[Compute] az sig in-vm-access-control-profile: Support GalleryInVMAccessControlProfile#31720
[Compute] az sig in-vm-access-control-profile: Support GalleryInVMAccessControlProfile#31720
az sig in-vm-access-control-profile: Support GalleryInVMAccessControlProfile#31720Conversation
️✔️AzureCLI-FullTest
|
|
| rule | cmd_name | rule_message | suggest_message |
|---|---|---|---|
| sig in-vm-access-control-profile | sub group sig in-vm-access-control-profile added |
||
| sig in-vm-access-control-profile-version | sub group sig in-vm-access-control-profile-version added |
There was a problem hiding this comment.
Pull Request Overview
This PR adds support for managing in‐VM access control profiles and their versions in the Compute module. It introduces new command groups and corresponding operations (create, update, show, delete, wait) for both in‐VM access control profiles and for their configuration (privileges, roles, identities, role assignments).
Reviewed Changes
Copilot reviewed 19 out of 20 changed files in this pull request and generated no comments.
Show a summary per file
| File | Description |
|---|---|
| src/azure-cli/azure/cli/command_modules/vm/tests/latest/test_vm_commands.py | Updated tests to cover the new commands for in‐VM access control profiles and versions. |
| src/azure-cli/azure/cli/command_modules/vm/operations/sig_in_vm_access_control_profile_version_config.py | New operations for configuring privileges, roles, identities, and role assignments for in‐VM access control profile versions. |
| src/azure-cli/azure/cli/command_modules/vm/operations/sig_in_vm_access_control_profile_version.py | Added create and update operations for in‐VM access control profile versions. |
| src/azure-cli/azure/cli/command_modules/vm/linter_exclusions.yml | Added new exclusion rules for parameters related to in‐VM access control profile commands. |
| src/azure-cli/azure/cli/command_modules/vm/commands.py | Registered the new command groups for in‐VM access control profile versions and configuration commands. |
| Multiple files under src/azure-cli/azure/cli/command_modules/vm/aaz/latest/sig/in_vm_access_control_profile[-version]/ | Auto‐generated command implementation files (create, delete, show, update, wait, and command group definitions). |
|
Thank you for your contribution! We will review the pull request and get back to you soon. |
|
The git hooks are available for azure-cli and azure-cli-extensions repos. They could help you run required checks before creating the PR. Please sync the latest code with latest dev branch (for azure-cli) or main branch (for azure-cli-extensions). pip install azdev --upgrade
azdev setup -c <your azure-cli repo path> -r <your azure-cli-extensions repo path>
|
…nto msp-feature
Related command
az sig in-vm-access-control-profile create/update/delete/showaz sig in-vm-access-control-profile-version create/update/delete/showaz sig in-vm-access-control-profile-version config privilege add/removenot supported yetaz sig in-vm-access-control-profile-version config role add/removenot supported yetaz sig in-vm-access-control-profile-version config identity add/removenot supported yetaz sig in-vm-access-control-profile-version config role-assignment add/removenot supported yetDescription
Currently, the
rulesproperty is not updatable, but it will be supported in the future. I’ve moved theaz sig in-vm-access-control-profile-version configcommand group from this branch to themsp-feature-rulesbranch in the yanzhudd repo. We’ll support this command group once the backend server is ready to handle updates to the rules property.Close: #31626
aaz PR: Azure/aaz#793
Testing Guide
History Notes
[Compute]
az sig in-vm-access-control-profile: Add command group to manage in VM access control profile[Compute]
az sig in-vm-access-control-profile-version: Add command group to manage in VM access control profile versionThis checklist is used to make sure that common guidelines for a pull request are followed.
The PR title and description has followed the guideline in Submitting Pull Requests.
I adhere to the Command Guidelines.
I adhere to the Error Handling Guidelines.