _name; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::System.Management.Automation.Alias("NetworkSecurityPerimeterName", "SecurityPerimeterName", "NSPName")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string Name { get => this._name; set => this._name = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NetworkSecurityPerimetersPatch' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NetworkSecurityPerimetersPatchViaJsonString(SubscriptionId, ResourceGroupName, Name, _jsonString, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,Name=Name}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public UpdateAzNetworkSecurityPerimeter_PatchViaJsonFilePath() + { + + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonString.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonString.cs new file mode 100644 index 000000000000..6daa0d480a01 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/cmdlets/UpdateAzNetworkSecurityPerimeter_PatchViaJsonString.cs @@ -0,0 +1,525 @@ +// Copyright (c) Microsoft Corporation. All rights reserved. +// Licensed under the MIT License. See License.txt in the project root for license information. +// Code generated by Microsoft (R) AutoRest Code Generator. +// Changes may cause incorrect behavior and will be lost if the code is regenerated. + +namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Cmdlets +{ + using static Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Extensions; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell; + using Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Cmdlets; + using System; + + /// Patch Tags for a Network Security Perimeter. + /// + /// [OpenAPI] Patch=>PATCH:"/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}" + /// + [global::System.Management.Automation.Cmdlet(global::System.Management.Automation.VerbsData.Update, @"AzNetworkSecurityPerimeter_PatchViaJsonString", SupportsShouldProcess = true)] + [global::System.Management.Automation.OutputType(typeof(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter))] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Description(@"Patch Tags for a Network Security Perimeter.")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Generated] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.HttpPath(Path = "/subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.Network/networkSecurityPerimeters/{networkSecurityPerimeterName}", ApiVersion = "2023-08-01-preview")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NotSuggestDefaultParameterSet] + public partial class UpdateAzNetworkSecurityPerimeter_PatchViaJsonString : global::System.Management.Automation.PSCmdlet, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener, + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IContext + { + /// A unique id generatd for the this cmdlet when it is instantiated. + private string __correlationId = System.Guid.NewGuid().ToString(); + + /// A copy of the Invocation Info (necessary to allow asJob to clone this cmdlet) + private global::System.Management.Automation.InvocationInfo __invocationInfo; + + /// A unique id generatd for the this cmdlet when ProcessRecord() is called. + private string __processRecordId; + + /// + /// The for this operation. + /// + private global::System.Threading.CancellationTokenSource _cancellationTokenSource = new global::System.Threading.CancellationTokenSource(); + + /// A dictionary to carry over additional data for pipeline. + private global::System.Collections.Generic.Dictionary _extensibleParameters = new System.Collections.Generic.Dictionary(); + + /// A buffer to record first returned object in response. + private object _firstResponse = null; + + /// + /// A flag to tell whether it is the first returned object in a call. Zero means no response yet. One means 1 returned object. + /// Two means multiple returned objects in response. + /// + private int _responseSize = 0; + + /// Wait for .NET debugger to attach + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Wait for .NET debugger to attach")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter Break { get; set; } + + /// Accessor for cancellationTokenSource. + public global::System.Threading.CancellationTokenSource CancellationTokenSource { get => _cancellationTokenSource ; set { _cancellationTokenSource = value; } } + + /// The reference to the client API class. + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.NetworkSecurityPerimeter Client => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.ClientAPI; + + /// + /// The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet + /// against a different subscription + /// + [global::System.Management.Automation.Parameter(Mandatory = false, HelpMessage = "The DefaultProfile parameter is not functional. Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription.")] + [global::System.Management.Automation.ValidateNotNull] + [global::System.Management.Automation.Alias("AzureRMContext", "AzureCredential")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Azure)] + public global::System.Management.Automation.PSObject DefaultProfile { get; set; } + + /// Accessor for extensibleParameters. + public global::System.Collections.Generic.IDictionary ExtensibleParameters { get => _extensibleParameters ; } + + /// SendAsync Pipeline Steps to be appended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be appended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelineAppend { get; set; } + + /// SendAsync Pipeline Steps to be prepended to the front of the pipeline + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "SendAsync Pipeline Steps to be prepended to the front of the pipeline")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.SendAsyncStep[] HttpPipelinePrepend { get; set; } + + /// Accessor for our copy of the InvocationInfo. + public global::System.Management.Automation.InvocationInfo InvocationInformation { get => __invocationInfo = __invocationInfo ?? this.MyInvocation ; set { __invocationInfo = value; } } + + /// Backing field for property. + private string _jsonString; + + /// Json string supplied to the Patch operation + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "Json string supplied to the Patch operation")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"Json string supplied to the Patch operation", + SerializedName = @"JsonString", + PossibleTypes = new [] { typeof(string) })] + public string JsonString { get => this._jsonString; set => this._jsonString = value; } + + /// + /// cancellation delegate. Stops the cmdlet when called. + /// + global::System.Action Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Cancel => _cancellationTokenSource.Cancel; + + /// cancellation token. + global::System.Threading.CancellationToken Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Token => _cancellationTokenSource.Token; + + /// Backing field for property. + private string _name; + + /// The name of the network security perimeter. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the network security perimeter.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the network security perimeter.", + SerializedName = @"networkSecurityPerimeterName", + PossibleTypes = new [] { typeof(string) })] + [global::System.Management.Automation.Alias("NetworkSecurityPerimeterName", "SecurityPerimeterName", "NSPName")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string Name { get => this._name; set => this._name = value; } + + /// + /// The instance of the that the remote call will use. + /// + public Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.HttpPipeline Pipeline { get; set; } + + /// The URI for the proxy server to use + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "The URI for the proxy server to use")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Uri Proxy { get; set; } + + /// Credentials for a proxy server to use for the remote call + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Credentials for a proxy server to use for the remote call")] + [global::System.Management.Automation.ValidateNotNull] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.PSCredential ProxyCredential { get; set; } + + /// Use the default credentials for the proxy + [global::System.Management.Automation.Parameter(Mandatory = false, DontShow = true, HelpMessage = "Use the default credentials for the proxy")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Runtime)] + public global::System.Management.Automation.SwitchParameter ProxyUseDefaultCredentials { get; set; } + + /// Backing field for property. + private string _resourceGroupName; + + /// The name of the resource group. + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The name of the resource group.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The name of the resource group.", + SerializedName = @"resourceGroupName", + PossibleTypes = new [] { typeof(string) })] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string ResourceGroupName { get => this._resourceGroupName; set => this._resourceGroupName = value; } + + /// Backing field for property. + private string _subscriptionId; + + /// + /// The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part + /// of the URI for every service call. + /// + [global::System.Management.Automation.Parameter(Mandatory = true, HelpMessage = "The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.")] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Info( + Required = true, + ReadOnly = false, + Description = @"The subscription credentials which uniquely identify the Microsoft Azure subscription. The subscription ID forms part of the URI for every service call.", + SerializedName = @"subscriptionId", + PossibleTypes = new [] { typeof(string) })] + [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.DefaultInfo( + Name = @"", + Description =@"", + Script = @"(Get-AzContext).Subscription.Id", + SetCondition = @"")] + [global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category(global::Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.ParameterCategory.Path)] + public string SubscriptionId { get => this._subscriptionId; set => this._subscriptionId = value; } + + /// + /// overrideOnDefault will be called before the regular onDefault has been processed, allowing customization of what + /// happens on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// /// Determines if the rest of the onDefault method should be processed, or if the method should + /// return immediately (set to true to skip further processing ) + + partial void overrideOnDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// overrideOnOk will be called before the regular onOk has been processed, allowing customization of what happens + /// on that response. Implement this method in a partial class to enable this behavior + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// /// Determines if the rest of the onOk method should be processed, or if the method should return + /// immediately (set to true to skip further processing ) + + partial void overrideOnOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response, ref global::System.Threading.Tasks.Task returnNow); + + /// + /// (overrides the default BeginProcessing method in global::System.Management.Automation.PSCmdlet) + /// + protected override void BeginProcessing() + { + var telemetryId = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryId.Invoke(); + if (telemetryId != "" && telemetryId != "internal") + { + __correlationId = telemetryId; + } + Module.Instance.SetProxyConfiguration(Proxy, ProxyCredential, ProxyUseDefaultCredentials); + if (Break) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.AttachDebugger.Break(); + } + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeginProcessing).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + + /// Performs clean-up after the command execution + protected override void EndProcessing() + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse); + } + var telemetryInfo = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.GetTelemetryInfo?.Invoke(__correlationId); + if (telemetryInfo != null) + { + telemetryInfo.TryGetValue("ShowSecretsWarning", out var showSecretsWarning); + telemetryInfo.TryGetValue("SanitizedProperties", out var sanitizedProperties); + telemetryInfo.TryGetValue("InvocationName", out var invocationName); + if (showSecretsWarning == "true") + { + if (string.IsNullOrEmpty(sanitizedProperties)) + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing secrets. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + else + { + WriteWarning($"The output of cmdlet {invocationName} may compromise security by showing the following secrets: {sanitizedProperties}. Learn more at https://go.microsoft.com/fwlink/?linkid=2258844"); + } + } + } + } + + /// Handles/Dispatches events during the call to the REST service. + /// The message id + /// The message cancellation token. When this call is cancelled, this should be true + /// Detailed message data for the message event. + /// + /// A that will be complete when handling of the message is completed. + /// + async global::System.Threading.Tasks.Task Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener.Signal(string id, global::System.Threading.CancellationToken token, global::System.Func messageData) + { + using( NoSynchronizationContext ) + { + if (token.IsCancellationRequested) + { + return ; + } + + switch ( id ) + { + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Verbose: + { + WriteVerbose($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Warning: + { + WriteWarning($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Information: + { + var data = messageData(); + WriteInformation(data.Message, new string[]{}); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Debug: + { + WriteDebug($"{(messageData().Message ?? global::System.String.Empty)}"); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Error: + { + WriteError(new global::System.Management.Automation.ErrorRecord( new global::System.Exception(messageData().Message), string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null ) ); + return ; + } + case Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.Progress: + { + var data = messageData(); + int progress = (int)data.Value; + string activityMessage, statusDescription; + global::System.Management.Automation.ProgressRecordType recordType; + if (progress < 100) + { + activityMessage = "In progress"; + statusDescription = "Checking operation status"; + recordType = System.Management.Automation.ProgressRecordType.Processing; + } + else + { + activityMessage = "Completed"; + statusDescription = "Completed"; + recordType = System.Management.Automation.ProgressRecordType.Completed; + } + WriteProgress(new global::System.Management.Automation.ProgressRecord(1, activityMessage, statusDescription) + { + PercentComplete = progress, + RecordType = recordType + }); + return ; + } + } + await Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.Signal(id, token, messageData, (i, t, m) => ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(i, t, () => Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventDataConverter.ConvertFrom(m()) as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.EventData), InvocationInformation, this.ParameterSetName, __correlationId, __processRecordId, null ); + if (token.IsCancellationRequested) + { + return ; + } + WriteDebug($"{id}: {(messageData().Message ?? global::System.String.Empty)}"); + } + } + + /// Performs execution of the command. + protected override void ProcessRecord() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordStart).Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + __processRecordId = System.Guid.NewGuid().ToString(); + try + { + // work + if (ShouldProcess($"Call remote 'NetworkSecurityPerimetersPatch' operation")) + { + using( var asyncCommandRuntime = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.AsyncCommandRuntime(this, ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token) ) + { + asyncCommandRuntime.Wait( ProcessRecordAsync(),((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token); + } + } + } + catch (global::System.AggregateException aggregateException) + { + // unroll the inner exceptions to get the root cause + foreach( var innerException in aggregateException.Flatten().InnerExceptions ) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{innerException.GetType().Name} - {innerException.Message} : {innerException.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(innerException,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + } + catch (global::System.Exception exception) when ((exception as System.Management.Automation.PipelineStoppedException)== null || (exception as System.Management.Automation.PipelineStoppedException).InnerException != null) + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletException, $"{exception.GetType().Name} - {exception.Message} : {exception.StackTrace}").Wait(); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + // Write exception out to error channel. + WriteError( new global::System.Management.Automation.ErrorRecord(exception,string.Empty, global::System.Management.Automation.ErrorCategory.NotSpecified, null) ); + } + finally + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordEnd).Wait(); + } + } + + /// Performs execution of the command, working asynchronously if required. + /// + /// A that will be complete when handling of the method is completed. + /// + protected async global::System.Threading.Tasks.Task ProcessRecordAsync() + { + using( NoSynchronizationContext ) + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletGetPipeline); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + Pipeline = Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.CreatePipeline(InvocationInformation, __correlationId, __processRecordId, this.ParameterSetName, this.ExtensibleParameters); + if (null != HttpPipelinePrepend) + { + Pipeline.Prepend((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelinePrepend) ?? HttpPipelinePrepend); + } + if (null != HttpPipelineAppend) + { + Pipeline.Append((this.CommandRuntime as Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell.IAsyncCommandRuntimeExtensions)?.Wrap(HttpPipelineAppend) ?? HttpPipelineAppend); + } + // get the client instance + try + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletBeforeAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + await this.Client.NetworkSecurityPerimetersPatchViaJsonString(SubscriptionId, ResourceGroupName, Name, _jsonString, onOk, onDefault, this, Pipeline); + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletAfterAPICall); if( ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Token.IsCancellationRequested ) { return; } + } + catch (Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.UndeclaredResponseException urexception) + { + WriteError(new global::System.Management.Automation.ErrorRecord(urexception, urexception.StatusCode.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { SubscriptionId=SubscriptionId,ResourceGroupName=ResourceGroupName,Name=Name}) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(urexception.Message) { RecommendedAction = urexception.Action } + }); + } + finally + { + await ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Signal(Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.Events.CmdletProcessRecordAsyncEnd); + } + } + } + + /// Interrupts currently running code within the command. + protected override void StopProcessing() + { + ((Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.IEventListener)this).Cancel(); + base.StopProcessing(); + } + + /// + /// Initializes a new instance of the cmdlet class. + /// + public UpdateAzNetworkSecurityPerimeter_PatchViaJsonString() + { + + } + + /// + new protected void WriteObject(object sendToPipeline) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline); + } + + /// + /// + new protected void WriteObject(object sendToPipeline, bool enumerateCollection) + { + Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Module.Instance.SanitizeOutput?.Invoke(sendToPipeline, __correlationId); + base.WriteObject(sendToPipeline, enumerateCollection); + } + + /// + /// a delegate that is called when the remote service returns default (any response code not handled elsewhere). + /// + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ICloudError + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onDefault(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnDefault(responseMessage, response, ref _returnNow); + // if overrideOnDefault has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // Error Response : default + var code = (await response)?.Code; + var message = (await response)?.Message; + if ((null == code || null == message)) + { + // Unrecognized Response. Create an error record based on what we have. + var ex = new Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.RestException(responseMessage, await response); + WriteError( new global::System.Management.Automation.ErrorRecord(ex, ex.Code, global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(ex.Message) { RecommendedAction = ex.Action } + }); + } + else + { + WriteError( new global::System.Management.Automation.ErrorRecord(new global::System.Exception($"[{code}] : {message}"), code?.ToString(), global::System.Management.Automation.ErrorCategory.InvalidOperation, new { }) + { + ErrorDetails = new global::System.Management.Automation.ErrorDetails(message) { RecommendedAction = global::System.String.Empty } + }); + } + } + } + + /// a delegate that is called when the remote service returns 200 (OK). + /// the raw response message as an global::System.Net.Http.HttpResponseMessage. + /// the body result as a Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + /// from the remote call + /// + /// A that will be complete when handling of the method is completed. + /// + private async global::System.Threading.Tasks.Task onOk(global::System.Net.Http.HttpResponseMessage responseMessage, global::System.Threading.Tasks.Task response) + { + using( NoSynchronizationContext ) + { + var _returnNow = global::System.Threading.Tasks.Task.FromResult(false); + overrideOnOk(responseMessage, response, ref _returnNow); + // if overrideOnOk has returned true, then return right away. + if ((null != _returnNow && await _returnNow)) + { + return ; + } + // onOk - response for 200 / application/json + // (await response) // should be Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + var result = (await response); + if (null != result) + { + if (0 == _responseSize) + { + _firstResponse = result; + _responseSize = 1; + } + else + { + if (1 ==_responseSize) + { + // Flush buffer + WriteObject(_firstResponse.AddMultipleTypeNameIntoPSObject()); + } + WriteObject(result.AddMultipleTypeNameIntoPSObject()); + _responseSize = 2; + } + } + } + } + } +} \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportProxyCmdlet.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportProxyCmdlet.cs index b7036d84d319..ac5f200814ed 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportProxyCmdlet.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportProxyCmdlet.cs @@ -70,9 +70,8 @@ protected override void ProcessRecord() var variantGroups = profileGroups.SelectMany(pg => pg.Variants .GroupBy(v => new { v.CmdletName, v.IsInternal }) .Select(vg => new VariantGroup(ModuleName, vg.Key.CmdletName, vg.Select(v => v).ToArray(), - Path.Combine(vg.Key.IsInternal ? InternalFolder : ExportsFolder, pg.ProfileFolder), pg.ProfileName, isInternal: vg.Key.IsInternal))) + Path.Combine(vg.Key.IsInternal ? InternalFolder : ExportsFolder, pg.ProfileFolder), pg.ProfileName, isInternal: vg.Key.IsInternal))) .ToArray(); - var license = new StringBuilder(); license.Append(@" # ---------------------------------------------------------------------------------- @@ -114,6 +113,7 @@ protected override void ProcessRecord() sb.Append("param("); sb.Append($"{(parameterGroups.Any() ? Environment.NewLine : String.Empty)}"); + foreach (var parameterGroup in parameterGroups) { var parameters = parameterGroup.HasAllVariants ? parameterGroup.Parameters.Take(1) : parameterGroup.Parameters; diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs index b853592ee77e..bd0d8228b4a2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Cmdlets/ExportTestStub.cs @@ -12,44 +12,65 @@ namespace Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PowerShell { - [Cmdlet(VerbsData.Export, "TestStub")] - [DoNotExport] - public class ExportTestStub : PSCmdlet - { - [Parameter(Mandatory = true)] - [ValidateNotNullOrEmpty] - public string ModuleName { get; set; } - - [Parameter(Mandatory = true)] - [ValidateNotNullOrEmpty] - public string ExportsFolder { get; set; } - - [Parameter(Mandatory = true)] - [ValidateNotNullOrEmpty] - public string OutputFolder { get; set; } - - [Parameter] - public SwitchParameter IncludeGenerated { get; set; } - - protected override void ProcessRecord() + [Cmdlet(VerbsData.Export, "TestStub")] + [DoNotExport] + public class ExportTestStub : PSCmdlet { - try - { - if (!Directory.Exists(ExportsFolder)) - { - throw new ArgumentException($"Exports folder '{ExportsFolder}' does not exist"); - } + [Parameter(Mandatory = true)] + [ValidateNotNullOrEmpty] + public string ModuleName { get; set; } - var exportDirectories = Directory.GetDirectories(ExportsFolder); - if (!exportDirectories.Any()) - { - exportDirectories = new[] { ExportsFolder }; - } - var utilFile = Path.Combine(OutputFolder, "utils.ps1"); - if (!File.Exists(utilFile)) + [Parameter(Mandatory = true)] + [ValidateNotNullOrEmpty] + public string ExportsFolder { get; set; } + + [Parameter(Mandatory = true)] + [ValidateNotNullOrEmpty] + public string OutputFolder { get; set; } + + [Parameter] + public SwitchParameter IncludeGenerated { get; set; } + + protected override void ProcessRecord() { - var sc = new StringBuilder(); - sc.AppendLine(@"function RandomString([bool]$allChars, [int32]$len) { + try + { + if (!Directory.Exists(ExportsFolder)) + { + throw new ArgumentException($"Exports folder '{ExportsFolder}' does not exist"); + } + + var exportDirectories = Directory.GetDirectories(ExportsFolder); + if (!exportDirectories.Any()) + { + exportDirectories = new[] { ExportsFolder }; + } + /*var loadEnvFile = Path.Combine(OutputFolder, "loadEnv.ps1"); + if (!File.Exists(loadEnvFile)) + { + var sc = new StringBuilder(); + sc.AppendLine(@" +$envFile = 'env.json' +if ($TestMode -eq 'live') { + $envFile = 'localEnv.json' +} + +if (Test-Path -Path (Join-Path $PSScriptRoot $envFile)) { + $envFilePath = Join-Path $PSScriptRoot $envFile +} else { + $envFilePath = Join-Path $PSScriptRoot '..\$envFile' +} +$env = @{} +if (Test-Path -Path $envFilePath) { + $env = Get-Content (Join-Path $PSScriptRoot $envFile) | ConvertFrom-Json +}"); + File.WriteAllText(loadEnvFile, sc.ToString()); + }*/ + var utilFile = Path.Combine(OutputFolder, "utils.ps1"); + if (!File.Exists(utilFile)) + { + var sc = new StringBuilder(); + sc.AppendLine(@"function RandomString([bool]$allChars, [int32]$len) { if ($allChars) { return -join ((33..126) | Get-Random -Count $len | % {[char]$_}) } else { @@ -105,37 +126,40 @@ function cleanupEnv() { # Clean resources you create for testing } "); - File.WriteAllText(utilFile, sc.ToString()); - } - foreach (var exportDirectory in exportDirectories) - { - var outputFolder = OutputFolder; - if (exportDirectory != ExportsFolder) - { - outputFolder = Path.Combine(OutputFolder, Path.GetFileName(exportDirectory)); - Directory.CreateDirectory(outputFolder); - } - - var variantGroups = GetScriptCmdlets(exportDirectory) - .SelectMany(fi => fi.ToVariants()) - .Where(v => !v.IsDoNotExport) - .GroupBy(v => v.CmdletName) - .Select(vg => new VariantGroup(ModuleName, vg.Key, vg.Select(v => v).ToArray(), outputFolder, isTest: true)) - .Where(vtg => !File.Exists(vtg.FilePath) && (IncludeGenerated || !vtg.IsGenerated)); - - foreach (var variantGroup in variantGroups) - { - var sb = new StringBuilder(); - sb.AppendLine($"if(($null -eq $TestName) -or ($TestName -contains '{variantGroup.CmdletName}'))"); - sb.AppendLine(@"{ + File.WriteAllText(utilFile, sc.ToString()); + } + + + + foreach (var exportDirectory in exportDirectories) + { + var outputFolder = OutputFolder; + if (exportDirectory != ExportsFolder) + { + outputFolder = Path.Combine(OutputFolder, Path.GetFileName(exportDirectory)); + Directory.CreateDirectory(outputFolder); + } + + var variantGroups = GetScriptCmdlets(exportDirectory) + .SelectMany(fi => fi.ToVariants()) + .Where(v => !v.IsDoNotExport) + .GroupBy(v => v.CmdletName) + .Select(vg => new VariantGroup(ModuleName, vg.Key, vg.Select(v => v).ToArray(), outputFolder, isTest: true)) + .Where(vtg => !File.Exists(vtg.FilePath) && (IncludeGenerated || !vtg.IsGenerated)); + + foreach (var variantGroup in variantGroups) + { + var sb = new StringBuilder(); + sb.AppendLine($"if(($null -eq $TestName) -or ($TestName -contains '{variantGroup.CmdletName}'))"); + sb.AppendLine(@"{ $loadEnvPath = Join-Path $PSScriptRoot 'loadEnv.ps1' if (-Not (Test-Path -Path $loadEnvPath)) { $loadEnvPath = Join-Path $PSScriptRoot '..\loadEnv.ps1' } . ($loadEnvPath)" -); - sb.AppendLine($@" $TestRecordingFile = Join-Path $PSScriptRoot '{variantGroup.CmdletName}.Recording.json'"); - sb.AppendLine(@" $currentPath = $PSScriptRoot + ); + sb.AppendLine($@" $TestRecordingFile = Join-Path $PSScriptRoot '{variantGroup.CmdletName}.Recording.json'"); + sb.AppendLine(@" $currentPath = $PSScriptRoot while(-not $mockingPath) { $mockingPath = Get-ChildItem -Path $currentPath -Recurse -Include 'HttpPipelineMocking.ps1' -File $currentPath = Split-Path -Path $currentPath -Parent @@ -145,29 +169,29 @@ function cleanupEnv() { "); - sb.AppendLine($"Describe '{variantGroup.CmdletName}' {{"); - var variants = variantGroup.Variants - .Where(v => IncludeGenerated || !v.Attributes.OfType().Any()) - .ToList(); + sb.AppendLine($"Describe '{variantGroup.CmdletName}' {{"); + var variants = variantGroup.Variants + .Where(v => IncludeGenerated || !v.Attributes.OfType().Any()) + .ToList(); + + foreach (var variant in variants) + { + sb.AppendLine($"{Indent}It '{variant.VariantName}' -skip {{"); + sb.AppendLine($"{Indent}{Indent}{{ throw [System.NotImplementedException] }} | Should -Not -Throw"); + var variantSeparator = variants.IndexOf(variant) == variants.Count - 1 ? String.Empty : Environment.NewLine; + sb.AppendLine($"{Indent}}}{variantSeparator}"); + } + sb.AppendLine("}"); - foreach (var variant in variants) + File.WriteAllText(variantGroup.FilePath, sb.ToString()); + } + } + } + catch (Exception ee) { - sb.AppendLine($"{Indent}It '{variant.VariantName}' -skip {{"); - sb.AppendLine($"{Indent}{Indent}{{ throw [System.NotImplementedException] }} | Should -Not -Throw"); - var variantSeparator = variants.IndexOf(variant) == variants.Count - 1 ? String.Empty : Environment.NewLine; - sb.AppendLine($"{Indent}}}{variantSeparator}"); + Console.WriteLine($"${ee.GetType().Name}/{ee.StackTrace}"); + throw ee; } - sb.AppendLine("}"); - - File.WriteAllText(variantGroup.FilePath, sb.ToString()); - } } - } - catch (Exception ee) - { - Console.WriteLine($"${ee.GetType().Name}/{ee.StackTrace}"); - throw ee; - } } - } } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/MarkdownRenderer.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/MarkdownRenderer.cs index 96a750b3fe25..928687563051 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/MarkdownRenderer.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/MarkdownRenderer.cs @@ -94,7 +94,7 @@ public static void WriteMarkdowns(IEnumerable variantGroups, PsMod sb.Append($"## RELATED LINKS{Environment.NewLine}{Environment.NewLine}"); foreach (var relatedLink in markdownInfo.RelatedLinks) { - sb.Append($"{relatedLink}{Environment.NewLine}{Environment.NewLine}"); + sb.Append($"[{relatedLink}]({relatedLink}){Environment.NewLine}{Environment.NewLine}"); } File.WriteAllText(Path.Combine(docsFolder, $"{markdownInfo.CmdletName}.md"), sb.ToString()); diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs index 98055b7eb798..68fc32029135 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyOutputs.cs @@ -188,6 +188,7 @@ internal class BaseOutput public VariantGroup VariantGroup { get; } protected static readonly bool IsAzure = Convert.ToBoolean(@"true"); + public BaseOutput(VariantGroup variantGroup) { VariantGroup = variantGroup; @@ -289,12 +290,31 @@ private string GetDefaultValuesStatements() { setCondition = $" -and {defaultInfo.SetCondition}"; } - sb.AppendLine($"{Indent}{Indent}if (({variantListString}) -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('{parameterName}'){setCondition}) {{"); - sb.AppendLine($"{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = {defaultInfo.Script}"); - sb.Append($"{Indent}{Indent}}}"); + //Yabo: this is bad to hard code the subscription id, but autorest load input README.md reversely (entry readme -> required readme), there are no other way to + //override default value set in required readme + if ("SubscriptionId".Equals(parameterName)) + { + sb.AppendLine($"{Indent}{Indent}if (({variantListString}) -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('{parameterName}'){setCondition}) {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}$testPlayback = $false"); + sb.AppendLine($"{Indent}{Indent}{Indent}$PSBoundParameters['HttpPipelinePrepend'] | Foreach-Object {{ if ($_) {{ $testPlayback = $testPlayback -or ('Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Runtime.PipelineMock' -eq $_.Target.GetType().FullName -and 'Playback' -eq $_.Target.Mode) }} }}"); + sb.AppendLine($"{Indent}{Indent}{Indent}if ($testPlayback) {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = . (Join-Path $PSScriptRoot '..' 'utils' 'Get-SubscriptionIdTestSafe.ps1')"); + sb.AppendLine($"{Indent}{Indent}{Indent}}} else {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = {defaultInfo.Script}"); + sb.AppendLine($"{Indent}{Indent}{Indent}}}"); + sb.Append($"{Indent}{Indent}}}"); + } + else + { + sb.AppendLine($"{Indent}{Indent}if (({variantListString}) -contains $parameterSet -and -not $PSBoundParameters.ContainsKey('{parameterName}'){setCondition}) {{"); + sb.AppendLine($"{Indent}{Indent}{Indent}$PSBoundParameters['{parameterName}'] = {defaultInfo.Script}"); + sb.Append($"{Indent}{Indent}}}"); + } + } return sb.ToString(); } + } internal class ProcessOutput : BaseOutput diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs index d0ded2f9097d..24fefbc82a24 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs +++ b/src/Network/NetworkSecurityPerimeter.Autorest/generated/runtime/BuildTime/Models/PsProxyTypes.cs @@ -31,7 +31,7 @@ internal class VariantGroup { public string ModuleName { get; } - public string RootModuleName {get => @"Az.Network";} + public string RootModuleName { get => @"Az.Network"; } public string CmdletName { get; } public string CmdletVerb { get; } public string CmdletNoun { get; } @@ -49,7 +49,6 @@ internal class VariantGroup public PsHelpInfo HelpInfo { get; } public bool IsGenerated { get; } public bool IsInternal { get; } - public string OutputFolder { get; } public string FileName { get; } public string FilePath { get; } @@ -84,7 +83,6 @@ public VariantGroup(string moduleName, string cmdletName, Variant[] variants, st HelpInfo = Variants.Select(v => v.HelpInfo).FirstOrDefault() ?? new PsHelpInfo(); IsGenerated = Variants.All(v => v.Attributes.OfType().Any()); IsInternal = isInternal; - OutputFolder = outputFolder; FileName = $"{CmdletName}{(isTest ? ".Tests" : String.Empty)}.ps1"; FilePath = Path.Combine(OutputFolder, FileName); @@ -258,7 +256,6 @@ internal class Parameter public ParameterMetadata Metadata { get; } public PsParameterHelpInfo HelpInfo { get; } public Type ParameterType { get; } - public Attribute[] Attributes { get; } public ParameterCategory[] Categories { get; } public ParameterCategory OrderCategory { get; } @@ -311,10 +308,10 @@ public Parameter(string variantName, string parameterName, ParameterMetadata met IsMandatory = ParameterAttribute.Mandatory; var complexParameterName = ParameterName.ToUpperInvariant(); - var complexMessage = $"{Environment.NewLine}To construct, see NOTES section for {complexParameterName} properties and create a hash table."; + var complexMessage = $"{Environment.NewLine}"; var description = ParameterAttribute.HelpMessage.NullIfEmpty() ?? HelpInfo.Description.NullIfEmpty() ?? InfoAttribute?.Description.NullIfEmpty() ?? String.Empty; // Remove the complex type message as it will be reinserted if this is a complex type - description = description.NormalizeNewLines().Replace(complexMessage, String.Empty).Replace(complexMessage.ToPsSingleLine(), String.Empty); + description = description.NormalizeNewLines(); // Make an InfoAttribute for processing only if one isn't provided InfoAttribute = Attributes.OfType().FirstOrDefault() ?? new InfoAttribute { PossibleTypes = new[] { ParameterType.Unwrap() }, Required = IsMandatory }; // Set the description if the InfoAttribute does not have one since they are exported without a description @@ -334,7 +331,7 @@ internal class ComplexInterfaceInfo public bool Required { get; } public bool ReadOnly { get; } public string Description { get; } - + public ComplexInterfaceInfo[] NestedInfos { get; } public bool IsComplexInterface { get; } @@ -351,7 +348,7 @@ public ComplexInterfaceInfo(string name, Type type, InfoAttribute infoAttribute, var unwrappedType = Type.Unwrap(); var hasBeenSeen = seenTypes?.Contains(unwrappedType) ?? false; (seenTypes ?? (seenTypes = new List())).Add(unwrappedType); - NestedInfos = hasBeenSeen ? new ComplexInterfaceInfo[]{} : + NestedInfos = hasBeenSeen ? new ComplexInterfaceInfo[] { } : unwrappedType.GetInterfaces() .Concat(InfoAttribute.PossibleTypes) .SelectMany(pt => pt.GetProperties() @@ -440,7 +437,7 @@ public CompleterInfo(ArgumentCompleterAttribute completerAttribute) } } - internal class PSArgumentCompleterInfo: CompleterInfo + internal class PSArgumentCompleterInfo : CompleterInfo { public string[] ResourceTypes { get; } @@ -511,7 +508,8 @@ public static Parameter[] ToParameters(this Variant variant) parameterHelp = parameterHelp.Where(ph => (!ph.ParameterSetNames.Any() || ph.ParameterSetNames.Any(psn => psn == variant.VariantName || psn == AllParameterSets)) && ph.Name != "IncludeTotalCount"); } var result = parameters.Select(p => new Parameter(variant.VariantName, p.Key, p.Value, parameterHelp.FirstOrDefault(ph => ph.Name == p.Key))); - if (variant.SupportsPaging) { + if (variant.SupportsPaging) + { // If supportsPaging is set, we will need to add First and Skip parameters since they are treated as common parameters which as not contained on Metadata>parameters variant.Info.Parameters["First"].Attributes.OfType().FirstOrDefault(pa => pa.ParameterSetName == variant.VariantName || pa.ParameterSetName == AllParameterSets).HelpMessage = "Gets only the first 'n' objects."; variant.Info.Parameters["Skip"].Attributes.OfType().FirstOrDefault(pa => pa.ParameterSetName == variant.VariantName || pa.ParameterSetName == AllParameterSets).HelpMessage = "Ignores the first 'n' objects and then gets the remaining objects."; diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Az.NetworkSecurityPerimeter.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Az.NetworkSecurityPerimeter.md index 2de2b2139f32..8c0bed6c7824 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Az.NetworkSecurityPerimeter.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Az.NetworkSecurityPerimeter.md @@ -33,6 +33,12 @@ Gets the specified NSP linkReference resource. ### [Get-AzNetworkSecurityPerimeterProfile](Get-AzNetworkSecurityPerimeterProfile.md) Gets the specified NSP profile. +### [Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile](Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md) +Reconcile NSP access rules + +### [Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile](Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md) +Reconcile NSP association + ### [New-AzNetworkSecurityPerimeter](New-AzNetworkSecurityPerimeter.md) Create a Network Security Perimeter. @@ -66,6 +72,9 @@ Deletes an NSP LinkReference resource. ### [Remove-AzNetworkSecurityPerimeterProfile](Remove-AzNetworkSecurityPerimeterProfile.md) Deletes an NSP profile. +### [Update-AzNetworkSecurityPerimeter](Update-AzNetworkSecurityPerimeter.md) +Patch Tags for a Network Security Perimeter. + ### [Update-AzNetworkSecurityPerimeterAccessRule](Update-AzNetworkSecurityPerimeterAccessRule.md) Updates an access rule. diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeter.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeter.md index 8ab751b4e116..561aee12c6fe 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeter.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeter.md @@ -141,7 +141,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAccessRule.md index fccb1edb2409..fd383894e1a8 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAccessRule.md @@ -125,7 +125,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -156,7 +155,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -172,7 +170,6 @@ Accept wildcard characters: False ### -ProfileInputObject Identity Parameter -To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAssociation.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAssociation.md index 24059ec338ac..9071acd572b8 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterAssociation.md @@ -120,7 +120,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -151,7 +150,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLink.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLink.md index 3982bea94d96..cce6673e00ef 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLink.md @@ -89,7 +89,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -120,7 +119,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLinkReference.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLinkReference.md index 469dd0308c3c..70b1c8edd2f2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLinkReference.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterLinkReference.md @@ -90,7 +90,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -121,7 +120,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterProfile.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterProfile.md index ecca3391a87f..bfe4b538d000 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterProfile.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Get-AzNetworkSecurityPerimeterProfile.md @@ -120,7 +120,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -151,7 +150,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md new file mode 100644 index 000000000000..5878e529bd73 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.md @@ -0,0 +1,335 @@ +--- +external help file: +Module Name: Az.Network +online version: https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspaccessrulesreconcile +schema: 2.0.0 +--- + +# Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile + +## SYNOPSIS +Reconcile NSP access rules + +## SYNTAX + +### PostExpanded (Default) +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### Post +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName -Parameter + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentity +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject + -Parameter [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject + [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityNetworkSecurityPerimeter +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterInputObject -ProfileName + -Parameter [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityNetworkSecurityPerimeterExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterInputObject -ProfileName + [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityProfile +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -ProfileInputObject -Parameter [-DefaultProfile ] + [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityProfileExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -ProfileInputObject [-DefaultProfile ] [-Confirm] [-WhatIf] + [] +``` + +### PostViaJsonFilePath +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName + -JsonFilePath [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] + [] +``` + +### PostViaJsonString +``` +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName + -NetworkSecurityPerimeterName -ProfileName -ResourceGroupName -JsonString + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +## DESCRIPTION +Reconcile NSP access rules + +## EXAMPLES + +### Example 1: Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules +```powershell +Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -AccessRuleName MyAccessRule -ProfileName profile -ResourceGroupName ResourceGroup-1 -NetworkSecurityPerimeterName nsp3 +``` + +Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules + +### Example 2: Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules by identity (using pipe) +```powershell + $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name ar3 -ProfileName profile1 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile -InputObject $GETObj +``` + +Invoke Reconcile of NetworkSecurityPerimeterNsp AccessRules by identity (using pipe) + +## PARAMETERS + +### -AccessRuleName +The name of the NSP access rule. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaIdentityNetworkSecurityPerimeter, PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaIdentityProfile, PostViaIdentityProfileExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DefaultProfile +The DefaultProfile parameter is not functional. +Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + +```yaml +Type: System.Management.Automation.PSObject +Parameter Sets: (All) +Aliases: AzureRMContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -InputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentity, PostViaIdentityExpanded +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -JsonFilePath +Path of Json file supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonFilePath +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -JsonString +Json string supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterInputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityNetworkSecurityPerimeter, PostViaIdentityNetworkSecurityPerimeterExpanded +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterName +The name of the network security perimeter. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Parameter +Anything + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +Parameter Sets: Post, PostViaIdentity, PostViaIdentityNetworkSecurityPerimeter, PostViaIdentityProfile +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ProfileInputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityProfile, PostViaIdentityProfileExpanded +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ProfileName +The name of the NSP profile. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaIdentityNetworkSecurityPerimeter, PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -ResourceGroupName +The name of the resource group. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SubscriptionId +The subscription credentials which uniquely identify the Microsoft Azure subscription. +The subscription ID forms part of the URI for every service call. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: False +Position: Named +Default value: (Get-AzContext).Subscription.Id +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + +## OUTPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +## NOTES + +## RELATED LINKS + diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md new file mode 100644 index 000000000000..333b2ab44eb7 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.md @@ -0,0 +1,290 @@ +--- +external help file: +Module Name: Az.Network +online version: https://learn.microsoft.com/powershell/module/az.network/invoke-aznetworksecurityperimeternspassociationreconcile +schema: 2.0.0 +--- + +# Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile + +## SYNOPSIS +Reconcile NSP association + +## SYNTAX + +### PostExpanded (Default) +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName [-SubscriptionId ] + [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### Post +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName -Parameter + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentity +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject + -Parameter [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject + [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityNetworkSecurityPerimeter +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterInputObject -Parameter + [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaIdentityNetworkSecurityPerimeterExpanded +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterInputObject [-DefaultProfile ] + [-Confirm] [-WhatIf] [] +``` + +### PostViaJsonFilePath +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName -JsonFilePath + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PostViaJsonString +``` +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName + -NetworkSecurityPerimeterName -ResourceGroupName -JsonString + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +## DESCRIPTION +Reconcile NSP association + +## EXAMPLES + +### Example 1: Reconcile NSP association +```powershell +Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -AssociationName association3 -NetworkSecurityPerimeterName nsp3 -ResourceGroupName ResourceGroup-1 +``` + +Reconcile NSP association + +### Example 2: Reconcile NSP association by identity (using pipe) +```powershell + $GETObj = Get-AzNetworkSecurityPerimeterAssociation -Name association3 -ResourceGroupName ResourceGroup-1 -SecurityPerimeterName nsp3 + Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile -InputObject $GETObj +``` + +Reconcile NSP association by identity (using pipe) + +## PARAMETERS + +### -AssociationName +The name of the NSP association. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaIdentityNetworkSecurityPerimeter, PostViaIdentityNetworkSecurityPerimeterExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -DefaultProfile +The DefaultProfile parameter is not functional. +Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + +```yaml +Type: System.Management.Automation.PSObject +Parameter Sets: (All) +Aliases: AzureRMContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -InputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentity, PostViaIdentityExpanded +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -JsonFilePath +Path of Json file supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonFilePath +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -JsonString +Json string supplied to the Post operation + +```yaml +Type: System.String +Parameter Sets: PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterInputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PostViaIdentityNetworkSecurityPerimeter, PostViaIdentityNetworkSecurityPerimeterExpanded +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -NetworkSecurityPerimeterName +The name of the network security perimeter. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Parameter +Anything + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny +Parameter Sets: Post, PostViaIdentity, PostViaIdentityNetworkSecurityPerimeter +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ResourceGroupName +The name of the resource group. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SubscriptionId +The subscription credentials which uniquely identify the Microsoft Azure subscription. +The subscription ID forms part of the URI for every service call. + +```yaml +Type: System.String +Parameter Sets: Post, PostExpanded, PostViaJsonFilePath, PostViaJsonString +Aliases: + +Required: False +Position: Named +Default value: (Get-AzContext).Subscription.Id +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + +## OUTPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IAny + +## NOTES + +## RELATED LINKS + diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeter.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeter.md index 5436475256af..b7923de1e5f0 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeter.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeter.md @@ -106,7 +106,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -182,7 +181,6 @@ Accept wildcard characters: False ### -Parameter The Network Security Perimeter resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAccessRule.md index 76d9cca2a3e2..de767897ea86 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAccessRule.md @@ -18,8 +18,8 @@ New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -R -SecurityPerimeterName [-SubscriptionId ] [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-Confirm] [-WhatIf] - [] + [-ServiceTag ] [-Subscription ] [-Tag ] [-DefaultProfile ] + [-Confirm] [-WhatIf] [] ``` ### Create @@ -34,8 +34,8 @@ New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -R New-AzNetworkSecurityPerimeterAccessRule -InputObject [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-Confirm] [-WhatIf] - [] + [-ServiceTag ] [-Subscription ] [-Tag ] [-DefaultProfile ] + [-Confirm] [-WhatIf] [] ``` ### CreateViaIdentityNetworkSecurityPerimeter @@ -51,8 +51,8 @@ New-AzNetworkSecurityPerimeterAccessRule -Name -NetworkSecurityPerimeterInputObject -ProfileName [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-Confirm] [-WhatIf] - [] + [-ServiceTag ] [-Subscription ] [-Tag ] [-DefaultProfile ] + [-Confirm] [-WhatIf] [] ``` ### CreateViaIdentityProfile @@ -67,8 +67,8 @@ New-AzNetworkSecurityPerimeterAccessRule -Name New-AzNetworkSecurityPerimeterAccessRule -Name -ProfileInputObject [-AccessRuleId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] [-FullyQualifiedDomainName ] [-Location ] - [-PhoneNumber ] [-Subscription ] [-Tag ] [-DefaultProfile ] - [-Confirm] [-WhatIf] [] + [-PhoneNumber ] [-ServiceTag ] [-Subscription ] [-Tag ] + [-DefaultProfile ] [-Confirm] [-WhatIf] [] ``` ### CreateViaJsonFilePath @@ -221,7 +221,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -297,7 +296,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -313,7 +311,6 @@ Accept wildcard characters: False ### -Parameter The NSP access rule resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule @@ -344,7 +341,6 @@ Accept wildcard characters: False ### -ProfileInputObject Identity Parameter -To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -403,9 +399,23 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ServiceTag +Inbound rules service tag names. + +```yaml +Type: System.String[] +Parameter Sets: CreateExpanded, CreateViaIdentityExpanded, CreateViaIdentityNetworkSecurityPerimeterExpanded, CreateViaIdentityProfileExpanded +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subscription List of subscription ids -To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAssociation.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAssociation.md index 816602068c11..6d6d879288f8 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterAssociation.md @@ -139,7 +139,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -215,7 +214,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -231,7 +229,6 @@ Accept wildcard characters: False ### -Parameter The NSP resource association resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterLink.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterLink.md index 1dfaa15ebbe6..b47b86ecd89a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterLink.md @@ -149,7 +149,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -196,7 +195,6 @@ Accept wildcard characters: False ### -LocalInboundProfile Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. -It's default value is ['*']. ```yaml Type: System.String[] @@ -227,7 +225,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -243,7 +240,6 @@ Accept wildcard characters: False ### -Parameter The network security perimeter link resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink @@ -261,7 +257,6 @@ Accept wildcard characters: False Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. -It's default value is ['*']. ```yaml Type: System.String[] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterProfile.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterProfile.md index dbf5e2559fe3..7c1c04e0f244 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterProfile.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/New-AzNetworkSecurityPerimeterProfile.md @@ -123,7 +123,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -199,7 +198,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -215,7 +213,6 @@ Accept wildcard characters: False ### -Parameter The network security perimeter profile resource -To construct, see NOTES section for PARAMETER properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeter.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeter.md index 793905c39486..f856004c0918 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeter.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeter.md @@ -68,7 +68,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAccessRule.md index 9ebe0c0044c2..9a24f829094d 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAccessRule.md @@ -83,7 +83,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -114,7 +113,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -145,7 +143,6 @@ Accept wildcard characters: False ### -ProfileInputObject Identity Parameter -To construct, see NOTES section for PROFILEINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAssociation.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAssociation.md index 2d1b8938a9dd..a671042e48ff 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAssociation.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterAssociation.md @@ -91,7 +91,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -122,7 +121,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLink.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLink.md index 2e70d4dfe2fe..58a718948040 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLink.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLink.md @@ -87,7 +87,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -118,7 +117,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLinkReference.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLinkReference.md index bf8a70b15887..2487f0924456 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLinkReference.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterLinkReference.md @@ -87,7 +87,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -118,7 +117,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterProfile.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterProfile.md index 682f103c7d0e..f48ea39bc720 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterProfile.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Remove-AzNetworkSecurityPerimeterProfile.md @@ -76,7 +76,6 @@ Accept wildcard characters: False ### -InputObject Identity Parameter -To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity @@ -107,7 +106,6 @@ Accept wildcard characters: False ### -NetworkSecurityPerimeterInputObject Identity Parameter -To construct, see NOTES section for NETWORKSECURITYPERIMETERINPUTOBJECT properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeter.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeter.md new file mode 100644 index 000000000000..71a3b0ee6721 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeter.md @@ -0,0 +1,271 @@ +--- +external help file: +Module Name: Az.Network +online version: https://learn.microsoft.com/powershell/module/az.network/update-aznetworksecurityperimeter +schema: 2.0.0 +--- + +# Update-AzNetworkSecurityPerimeter + +## SYNOPSIS +Patch Tags for a Network Security Perimeter. + +## SYNTAX + +### PatchExpanded (Default) +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName [-SubscriptionId ] + [-Tag ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### Patch +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName -Parameter + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PatchViaIdentity +``` +Update-AzNetworkSecurityPerimeter -InputObject + -Parameter [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PatchViaIdentityExpanded +``` +Update-AzNetworkSecurityPerimeter -InputObject [-Tag ] + [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PatchViaJsonFilePath +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName -JsonFilePath + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +### PatchViaJsonString +``` +Update-AzNetworkSecurityPerimeter -Name -ResourceGroupName -JsonString + [-SubscriptionId ] [-DefaultProfile ] [-Confirm] [-WhatIf] [] +``` + +## DESCRIPTION +Patch Tags for a Network Security Perimeter. + +## EXAMPLES + +### Example 1: Updates a NetworkSecurityPerimeter +```powershell + +Update-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + +``` + +```output +Location Name +-------- ---- + nsp3 +``` + +Updates a NetworkSecurityPerimeter + +### Example 2: Updates a NetworkSecurityPerimeter by identity (using pipe) +```powershell + $GETObj = Get-AzNetworkSecurityPerimeter -Name nsp3 -ResourceGroupName ResourceGroup-1 + Update-AzNetworkSecurityPerimeter -InputObject $GETObj +``` + +```output +Location Name +-------- ---- + nsp3 +``` + +Updates a NetworkSecurityPerimeter by identity (using pipe) + +## PARAMETERS + +### -DefaultProfile +The DefaultProfile parameter is not functional. +Use the SubscriptionId parameter when available if executing the cmdlet against a different subscription. + +```yaml +Type: System.Management.Automation.PSObject +Parameter Sets: (All) +Aliases: AzureRMContext, AzureCredential + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -InputObject +Identity Parameter + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity +Parameter Sets: PatchViaIdentity, PatchViaIdentityExpanded +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -JsonFilePath +Path of Json file supplied to the Patch operation + +```yaml +Type: System.String +Parameter Sets: PatchViaJsonFilePath +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -JsonString +Json string supplied to the Patch operation + +```yaml +Type: System.String +Parameter Sets: PatchViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Name +The name of the network security perimeter. + +```yaml +Type: System.String +Parameter Sets: Patch, PatchExpanded, PatchViaJsonFilePath, PatchViaJsonString +Aliases: NetworkSecurityPerimeterName, SecurityPerimeterName, NSPName + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Parameter +Update tags request. + +```yaml +Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest +Parameter Sets: Patch, PatchViaIdentity +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: True (ByValue) +Accept wildcard characters: False +``` + +### -ResourceGroupName +The name of the resource group. + +```yaml +Type: System.String +Parameter Sets: Patch, PatchExpanded, PatchViaJsonFilePath, PatchViaJsonString +Aliases: + +Required: True +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -SubscriptionId +The subscription credentials which uniquely identify the Microsoft Azure subscription. +The subscription ID forms part of the URI for every service call. + +```yaml +Type: System.String +Parameter Sets: Patch, PatchExpanded, PatchViaJsonFilePath, PatchViaJsonString +Aliases: + +Required: False +Position: Named +Default value: (Get-AzContext).Subscription.Id +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Tag +List of tags for Network Security Perimeter + +```yaml +Type: System.Collections.Hashtable +Parameter Sets: PatchExpanded, PatchViaIdentityExpanded +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -Confirm +Prompts you for confirmation before running the cmdlet. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: cf + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### -WhatIf +Shows what would happen if the cmdlet runs. +The cmdlet is not run. + +```yaml +Type: System.Management.Automation.SwitchParameter +Parameter Sets: (All) +Aliases: wi + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + +### CommonParameters +This cmdlet supports the common parameters: -Debug, -ErrorAction, -ErrorVariable, -InformationAction, -InformationVariable, -OutVariable, -OutBuffer, -PipelineVariable, -Verbose, -WarningAction, and -WarningVariable. For more information, see [about_CommonParameters](http://go.microsoft.com/fwlink/?LinkID=113216). + +## INPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.IUpdateTagsRequest + +## OUTPUTS + +### Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter + +## NOTES + +## RELATED LINKS + diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeterAccessRule.md b/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeterAccessRule.md index dc0c8038252b..e306b05951bd 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeterAccessRule.md +++ b/src/Network/NetworkSecurityPerimeter.Autorest/help/Update-AzNetworkSecurityPerimeterAccessRule.md @@ -17,8 +17,8 @@ Updates an access rule. Update-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName -ResourceGroupName -SecurityPerimeterName [-SubscriptionId ] [-AddressPrefix ] [-Direction ] [-EmailAddress ] [-FullyQualifiedDomainName ] [-Location ] - [-PhoneNumber ] [-Subscription ] [-Tag ] [-DefaultProfile ] - [-AsJob] [-NoWait] [-Confirm] [-WhatIf] [] + [-PhoneNumber ] [-ServiceTag ] [-Subscription ] [-Tag ] + [-DefaultProfile ] [-AsJob] [-NoWait] [-Confirm] [-WhatIf] [] ``` ### UpdateViaIdentityExpanded @@ -26,8 +26,8 @@ Update-AzNetworkSecurityPerimeterAccessRule -Name -ProfileName Update-AzNetworkSecurityPerimeterAccessRule -InputObject [-AddressPrefix ] [-Direction ] [-EmailAddress ] [-FullyQualifiedDomainName ] [-Location ] [-PhoneNumber ] - [-Subscription ] [-Tag ] [-DefaultProfile ] [-AsJob] [-NoWait] - [-Confirm] [-WhatIf] [] + [-ServiceTag ] [-Subscription ] [-Tag ] [-DefaultProfile ] + [-AsJob] [-NoWait] [-Confirm] [-WhatIf] [] ``` ## DESCRIPTION @@ -285,9 +285,23 @@ Accept pipeline input: False Accept wildcard characters: False ``` +### -ServiceTag +Service Tags + +```yaml +Type: System.String[] +Parameter Sets: (All) +Aliases: + +Required: False +Position: Named +Default value: None +Accept pipeline input: False +Accept wildcard characters: False +``` + ### -Subscription Subscription ids -To construct, see NOTES section for SUBSCRIPTION properties and create a hash table. ```yaml Type: Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.ISubscriptionId[] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/Az.NetworkSecurityPerimeter.internal.psm1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/Az.NetworkSecurityPerimeter.internal.psm1 index 4684ab54e69f..07ca5513143a 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/Az.NetworkSecurityPerimeter.internal.psm1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/Az.NetworkSecurityPerimeter.internal.psm1 @@ -24,12 +24,12 @@ # Load the last folder if no profile is selected $profileDirectory = $directories | Select-Object -Last 1 } - + if($profileDirectory) { Write-Information "Loaded Azure profile '$($profileDirectory.Name)' for module '$($instance.Name)'" $exportsPath = $profileDirectory.FullName } - + if($exportsPath) { Get-ChildItem -Path $exportsPath -Recurse -Include '*.ps1' -File | ForEach-Object { . $_.FullName } $cmdletNames = Get-ScriptCmdlet -ScriptFolder $exportsPath diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeter.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeter.ps1 index 72b2b4548fc8..46104e87f5bd 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeter.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeter.ps1 @@ -67,14 +67,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter] # The Network Security Perimeter resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAccessRule.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAccessRule.ps1 index 6a33ebd0c3e9..61de703c2e81 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAccessRule.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAccessRule.ps1 @@ -62,6 +62,7 @@ PARAMETER : The NSP access rule resource [EmailAddress >]: Outbound rules email address format. [FullyQualifiedDomainName >]: Outbound rules fully qualified domain name format. [PhoneNumber >]: Outbound rules phone number format. + [ServiceTag >]: Inbound rules service tag names. [Subscription >]: List of subscription ids [Id ]: Subscription id in the ARM id format. .Link @@ -75,14 +76,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule] # The NSP access rule resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAssociation.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAssociation.ps1 index becc48fcd13b..daba3aa697e5 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAssociation.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterAssociation.ps1 @@ -68,14 +68,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation] # The NSP resource association resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterLink.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterLink.ps1 index b412eddd2664..4ea434bcc02f 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterLink.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterLink.ps1 @@ -52,8 +52,8 @@ INPUTOBJECT : Identity Parameter PARAMETER : The network security perimeter link resource [AutoApprovedRemotePerimeterResourceId ]: Perimeter ARM Id for the remote NSP with which the link gets created in Auto-approval mode. It should be used when the NSP admin have Microsoft.Network/networkSecurityPerimeters/linkPerimeter/action permission on the remote NSP resource. [Description ]: A message passed to the owner of the remote NSP link resource with this connection request. In case of Auto-approved flow, it is default to 'Auto Approved'. Restricted to 140 chars. - [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*']. - [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*']. + [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. + [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. .Link https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterlink #> @@ -65,14 +65,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink] # The network security perimeter link resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterProfile.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterProfile.ps1 index c66b94baf0d6..ef0322b4c2ef 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterProfile.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/New-AzNetworkSecurityPerimeterProfile.ps1 @@ -67,14 +67,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile] # The network security perimeter profile resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/internal/ProxyCmdletDefinitions.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/internal/ProxyCmdletDefinitions.ps1 index 6b825c826b84..4c02d0182500 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/internal/ProxyCmdletDefinitions.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/internal/ProxyCmdletDefinitions.ps1 @@ -62,6 +62,7 @@ PARAMETER : The NSP access rule resource [EmailAddress >]: Outbound rules email address format. [FullyQualifiedDomainName >]: Outbound rules fully qualified domain name format. [PhoneNumber >]: Outbound rules phone number format. + [ServiceTag >]: Inbound rules service tag names. [Subscription >]: List of subscription ids [Id ]: Subscription id in the ARM id format. .Link @@ -75,14 +76,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAccessRule] # The NSP access rule resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] @@ -230,14 +229,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspAssociation] # The NSP resource association resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] @@ -369,8 +366,8 @@ INPUTOBJECT : Identity Parameter PARAMETER : The network security perimeter link resource [AutoApprovedRemotePerimeterResourceId ]: Perimeter ARM Id for the remote NSP with which the link gets created in Auto-approval mode. It should be used when the NSP admin have Microsoft.Network/networkSecurityPerimeters/linkPerimeter/action permission on the remote NSP resource. [Description ]: A message passed to the owner of the remote NSP link resource with this connection request. In case of Auto-approved flow, it is default to 'Auto Approved'. Restricted to 140 chars. - [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. It's default value is ['*']. - [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. It's default value is ['*']. + [LocalInboundProfile >]: Local Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. + [RemoteInboundProfile >]: Remote Inbound profile names to which Inbound is allowed. Use ['*'] to allow inbound to all profiles. This property can only be updated in auto-approval mode. .Link https://learn.microsoft.com/powershell/module/az.network/new-aznetworksecurityperimeterlink #> @@ -382,14 +379,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspLink] # The network security perimeter link resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] @@ -536,14 +531,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INspProfile] # The network security perimeter profile resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] @@ -690,14 +683,12 @@ param( [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Path')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeterIdentity] # Identity Parameter - # To construct, see NOTES section for INPUTOBJECT properties and create a hash table. ${InputObject}, [Parameter(Mandatory, ValueFromPipeline)] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Category('Body')] [Microsoft.Azure.PowerShell.Cmdlets.NetworkSecurityPerimeter.Models.INetworkSecurityPerimeter] # The Network Security Perimeter resource - # To construct, see NOTES section for PARAMETER properties and create a hash table. ${Parameter}, [Parameter()] diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test-module.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test-module.ps1 index 6c86f2da31f6..2527251018ed 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test-module.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test-module.ps1 @@ -74,13 +74,14 @@ try if ($TestMode -ne 'playback') { setupEnv + } else { + $env:AzPSAutorestTestPlaybackMode = $true } $testFolder = Join-Path $PSScriptRoot 'test' if ($null -ne $TestName) { Invoke-Pester -Script @{ Path = $testFolder } -TestName $TestName -ExcludeTag $ExcludeTag -EnableExit -OutputFile (Join-Path $testFolder "$moduleName-TestResults.xml") - } else - { + } else { Invoke-Pester -Script @{ Path = $testFolder } -ExcludeTag $ExcludeTag -EnableExit -OutputFile (Join-Path $testFolder "$moduleName-TestResults.xml") } } Finally @@ -89,6 +90,9 @@ try { cleanupEnv } + else { + $env:AzPSAutorestTestPlaybackMode = '' + } } Write-Host -ForegroundColor Green '-------------Done-------------' diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeter.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeter.Recording.json index a7add12a1e66..c824c9ab24ae 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeter.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeter.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeter+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeter+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -35,14 +35,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"nextLink\":\"https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-07-01-preview\u0026firstIndex=10\u0026pageSize=10\",\"value\":[{\"name\":\"tjbzrt-nsp1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"6ece8307-cf64-48a3-9f0f-d3311a9b0200\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nspDelB1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"b367286b-7693-48c3-8f1d-49b0f000681e\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp12\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp12\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"195030be-231a-425c-a74e-cedab4de5db8\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp10\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"23ca84e4-1303-4801-a82d-e223a9ca8e60\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp8\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"29102081-333d-41cf-909e-0e35c454b8bc\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"df3ffe96-ae46-4a4e-8a01-5d7cd6c3907f\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp6\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp6\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"9ce60056-fbf2-4a24-9d14-7b45eb983267\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"769c15fc-d295-437a-9174-1b837eafa7d5\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp11\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"7adc97c3-83ef-425c-9dd8-ab9da2c4f3ac\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nspD2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"463ffabe-56d8-4c7c-8a7b-728f5232264b\",\"provisioningState\":\"Succeeded\"}}]}", + "Content": "{\"nextLink\":\"https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-08-01-preview\u0026firstIndex=10\u0026pageSize=10\",\"value\":[{\"name\":\"tjbzrt-nsp1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"6ece8307-cf64-48a3-9f0f-d3311a9b0200\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nspDelB1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"b367286b-7693-48c3-8f1d-49b0f000681e\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp12\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp12\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"195030be-231a-425c-a74e-cedab4de5db8\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp10\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"23ca84e4-1303-4801-a82d-e223a9ca8e60\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp8\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"29102081-333d-41cf-909e-0e35c454b8bc\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"df3ffe96-ae46-4a4e-8a01-5d7cd6c3907f\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp6\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp6\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"9ce60056-fbf2-4a24-9d14-7b45eb983267\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"769c15fc-d295-437a-9174-1b837eafa7d5\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nsp11\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"7adc97c3-83ef-425c-9dd8-ab9da2c4f3ac\",\"provisioningState\":\"Succeeded\"}},{\"name\":\"tjbzrt-nspD2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2\",\"location\":\"eastus2euap\",\"type\":\"Microsoft.Network/networkSecurityPerimeters\",\"tags\":{},\"etag\":\"\",\"properties\":{\"perimeterGuid\":\"463ffabe-56d8-4c7c-8a7b-728f5232264b\",\"provisioningState\":\"Succeeded\"}}]}", "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeter+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-07-01-preview\u0026firstIndex=10\u0026pageSize=10+2": { + "Get-AzNetworkSecurityPerimeter+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-08-01-preview\u0026firstIndex=10\u0026pageSize=10+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-07-01-preview\u0026firstIndex=10\u0026pageSize=10", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters?api-version=2023-08-01-preview\u0026firstIndex=10\u0026pageSize=10", "Content": null, "isContentBase64": false, "Headers": { @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeter+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeter+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -119,10 +119,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeter+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeter+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -159,10 +159,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeter+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeter+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAccessRule.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAccessRule.Recording.json index 9c63881c9ede..d6cc3b9f79cf 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAccessRule.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAccessRule.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -35,14 +35,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"nextLink\":\"\",\"value\":[{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}},{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 7878787878\",\"+91 9898989898\"]}},{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test1@microsoft.com\",\"test2@microsoft.com\"],\"phoneNumbers\":[]}},{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"*\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}]}", + "Content": "{\"nextLink\":\"\",\"value\":[{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}},{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 7878787878\",\"+91 9898989898\"]}},{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test1@microsoft.com\",\"test2@microsoft.com\"],\"phoneNumbers\":[]}},{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"*\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}]}", "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -75,14 +75,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -115,14 +115,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeterAccessRule+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -155,7 +155,7 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociableResourceType.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociableResourceType.Recording.json index 8fca2b149f9f..2ef1300c471f 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociableResourceType.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociableResourceType.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeterAssociableResourceType+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAssociableResourceType+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -35,14 +35,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"type\":\"\",\"nextLink\":\"https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview\u0026firstIndex=10\u0026pageSize=10\",\"value\":[{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Sql.servers\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Sql.servers\",\"properties\":{\"providerNamespace\":\"Microsoft.Sql\",\"resourceType\":\"servers\",\"displayName\":\"Microsoft.Sql/servers\",\"apiVersion\":\"2021-02-01-preview\",\"publicDnsZones\":[\"database.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Storage.storageAccounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Storage.storageAccounts\",\"properties\":{\"providerNamespace\":\"Microsoft.Storage\",\"resourceType\":\"storageAccounts\",\"displayName\":\"Microsoft.Storage/storageAccounts\",\"apiVersion\":\"2021-09-01\",\"publicDnsZones\":[\"blob.core.windows.net\",\"table.core.windows.net\",\"queue.core.windows.net\",\"file.core.windows.net\",\"web.core.windows.net\",\"dfs.core.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.EventHub.namespaces\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.EventHub.namespaces\",\"properties\":{\"providerNamespace\":\"Microsoft.EventHub\",\"resourceType\":\"namespaces\",\"displayName\":\"Microsoft.EventHub/namespaces\",\"apiVersion\":\"2022-01-01-preview\",\"publicDnsZones\":[\"servicebus.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.CognitiveServices.accounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.CognitiveServices.accounts\",\"properties\":{\"providerNamespace\":\"Microsoft.CognitiveServices\",\"resourceType\":\"accounts\",\"displayName\":\"Microsoft.CognitiveServices/accounts\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"cognitiveservices.azure.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Search.searchServices\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Search.searchServices\",\"properties\":{\"providerNamespace\":\"Microsoft.Search\",\"resourceType\":\"searchServices\",\"displayName\":\"Microsoft.Search/searchServices\",\"apiVersion\":\"2021-06-06-Preview\",\"publicDnsZones\":[\"search.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Purview.accounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Purview.accounts\",\"properties\":{\"providerNamespace\":\"Microsoft.Purview\",\"resourceType\":\"accounts\",\"displayName\":\"Microsoft.Purview/accounts\",\"apiVersion\":\"2022-02-01-preview\",\"publicDnsZones\":[\"purview.azure.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.ContainerService.managedClusters\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.ContainerService.managedClusters\",\"properties\":{\"providerNamespace\":\"Microsoft.ContainerService\",\"resourceType\":\"managedClusters\",\"displayName\":\"Microsoft.ContainerService/managedClusters\",\"apiVersion\":\"2022-03-01\",\"publicDnsZones\":[\"azmk8s.io\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.KeyVault.vaults\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.KeyVault.vaults\",\"properties\":{\"providerNamespace\":\"Microsoft.KeyVault\",\"resourceType\":\"vaults\",\"displayName\":\"Microsoft.KeyVault/vaults\",\"apiVersion\":\"2022-02-01-preview\",\"publicDnsZones\":[\"vault.azure.net\",\"vaultcore.azure.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.OperationalInsights.workspaces\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.OperationalInsights.workspaces\",\"properties\":{\"providerNamespace\":\"Microsoft.OperationalInsights\",\"resourceType\":\"workspaces\",\"displayName\":\"Microsoft.OperationalInsights/workspaces\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"monitor.azure.com\",\"oms.opinsights.azure.com\",\"ods.opinsights.azure.com\",\"agentsvc.azure-automation.net\",\"blob.core.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Insights.dataCollectionEndpoints\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Insights.dataCollectionEndpoints\",\"properties\":{\"providerNamespace\":\"Microsoft.Insights\",\"resourceType\":\"dataCollectionEndpoints\",\"displayName\":\"Microsoft.Insights/dataCollectionEndpoints\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"monitor.azure.com\"]}}]}", + "Content": "{\"type\":\"\",\"nextLink\":\"https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview\u0026firstIndex=10\u0026pageSize=10\",\"value\":[{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Sql.servers\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Sql.servers\",\"properties\":{\"providerNamespace\":\"Microsoft.Sql\",\"resourceType\":\"servers\",\"displayName\":\"Microsoft.Sql/servers\",\"apiVersion\":\"2021-02-01-preview\",\"publicDnsZones\":[\"database.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Storage.storageAccounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Storage.storageAccounts\",\"properties\":{\"providerNamespace\":\"Microsoft.Storage\",\"resourceType\":\"storageAccounts\",\"displayName\":\"Microsoft.Storage/storageAccounts\",\"apiVersion\":\"2021-09-01\",\"publicDnsZones\":[\"blob.core.windows.net\",\"table.core.windows.net\",\"queue.core.windows.net\",\"file.core.windows.net\",\"web.core.windows.net\",\"dfs.core.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.EventHub.namespaces\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.EventHub.namespaces\",\"properties\":{\"providerNamespace\":\"Microsoft.EventHub\",\"resourceType\":\"namespaces\",\"displayName\":\"Microsoft.EventHub/namespaces\",\"apiVersion\":\"2022-01-01-preview\",\"publicDnsZones\":[\"servicebus.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.CognitiveServices.accounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.CognitiveServices.accounts\",\"properties\":{\"providerNamespace\":\"Microsoft.CognitiveServices\",\"resourceType\":\"accounts\",\"displayName\":\"Microsoft.CognitiveServices/accounts\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"cognitiveservices.azure.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Search.searchServices\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Search.searchServices\",\"properties\":{\"providerNamespace\":\"Microsoft.Search\",\"resourceType\":\"searchServices\",\"displayName\":\"Microsoft.Search/searchServices\",\"apiVersion\":\"2021-06-06-Preview\",\"publicDnsZones\":[\"search.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Purview.accounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Purview.accounts\",\"properties\":{\"providerNamespace\":\"Microsoft.Purview\",\"resourceType\":\"accounts\",\"displayName\":\"Microsoft.Purview/accounts\",\"apiVersion\":\"2022-02-01-preview\",\"publicDnsZones\":[\"purview.azure.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.ContainerService.managedClusters\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.ContainerService.managedClusters\",\"properties\":{\"providerNamespace\":\"Microsoft.ContainerService\",\"resourceType\":\"managedClusters\",\"displayName\":\"Microsoft.ContainerService/managedClusters\",\"apiVersion\":\"2022-03-01\",\"publicDnsZones\":[\"azmk8s.io\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.KeyVault.vaults\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.KeyVault.vaults\",\"properties\":{\"providerNamespace\":\"Microsoft.KeyVault\",\"resourceType\":\"vaults\",\"displayName\":\"Microsoft.KeyVault/vaults\",\"apiVersion\":\"2022-02-01-preview\",\"publicDnsZones\":[\"vault.azure.net\",\"vaultcore.azure.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.OperationalInsights.workspaces\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.OperationalInsights.workspaces\",\"properties\":{\"providerNamespace\":\"Microsoft.OperationalInsights\",\"resourceType\":\"workspaces\",\"displayName\":\"Microsoft.OperationalInsights/workspaces\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"monitor.azure.com\",\"oms.opinsights.azure.com\",\"ods.opinsights.azure.com\",\"agentsvc.azure-automation.net\",\"blob.core.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Insights.dataCollectionEndpoints\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Insights.dataCollectionEndpoints\",\"properties\":{\"providerNamespace\":\"Microsoft.Insights\",\"resourceType\":\"dataCollectionEndpoints\",\"displayName\":\"Microsoft.Insights/dataCollectionEndpoints\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"monitor.azure.com\"]}}]}", "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAssociableResourceType+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview\u0026firstIndex=10\u0026pageSize=10+2": { + "Get-AzNetworkSecurityPerimeterAssociableResourceType+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview\u0026firstIndex=10\u0026pageSize=10+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview\u0026firstIndex=10\u0026pageSize=10", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview\u0026firstIndex=10\u0026pageSize=10", "Content": null, "isContentBase64": false, "Headers": { @@ -75,14 +75,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"type\":\"\",\"nextLink\":\"https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview\u0026firstIndex=20\u0026pageSize=10\",\"value\":[{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.ServiceBus.namespaces\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.ServiceBus.namespaces\",\"properties\":{\"providerNamespace\":\"Microsoft.ServiceBus\",\"resourceType\":\"namespaces\",\"displayName\":\"Microsoft.ServiceBus/namespaces\",\"apiVersion\":\"2022-01-01-preview\",\"publicDnsZones\":[\"servicebus.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Insights.ScheduledQueryRules\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Insights.ScheduledQueryRules\",\"properties\":{\"providerNamespace\":\"Microsoft.Insights\",\"resourceType\":\"ScheduledQueryRules\",\"displayName\":\"Microsoft.Insights/ScheduledQueryRules\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Insights.actionGroups\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Insights.actionGroups\",\"properties\":{\"providerNamespace\":\"Microsoft.Insights\",\"resourceType\":\"actionGroups\",\"displayName\":\"Microsoft.Insights/actionGroups\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"azns.azure.com\",\"azns.azure.net\",\"azns.azure.cn\",\"azns.microsofticm.com\",\"azurenotifications.msftcloudes.cn\",\"azurenotifications.msftcloudes.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.DocumentDB.databaseAccounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.DocumentDB.databaseAccounts\",\"properties\":{\"providerNamespace\":\"Microsoft.DocumentDB\",\"resourceType\":\"databaseAccounts\",\"displayName\":\"Microsoft.DocumentDB/databaseAccounts\",\"apiVersion\":\"2022-08-15-preview\",\"publicDnsZones\":[\"documents.azure.com\",\"mongo.cosmos.azure.com\",\"cassandra.cosmos.azure.com\",\"gremlin.cosmos.azure.com\",\"table.cosmos.azure.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Devices.IotHubs\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Devices.IotHubs\",\"properties\":{\"providerNamespace\":\"Microsoft.Devices\",\"resourceType\":\"IotHubs\",\"displayName\":\"Microsoft.Devices/IotHubs\",\"apiVersion\":\"2023-07-15-preview\",\"publicDnsZones\":[\"servicebus.windows.net\",\"azure-devices.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.DigitalTwins.digitalTwinsInstances\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.DigitalTwins.digitalTwinsInstances\",\"properties\":{\"providerNamespace\":\"Microsoft.DigitalTwins\",\"resourceType\":\"digitalTwinsInstances\",\"displayName\":\"Microsoft.DigitalTwins/digitalTwinsInstances\",\"apiVersion\":\"2023-06-30-preview\",\"publicDnsZones\":[\"digitaltwins.azure.net\",\"digitaltwins.azure.cn\",\"azuredigitaltwins-ppe.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Attestation.attestationProviders\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Attestation.attestationProviders\",\"properties\":{\"providerNamespace\":\"Microsoft.Attestation\",\"resourceType\":\"attestationProviders\",\"displayName\":\"Microsoft.Attestation/attestationProviders\",\"apiVersion\":\"2023-03-01-preview\",\"publicDnsZones\":[\"attest.azure.net\",\"attest.azure.us\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.BotService.botServices\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.BotService.botServices\",\"properties\":{\"providerNamespace\":\"Microsoft.BotService\",\"resourceType\":\"botServices\",\"displayName\":\"Microsoft.BotService/botServices\",\"apiVersion\":\"2022-06-15-preview\",\"publicDnsZones\":[\"botframework.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.ContainerRegistry.registries\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.ContainerRegistry.registries\",\"properties\":{\"providerNamespace\":\"Microsoft.ContainerRegistry\",\"resourceType\":\"registries\",\"displayName\":\"Microsoft.ContainerRegistry/registries\",\"apiVersion\":\"2023-05-31-preview\",\"publicDnsZones\":[\"azurecr.io\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.DeviceUpdate.accounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.DeviceUpdate.accounts\",\"properties\":{\"providerNamespace\":\"Microsoft.DeviceUpdate\",\"resourceType\":\"accounts\",\"displayName\":\"Microsoft.DeviceUpdate/accounts\",\"apiVersion\":\"2023-09-01-preview\",\"publicDnsZones\":[\"adu.microsoft.com\"]}}]}", + "Content": "{\"type\":\"\",\"nextLink\":\"https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview\u0026firstIndex=20\u0026pageSize=10\",\"value\":[{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.ServiceBus.namespaces\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.ServiceBus.namespaces\",\"properties\":{\"providerNamespace\":\"Microsoft.ServiceBus\",\"resourceType\":\"namespaces\",\"displayName\":\"Microsoft.ServiceBus/namespaces\",\"apiVersion\":\"2022-01-01-preview\",\"publicDnsZones\":[\"servicebus.windows.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Insights.ScheduledQueryRules\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Insights.ScheduledQueryRules\",\"properties\":{\"providerNamespace\":\"Microsoft.Insights\",\"resourceType\":\"ScheduledQueryRules\",\"displayName\":\"Microsoft.Insights/ScheduledQueryRules\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Insights.actionGroups\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Insights.actionGroups\",\"properties\":{\"providerNamespace\":\"Microsoft.Insights\",\"resourceType\":\"actionGroups\",\"displayName\":\"Microsoft.Insights/actionGroups\",\"apiVersion\":\"2021-10-01\",\"publicDnsZones\":[\"azns.azure.com\",\"azns.azure.net\",\"azns.azure.cn\",\"azns.microsofticm.com\",\"azurenotifications.msftcloudes.cn\",\"azurenotifications.msftcloudes.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.DocumentDB.databaseAccounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.DocumentDB.databaseAccounts\",\"properties\":{\"providerNamespace\":\"Microsoft.DocumentDB\",\"resourceType\":\"databaseAccounts\",\"displayName\":\"Microsoft.DocumentDB/databaseAccounts\",\"apiVersion\":\"2022-08-15-preview\",\"publicDnsZones\":[\"documents.azure.com\",\"mongo.cosmos.azure.com\",\"cassandra.cosmos.azure.com\",\"gremlin.cosmos.azure.com\",\"table.cosmos.azure.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Devices.IotHubs\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Devices.IotHubs\",\"properties\":{\"providerNamespace\":\"Microsoft.Devices\",\"resourceType\":\"IotHubs\",\"displayName\":\"Microsoft.Devices/IotHubs\",\"apiVersion\":\"2023-07-15-preview\",\"publicDnsZones\":[\"servicebus.windows.net\",\"azure-devices.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.DigitalTwins.digitalTwinsInstances\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.DigitalTwins.digitalTwinsInstances\",\"properties\":{\"providerNamespace\":\"Microsoft.DigitalTwins\",\"resourceType\":\"digitalTwinsInstances\",\"displayName\":\"Microsoft.DigitalTwins/digitalTwinsInstances\",\"apiVersion\":\"2023-06-30-preview\",\"publicDnsZones\":[\"digitaltwins.azure.net\",\"digitaltwins.azure.cn\",\"azuredigitaltwins-ppe.net\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.Attestation.attestationProviders\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.Attestation.attestationProviders\",\"properties\":{\"providerNamespace\":\"Microsoft.Attestation\",\"resourceType\":\"attestationProviders\",\"displayName\":\"Microsoft.Attestation/attestationProviders\",\"apiVersion\":\"2023-03-01-preview\",\"publicDnsZones\":[\"attest.azure.net\",\"attest.azure.us\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.BotService.botServices\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.BotService.botServices\",\"properties\":{\"providerNamespace\":\"Microsoft.BotService\",\"resourceType\":\"botServices\",\"displayName\":\"Microsoft.BotService/botServices\",\"apiVersion\":\"2022-06-15-preview\",\"publicDnsZones\":[\"botframework.com\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.ContainerRegistry.registries\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.ContainerRegistry.registries\",\"properties\":{\"providerNamespace\":\"Microsoft.ContainerRegistry\",\"resourceType\":\"registries\",\"displayName\":\"Microsoft.ContainerRegistry/registries\",\"apiVersion\":\"2023-05-31-preview\",\"publicDnsZones\":[\"azurecr.io\"]}},{\"type\":\"Microsoft.Network/PerimeterAssociableResourceTypes\",\"name\":\"Microsoft.DeviceUpdate.accounts\",\"id\":\"/subscriptions/{subscriptionId}/providers/Microsoft.Network/PerimeterAssociableResourceTypes/Microsoft.DeviceUpdate.accounts\",\"properties\":{\"providerNamespace\":\"Microsoft.DeviceUpdate\",\"resourceType\":\"accounts\",\"displayName\":\"Microsoft.DeviceUpdate/accounts\",\"apiVersion\":\"2023-09-01-preview\",\"publicDnsZones\":[\"adu.microsoft.com\"]}}]}", "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAssociableResourceType+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview\u0026firstIndex=20\u0026pageSize=10+3": { + "Get-AzNetworkSecurityPerimeterAssociableResourceType+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview\u0026firstIndex=20\u0026pageSize=10+3": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-07-01-preview\u0026firstIndex=20\u0026pageSize=10", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/providers/Microsoft.Network/locations/eastus2euap/perimeterAssociableResourceTypes?api-version=2023-08-01-preview\u0026firstIndex=20\u0026pageSize=10", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociation.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociation.Recording.json index 03cd42f006b9..2a4d815a928b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociation.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterAssociation.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -119,10 +119,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeterAssociation+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/t-asn1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLink.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLink.Recording.json index 13e7661afb9d..7db1c3bae9da 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLink.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLink.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeterLink+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterLink+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLink+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterLink+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLink+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterLink+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -119,10 +119,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLink+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeterLink+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2/links/t-link1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLinkReference.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLinkReference.Recording.json index 1fe7d1534f80..5431ec97879b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLinkReference.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterLinkReference.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -119,10 +119,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -159,10 +159,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -199,10 +199,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-07-01-preview+3": { + "Get-AzNetworkSecurityPerimeterLinkReference+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-08-01-preview+3": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp3/linkReferences/Ref-from-t-link1-d47ad183-6520-4d09-b48b-f19fe2b43c99?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterProfile.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterProfile.Recording.json index 97bfaf6ad501..347512c80c89 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterProfile.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Get-AzNetworkSecurityPerimeterProfile.Recording.json @@ -1,8 +1,8 @@ { - "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+List+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+Get+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-07-01-preview+1": { + "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -119,10 +119,10 @@ "isContentBase64": false } }, - "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-07-01-preview+2": { + "Get-AzNetworkSecurityPerimeterProfile+[NoContext]+GetViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.Tests.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.Tests.ps1 new file mode 100644 index 000000000000..16b865719cee --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.Tests.ps1 @@ -0,0 +1,57 @@ +if(($null -eq $TestName) -or ($TestName -contains 'Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile')) +{ + $loadEnvPath = Join-Path $PSScriptRoot 'loadEnv.ps1' + if (-Not (Test-Path -Path $loadEnvPath)) { + $loadEnvPath = Join-Path $PSScriptRoot '..\loadEnv.ps1' + } + . ($loadEnvPath) + $TestRecordingFile = Join-Path $PSScriptRoot 'Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile.Recording.json' + $currentPath = $PSScriptRoot + while(-not $mockingPath) { + $mockingPath = Get-ChildItem -Path $currentPath -Recurse -Include 'HttpPipelineMocking.ps1' -File + $currentPath = Split-Path -Path $currentPath -Parent + } + . ($mockingPath | Select-Object -First 1).FullName +} + +Describe 'Invoke-AzNetworkSecurityPerimeterNspAccessRulesReconcile' { + It 'PostExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaJsonString' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaJsonFilePath' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityProfileExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityProfile' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityNetworkSecurityPerimeterExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityNetworkSecurityPerimeter' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'Post' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentity' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } +} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.Tests.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.Tests.ps1 new file mode 100644 index 000000000000..d5e1fc5fafd5 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.Tests.ps1 @@ -0,0 +1,49 @@ +if(($null -eq $TestName) -or ($TestName -contains 'Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile')) +{ + $loadEnvPath = Join-Path $PSScriptRoot 'loadEnv.ps1' + if (-Not (Test-Path -Path $loadEnvPath)) { + $loadEnvPath = Join-Path $PSScriptRoot '..\loadEnv.ps1' + } + . ($loadEnvPath) + $TestRecordingFile = Join-Path $PSScriptRoot 'Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile.Recording.json' + $currentPath = $PSScriptRoot + while(-not $mockingPath) { + $mockingPath = Get-ChildItem -Path $currentPath -Recurse -Include 'HttpPipelineMocking.ps1' -File + $currentPath = Split-Path -Path $currentPath -Parent + } + . ($mockingPath | Select-Object -First 1).FullName +} + +Describe 'Invoke-AzNetworkSecurityPerimeterNspAssociationReconcile' { + It 'PostExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaJsonString' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaJsonFilePath' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityNetworkSecurityPerimeterExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityNetworkSecurityPerimeter' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'Post' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentityExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PostViaIdentity' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } +} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeter.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeter.Recording.json index 8ca6a9826696..fbdf1e62efb2 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeter.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeter.Recording.json @@ -1,8 +1,8 @@ { - "New-AzNetworkSecurityPerimeter+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzr-psnsp1?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeter+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzr-psnsp1?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzr-psnsp1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzr-psnsp1?api-version=2023-08-01-preview", "Content": "{\r\n \"location\": \"eastus2euap\"\r\n}", "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Recording.json index 61b59cfbfe75..ae9f60511992 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Recording.json @@ -1,8 +1,8 @@ { - "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-08-01-preview", "Content": "{\r\n \"location\": \"eastus2euap\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"addressPrefixes\": [ \"10.10.0.0/16\" ]\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -30,14 +30,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"psaccessrule1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"psaccessrule1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]\"serviceTags\":[]}}", "isContentBase64": false } }, - "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithSubscriptions+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithSubscriptions+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1?api-version=2023-08-01-preview", "Content": "{\r\n \"location\": \"eastus2euap\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"subscriptions\": [\r\n {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9\"\r\n }\r\n ]\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -65,14 +65,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"psaccessrule1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[{\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9\"}],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"psaccessrule1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[{\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9\"}],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithEmailAddresses+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithEmailAddresses+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-08-01-preview", "Content": "{\r\n \"location\": \"eastus2euap\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"emailAddresses\": [ \"test123@microsoft.com\", \"test321@microsoft.com\" ]\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -100,14 +100,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"psaccessrule2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test123@microsoft.com\",\"test321@microsoft.com\"],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"psaccessrule2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test123@microsoft.com\",\"test321@microsoft.com\"],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithPhoneNumbers+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithPhoneNumbers+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-08-01-preview", "Content": "{\r\n \"location\": \"eastus2euap\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"phoneNumbers\": [ \"+919898989898\", \"+919898989898\" ]\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -135,7 +135,42 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"psaccessrule2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 9898989898\",\"+91 9898989898\"]}}", + "Content": "{\"name\":\"psaccessrule2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 9898989898\",\"+91 9898989898\"],\"serviceTags\":[]}}", + "isContentBase64": false + } + }, + "New-AzNetworkSecurityPerimeterAccessRule+[NoContext]+CreateExpandedWithServiceTags+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-08-01-preview+1": { + "Request": { + "Method": "PUT", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2?api-version=2023-08-01-preview", + "Content": "{\r\n \"location\": \"eastus2euap\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"serviceTags\": [ \"st1\", \"st2\" ]\r\n }\r\n}", + "isContentBase64": false, + "Headers": { + }, + "ContentHeaders": { + "Content-Type": [ "application/json" ], + "Content-Length": [ "146" ] + } + }, + "Response": { + "StatusCode": 200, + "Headers": { + "Cache-Control": [ "no-cache" ], + "Pragma": [ "no-cache" ], + "x-ms-ratelimit-remaining-subscription-writes": [ "1195" ], + "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], + "x-ms-request-id": [ "aaaeb1ba-c52f-4291-98ac-9dace8779570" ], + "x-ms-correlation-request-id": [ "aaaeb1ba-c52f-4291-98ac-9dace8779570" ], + "x-ms-routing-request-id": [ "SOUTHINDIA:20231219T110543Z:aaaeb1ba-c52f-4291-98ac-9dace8779570" ], + "X-Content-Type-Options": [ "nosniff" ], + "Date": [ "Tue, 19 Dec 2023 11:05:42 GMT" ] + }, + "ContentHeaders": { + "Content-Length": [ "538" ], + "Content-Type": [ "application/json; charset=utf-8" ], + "Expires": [ "-1" ] + }, + "Content": "{\"name\":\"psaccessrule2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2/accessRules/psaccessrule2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[\"st1\",\"st2\"]}}", "isContentBase64": false } } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 index 52c6785edaf0..f104229e3bf7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 @@ -51,4 +51,13 @@ Describe 'New-AzNetworkSecurityPerimeterAccessRule' { } | Should -Not -Throw } + + It 'CreateExpandedWithServiceTags' { + { + $servicetags = @("st1", "st2") + + New-AzNetworkSecurityPerimeterAccessRule -Name $env.accessRule2 -ProfileName $env.tmpProfile2 -ResourceGroupName $env.rgname -SecurityPerimeterName $env.tmpNsp1 -ServiceTag $servicetags -Direction 'Inbound' -Location $env.location + + } | Should -Not -Throw + } } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAssociation.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAssociation.Recording.json index 5f1a06ead873..bdd5b0185778 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAssociation.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterAssociation.Recording.json @@ -1,8 +1,8 @@ { - "New-AzNetworkSecurityPerimeterAssociation+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterAssociation+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": "{\r\n \"location\": \"eastus2euap\",\r\n \"properties\": {\r\n \"privateLinkResource\": {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.KeyVault/vaults/tjbzrt-paas4Rp\"\r\n },\r\n \"profile\": {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2\"\r\n },\r\n \"accessMode\": \"Learning\"\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -17,7 +17,7 @@ "Headers": { "Cache-Control": [ "no-cache" ], "Pragma": [ "no-cache" ], - "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview" ], + "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview" ], "x-ms-ratelimit-remaining-subscription-writes": [ "1194" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-request-id": [ "24ab3f31-2bd1-40ae-8b02-edcad730bde3" ], diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterLink.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterLink.Recording.json index 956b285ac1ea..8eb59615c9fb 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterLink.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterLink.Recording.json @@ -1,8 +1,8 @@ { - "New-AzNetworkSecurityPerimeterLink+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp6/links/pslink1?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterLink+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp6/links/pslink1?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp6/links/pslink1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp6/links/pslink1?api-version=2023-08-01-preview", "Content": "{\r\n \"properties\": {\r\n \"autoApprovedRemotePerimeterResourceId\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp7\",\r\n \"localInboundProfiles\": [ \"*\" ],\r\n \"remoteInboundProfiles\": [ \"*\" ]\r\n }\r\n}", "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterProfile.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterProfile.Recording.json index 4ae9391c23ab..b7b9583f9ac7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterProfile.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/New-AzNetworkSecurityPerimeterProfile.Recording.json @@ -1,8 +1,8 @@ { - "New-AzNetworkSecurityPerimeterProfile+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/psprofile1?api-version=2023-07-01-preview+1": { + "New-AzNetworkSecurityPerimeterProfile+[NoContext]+CreateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/psprofile1?api-version=2023-08-01-preview+1": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/psprofile1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/psprofile1?api-version=2023-08-01-preview", "Content": "{\r\n}", "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeter.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeter.Recording.json index 4a451c9633b8..6a75bc8c14c5 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeter.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeter.Recording.json @@ -1,8 +1,8 @@ { - "Remove-AzNetworkSecurityPerimeter+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD1?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeter+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD1?api-version=2023-08-01-preview+1": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -38,10 +38,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeter+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeter+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -78,10 +78,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeter+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeter+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-08-01-preview+2": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAccessRule.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAccessRule.Recording.json index 86258239b50f..b9a4a5b504b7 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAccessRule.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAccessRule.Recording.json @@ -1,8 +1,8 @@ { - "Remove-AzNetworkSecurityPerimeterAccessRule+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/tmpAccessRuleDelete1?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterAccessRule+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/tmpAccessRuleDelete1?api-version=2023-08-01-preview+1": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/tmpAccessRuleDelete1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/tmpAccessRuleDelete1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -37,10 +37,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterAccessRule+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterAccessRule+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -73,14 +73,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-arD2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-arD2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterAccessRule+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterAccessRule+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-08-01-preview+2": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-prDelB1/accessRules/t-arD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAssociation.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAssociation.Recording.json index 67c3a3fab079..ab9ed4c96b72 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAssociation.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterAssociation.Recording.json @@ -1,8 +1,8 @@ { - "Remove-AzNetworkSecurityPerimeterAssociation+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD1?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterAssociation+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD1?api-version=2023-08-01-preview+1": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -37,10 +37,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterAssociation+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterAssociation+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -77,10 +77,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterAssociation+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterAssociation+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-08-01-preview+2": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/resourceAssociations/t-asnD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLink.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLink.Recording.json index 5ad527f3fb92..6bd396b84a8c 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLink.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLink.Recording.json @@ -1,8 +1,8 @@ { - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3?api-version=2023-08-01-preview+1": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -22,7 +22,7 @@ "Headers": { "Cache-Control": [ "no-cache" ], "Pragma": [ "no-cache" ], - "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-07-01-preview" ], + "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-08-01-preview" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-ratelimit-remaining-subscription-deletes": [ "14993" ], "x-ms-request-id": [ "3912c7f1-2bbf-43e2-8345-17c9a6cada36" ], @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -77,10 +77,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-07-01-preview+3": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-08-01-preview+3": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8/links/t-linkD3/operationResults/f7d34b61-3932-4bb3-b87a-5578b8a38dea?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -115,10 +115,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -155,10 +155,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-08-01-preview+2": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -178,7 +178,7 @@ "Headers": { "Cache-Control": [ "no-cache" ], "Pragma": [ "no-cache" ], - "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-07-01-preview" ], + "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-08-01-preview" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-ratelimit-remaining-subscription-deletes": [ "14992" ], "x-ms-request-id": [ "03bde1bb-af2d-41ae-a617-107f509ff966" ], @@ -195,10 +195,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-07-01-preview+3": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-08-01-preview+3": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -233,10 +233,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-07-01-preview+4": { + "Remove-AzNetworkSecurityPerimeterLink+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-08-01-preview+4": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10/links/t-linkD4/operationResults/2af7dfac-21f5-446a-b8b4-31bc9ccc6fc3?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLinkReference.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLinkReference.Recording.json index bca5b77bd648..f7d63e3a525b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLinkReference.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterLinkReference.Recording.json @@ -1,8 +1,8 @@ { - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp8?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc?api-version=2023-08-01-preview+2": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -62,7 +62,7 @@ "Headers": { "Cache-Control": [ "no-cache" ], "Pragma": [ "no-cache" ], - "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-07-01-preview" ], + "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-08-01-preview" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-ratelimit-remaining-subscription-deletes": [ "14991" ], "x-ms-request-id": [ "ca8c1a98-0fbf-46ab-af19-cd2a09cbe9f0" ], @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-07-01-preview+3": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-08-01-preview+3": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -117,10 +117,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-07-01-preview+4": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+Delete+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-08-01-preview+4": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp9/linkReferences/Ref-from-t-linkD3-29102081-333d-41cf-909e-0e35c454b8bc/operationResults/1fa4679c-d4a3-4a87-929e-47faa5ccaf30?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -155,10 +155,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp10?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -195,10 +195,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -235,10 +235,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-07-01-preview+3": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-08-01-preview+3": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -258,7 +258,7 @@ "Headers": { "Cache-Control": [ "no-cache" ], "Pragma": [ "no-cache" ], - "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-07-01-preview" ], + "Location": [ "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-08-01-preview" ], "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], "x-ms-ratelimit-remaining-subscription-deletes": [ "14990" ], "x-ms-request-id": [ "06408263-693d-4b44-b0d6-34a55336cbe5" ], @@ -275,10 +275,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-07-01-preview+4": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-08-01-preview+4": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -313,10 +313,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-07-01-preview+5": { + "Remove-AzNetworkSecurityPerimeterLinkReference+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-08-01-preview+5": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp11/linkReferences/Ref-from-t-linkD4-23ca84e4-1303-4801-a82d-e223a9ca8e60/operationResults/2684d931-22c7-444b-8645-f9f1ea4e3a0e?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterProfile.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterProfile.Recording.json index 2448ec8134ac..777d75ca4f5e 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterProfile.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Remove-AzNetworkSecurityPerimeterProfile.Recording.json @@ -1,8 +1,8 @@ { - "Remove-AzNetworkSecurityPerimeterProfile+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD1?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterProfile+[NoContext]+Delete+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD1?api-version=2023-08-01-preview+1": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -38,10 +38,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterProfile+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-07-01-preview+1": { + "Remove-AzNetworkSecurityPerimeterProfile+[NoContext]+DeleteViaIdentity+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -78,10 +78,10 @@ "isContentBase64": false } }, - "Remove-AzNetworkSecurityPerimeterProfile+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-07-01-preview+2": { + "Remove-AzNetworkSecurityPerimeterProfile+[NoContext]+DeleteViaIdentity+$DELETE+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-08-01-preview+2": { "Request": { "Method": "DELETE", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nspDelB1/profiles/t-profileD2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeter.Tests.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeter.Tests.ps1 new file mode 100644 index 000000000000..a8f2f8bf320e --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeter.Tests.ps1 @@ -0,0 +1,41 @@ +if(($null -eq $TestName) -or ($TestName -contains 'Update-AzNetworkSecurityPerimeter')) +{ + $loadEnvPath = Join-Path $PSScriptRoot 'loadEnv.ps1' + if (-Not (Test-Path -Path $loadEnvPath)) { + $loadEnvPath = Join-Path $PSScriptRoot '..\loadEnv.ps1' + } + . ($loadEnvPath) + $TestRecordingFile = Join-Path $PSScriptRoot 'Update-AzNetworkSecurityPerimeter.Recording.json' + $currentPath = $PSScriptRoot + while(-not $mockingPath) { + $mockingPath = Get-ChildItem -Path $currentPath -Recurse -Include 'HttpPipelineMocking.ps1' -File + $currentPath = Split-Path -Path $currentPath -Parent + } + . ($mockingPath | Select-Object -First 1).FullName +} + +Describe 'Update-AzNetworkSecurityPerimeter' { + It 'PatchExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PatchViaJsonString' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PatchViaJsonFilePath' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'Patch' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PatchViaIdentityExpanded' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } + + It 'PatchViaIdentity' -skip { + { throw [System.NotImplementedException] } | Should -Not -Throw + } +} diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Recording.json index 1512d45084f7..af26f4e0c5d0 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Recording.json @@ -1,8 +1,8 @@ { - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -35,15 +35,15 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+2": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", - "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"addressPrefixes\": [ \"10.10.0.0/17\" ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", + "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"addressPrefixes\": [ \"10.10.0.0/17\" ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"phoneNumbers\": [ ],\r\n \"serviceTags\": [ ]\r\n }\r\n}", "isContentBase64": false, "Headers": { }, @@ -70,14 +70,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/17\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/17\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -110,14 +110,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/17\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/17\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -150,15 +150,15 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/17\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.10.0.0/17\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-07-01-preview", - "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"addressPrefixes\": [ \"10.0.0.0/16\" ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1?api-version=2023-08-01-preview", + "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"addressPrefixes\": [ \"10.0.0.0/16\" ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"serviceTags\": [ ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", "isContentBase64": false, "Headers": { }, @@ -185,14 +185,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.0.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar1\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar1\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[\"10.0.0.0/16\"],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedFQDN+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedFQDN+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -225,14 +225,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"*\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"*\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedFQDN+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedFQDN+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -265,15 +265,15 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"*\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"*\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedFQDN+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedFQDN+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-07-01-preview", - "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"addressPrefixes\": [ ],\r\n \"fullyQualifiedDomainNames\": [ \"microsoft.com\", \"nsp.microsoft.com\" ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2?api-version=2023-08-01-preview", + "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"addressPrefixes\": [ ],\r\n \"fullyQualifiedDomainNames\": [ \"microsoft.com\", \"nsp.microsoft.com\" ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"serviceTags\": [ ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", "isContentBase64": false, "Headers": { }, @@ -300,14 +300,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"microsoft.com\",\"nsp.microsoft.com\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar2\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar2\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[\"microsoft.com\",\"nsp.microsoft.com\"],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedEmail+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedEmail+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -340,14 +340,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test1@microsoft.com\",\"test2@microsoft.com\"],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test1@microsoft.com\",\"test2@microsoft.com\"],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedEmail+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedEmail+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -380,14 +380,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test1@microsoft.com\",\"test2@microsoft.com\"],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"test1@microsoft.com\",\"test2@microsoft.com\"],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedEmail+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedEmail+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3?api-version=2023-08-01-preview", "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"addressPrefixes\": [ ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ \"update1@microsoft.com\", \"update2@microsoft.com\" ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -415,14 +415,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"update1@microsoft.com\",\"update2@microsoft.com\"],\"phoneNumbers\":[]}}", + "Content": "{\"name\":\"t-ar3\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar3\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[\"update1@microsoft.com\",\"update2@microsoft.com\"],\"phoneNumbers\":[],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedSMS+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedSMS+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -455,14 +455,14 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 7878787878\",\"+91 9898989898\"]}}", + "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 7878787878\",\"+91 9898989898\"],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedSMS+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedSMS+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -495,15 +495,15 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 7878787878\",\"+91 9898989898\"]}}", + "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 7878787878\",\"+91 9898989898\"],\"serviceTags\":[]}}", "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedSMS+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedSMS+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-07-01-preview", - "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"addressPrefixes\": [ ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"phoneNumbers\": [ \"+919876543210\", \"+919876543211\" ]\r\n }\r\n}", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview", + "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\r\n \"properties\": {\r\n \"direction\": \"Outbound\",\r\n \"addressPrefixes\": [ ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"serviceTags\": [ ],\r\n \"phoneNumbers\": [ \"+919876543210\", \"+919876543211\" ]\r\n }\r\n}", "isContentBase64": false, "Headers": { }, @@ -530,8 +530,124 @@ "Content-Type": [ "application/json; charset=utf-8" ], "Expires": [ "-1" ] }, - "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[\"+91 9876543210\",\"+91 9876543211\"]}}", + "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Outbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"serviceTags\":[],\"phoneNumbers\":[\"+91 9876543210\",\"+91 9876543211\"]}}", + "isContentBase64": false + } + }, + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedServiceTag+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview+1": { + "Request": { + "Method": "GET", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview", + "Content": null, + "isContentBase64": false, + "Headers": { + "x-ms-unique-id": [ "79" ], + "x-ms-client-request-id": [ "70e56cf7-3eea-429b-86a6-9dce25ff1b0f" ], + "CommandName": [ "Get-AzNetworkSecurityPerimeterAccessRule" ], + "FullCommandName": [ "Get-AzNetworkSecurityPerimeterAccessRule_Get" ], + "ParameterSetName": [ "__AllParameterSets" ], + "User-Agent": [ "AzurePowershell/v0.0.0", "PSVersion/v7.2.17", "Az.NetworkSecurityPerimeter/0.1.0" ], + "Authorization": [ "[Filtered]" ] + }, + "ContentHeaders": { + } + }, + "Response": { + "StatusCode": 200, + "Headers": { + "Cache-Control": [ "no-cache" ], + "Pragma": [ "no-cache" ], + "x-ms-ratelimit-remaining-subscription-reads": [ "11946" ], + "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], + "x-ms-request-id": [ "69491519-2ed1-4a86-8aba-d747d55ad084" ], + "x-ms-correlation-request-id": [ "69491519-2ed1-4a86-8aba-d747d55ad084" ], + "x-ms-routing-request-id": [ "SOUTHINDIA:20231219T110828Z:69491519-2ed1-4a86-8aba-d747d55ad084" ], + "X-Content-Type-Options": [ "nosniff" ], + "Date": [ "Tue, 19 Dec 2023 11:08:28 GMT" ] + }, + "ContentHeaders": { + "Content-Length": [ "522" ], + "Content-Type": [ "application/json; charset=utf-8" ], + "Expires": [ "-1" ] + }, + "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[\"st1\",\"st2\"]}}", + "isContentBase64": false + } + }, + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedServiceTag+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview+2": { + "Request": { + "Method": "GET", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview", + "Content": null, + "isContentBase64": false, + "Headers": { + "x-ms-unique-id": [ "80" ], + "x-ms-client-request-id": [ "a9405c65-bd83-4dd6-8966-e3b8a6b68bff" ], + "CommandName": [ "Get-AzNetworkSecurityPerimeterAccessRule" ], + "FullCommandName": [ "Get-AzNetworkSecurityPerimeterAccessRule_GetViaIdentity" ], + "ParameterSetName": [ "__AllParameterSets" ], + "User-Agent": [ "AzurePowershell/v0.0.0", "PSVersion/v7.2.17", "Az.NetworkSecurityPerimeter/0.1.0" ], + "Authorization": [ "[Filtered]" ] + }, + "ContentHeaders": { + } + }, + "Response": { + "StatusCode": 200, + "Headers": { + "Cache-Control": [ "no-cache" ], + "Pragma": [ "no-cache" ], + "x-ms-ratelimit-remaining-subscription-reads": [ "11945" ], + "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], + "x-ms-request-id": [ "e4cedbd1-b631-4ab3-8adb-94e81df37cea" ], + "x-ms-correlation-request-id": [ "e4cedbd1-b631-4ab3-8adb-94e81df37cea" ], + "x-ms-routing-request-id": [ "SOUTHINDIA:20231219T110829Z:e4cedbd1-b631-4ab3-8adb-94e81df37cea" ], + "X-Content-Type-Options": [ "nosniff" ], + "Date": [ "Tue, 19 Dec 2023 11:08:29 GMT" ] + }, + "ContentHeaders": { + "Content-Length": [ "522" ], + "Content-Type": [ "application/json; charset=utf-8" ], + "Expires": [ "-1" ] + }, + "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"phoneNumbers\":[],\"serviceTags\":[\"st1\",\"st2\"]}}", + "isContentBase64": false + } + }, + "Update-AzNetworkSecurityPerimeterAccessRule+[NoContext]+UpdateViaIdentityExpandedServiceTag+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview+3": { + "Request": { + "Method": "PUT", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4?api-version=2023-08-01-preview", + "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\r\n \"properties\": {\r\n \"direction\": \"Inbound\",\r\n \"addressPrefixes\": [ ],\r\n \"fullyQualifiedDomainNames\": [ ],\r\n \"subscriptions\": [ ],\r\n \"emailAddresses\": [ ],\r\n \"serviceTags\": [ \"st1\", \"st2\" ],\r\n \"phoneNumbers\": [ ]\r\n }\r\n}", + "isContentBase64": false, + "Headers": { + }, + "ContentHeaders": { + "Content-Type": [ "application/json" ], + "Content-Length": [ "433" ] + } + }, + "Response": { + "StatusCode": 200, + "Headers": { + "Cache-Control": [ "no-cache" ], + "Pragma": [ "no-cache" ], + "x-ms-ratelimit-remaining-subscription-writes": [ "1187" ], + "Strict-Transport-Security": [ "max-age=31536000; includeSubDomains" ], + "x-ms-request-id": [ "4b36a026-2a36-45c4-8e92-3bac11a2fdd8" ], + "x-ms-correlation-request-id": [ "4b36a026-2a36-45c4-8e92-3bac11a2fdd8" ], + "x-ms-routing-request-id": [ "SOUTHINDIA:20231219T110830Z:4b36a026-2a36-45c4-8e92-3bac11a2fdd8" ], + "X-Content-Type-Options": [ "nosniff" ], + "Date": [ "Tue, 19 Dec 2023 11:08:30 GMT" ] + }, + "ContentHeaders": { + "Content-Length": [ "522" ], + "Content-Type": [ "application/json; charset=utf-8" ], + "Expires": [ "-1" ] + }, + "Content": "{\"name\":\"t-ar4\",\"id\":\"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile1/accessRules/t-ar4\",\"type\":\"Microsoft.Network/networkSecurityPerimeters/profiles/accessRules\",\"properties\":{\"provisioningState\":\"Succeeded\",\"direction\":\"Inbound\",\"addressPrefixes\":[],\"fullyQualifiedDomainNames\":[],\"subscriptions\":[],\"networkSecurityPerimeters\":[],\"emailAddresses\":[],\"serviceTags\":[\"st1\",\"st2\"],\"phoneNumbers\":[]}}", "isContentBase64": false } } + } \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 index 4a59680ff127..36dc8805ec0b 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAccessRule.Tests.ps1 @@ -71,4 +71,15 @@ Describe 'Update-AzNetworkSecurityPerimeterAccessRule' { } | Should -Not -Throw } + It 'UpdateViaIdentityExpandedServiceTag' { + { + # this test case is dependent on the above test case + $GETObj = Get-AzNetworkSecurityPerimeterAccessRule -Name $env.tmpAccessRule4 -ResourceGroupName $env.rgname -SecurityPerimeterName $env.tmpNsp1 -ProfileName $env.tmpProfile1 + + $UpdateObj = Update-AzNetworkSecurityPerimeterAccessRule -InputObject $GETObj -ServiceTag @('st1', 'st2') + + $UpdateObj.ServiceTag | Should -Be @('st1', 'st2') + + } | Should -Not -Throw + } } diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAssociation.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAssociation.Recording.json index 0afc0451e057..e90fec373c83 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAssociation.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterAssociation.Recording.json @@ -1,8 +1,8 @@ { - "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -79,10 +79,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1\",\r\n \"properties\": {\r\n \"privateLinkResource\": {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.KeyVault/vaults/tjbzrt-paas4Rp\"\r\n },\r\n \"profile\": {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2\"\r\n },\r\n \"accessMode\": \"Enforced\"\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -114,10 +114,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -154,10 +154,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -194,10 +194,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateViaIdentityExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterAssociation+[NoContext]+UpdateViaIdentityExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1?api-version=2023-08-01-preview", "Content": "{\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/resourceAssociations/psassociation1\",\r\n \"properties\": {\r\n \"privateLinkResource\": {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.KeyVault/vaults/tjbzrt-paas4Rp\"\r\n },\r\n \"profile\": {\r\n \"id\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp1/profiles/t-profile2\"\r\n },\r\n \"accessMode\": \"Learning\"\r\n }\r\n}", "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterLink.Recording.json b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterLink.Recording.json index b9060040024a..f440435fbc5d 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterLink.Recording.json +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/Update-AzNetworkSecurityPerimeterLink.Recording.json @@ -1,8 +1,8 @@ { - "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -39,10 +39,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview+2": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview", "Content": "{\r\n \"properties\": {\r\n \"autoApprovedRemotePerimeterResourceId\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp5\",\r\n \"localInboundProfiles\": [ \"*\" ],\r\n \"remoteInboundProfiles\": [ \"*\" ],\r\n \"description\": \"Auto Approved.\"\r\n }\r\n}", "isContentBase64": false, "Headers": { @@ -74,10 +74,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview+1": { + "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview+1": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -114,10 +114,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview+2": { + "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateViaIdentityExpanded+$GET+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview+2": { "Request": { "Method": "GET", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview", "Content": null, "isContentBase64": false, "Headers": { @@ -154,10 +154,10 @@ "isContentBase64": false } }, - "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateViaIdentityExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview+3": { + "Update-AzNetworkSecurityPerimeterLink+[NoContext]+UpdateViaIdentityExpanded+$PUT+https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview+3": { "Request": { "Method": "PUT", - "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-07-01-preview", + "RequestUri": "https://management.azure.com/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp4/links/t-link2?api-version=2023-08-01-preview", "Content": "{\r\n \"properties\": {\r\n \"autoApprovedRemotePerimeterResourceId\": \"/subscriptions/3846cb0f-4afa-47ee-8ea4-1c8449c8c8d9/resourceGroups/psrg_tjbzr/providers/Microsoft.Network/networkSecurityPerimeters/tjbzrt-nsp5\",\r\n \"localInboundProfiles\": [ \"*\" ],\r\n \"remoteInboundProfiles\": [ \"*\" ],\r\n \"description\": \"Auto Approved.\"\r\n }\r\n}", "isContentBase64": false, "Headers": { diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/test/loadEnv.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/test/loadEnv.ps1 index 5f079e89615e..6a7c385c6b7d 100644 --- a/src/Network/NetworkSecurityPerimeter.Autorest/test/loadEnv.ps1 +++ b/src/Network/NetworkSecurityPerimeter.Autorest/test/loadEnv.ps1 @@ -25,5 +25,5 @@ if (Test-Path -Path (Join-Path $PSScriptRoot $envFile)) { $env = @{} if (Test-Path -Path $envFilePath) { $env = Get-Content (Join-Path $PSScriptRoot $envFile) | ConvertFrom-Json - $PSDefaultParameterValues=@{"*:SubscriptionId"=$env.SubscriptionId; "*:Tenant"=$env.Tenant} + $PSDefaultParameterValues=@{"*:Tenant"=$env.Tenant} } \ No newline at end of file diff --git a/src/Network/NetworkSecurityPerimeter.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 b/src/Network/NetworkSecurityPerimeter.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 new file mode 100644 index 000000000000..5319862d3372 --- /dev/null +++ b/src/Network/NetworkSecurityPerimeter.Autorest/utils/Get-SubscriptionIdTestSafe.ps1 @@ -0,0 +1,7 @@ +param() +if ($env:AzPSAutorestTestPlaybackMode) { + $loadEnvPath = Join-Path $PSScriptRoot '..' 'test' 'loadEnv.ps1' + . ($loadEnvPath) + return $env.SubscriptionId +} +return (Get-AzContext).Subscription.Id \ No newline at end of file