Skip to content

Commit d2eca71

Browse files
feat: Add logging to Get-AzKeyVaultAccessPolicies #271 (#283)
Co-authored-by: Stijn Moreels <9039753+stijnmoreels@users.noreply.github.com>
1 parent 76514ac commit d2eca71

2 files changed

Lines changed: 7 additions & 2 deletions

File tree

src/Arcus.Scripting.KeyVault/Scripts/Get-AzKeyVaultAccessPolicies.ps1

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -32,9 +32,14 @@ if($keyVault) {
3232
storage = $keyVaultAccessPolicy.PermissionsToStorage
3333
}
3434

35+
Write-Verbose "Azure Key Vault access policy successfully retrieved for TenantId: $($armAccessPolicy.tenantId) and ObjectId: $($armAccessPolicy.ObjectId)"
36+
Write-Verbose ($armAccessPolicyPermissions | Format-list | Out-String)
37+
3538
$armAccessPolicy | Add-Member -MemberType NoteProperty -Name permissions -Value $armAccessPolicyPermissions
3639
$armAccessPolicies += $armAccessPolicy
37-
}
40+
}
41+
42+
Write-Host "Successfully retrieved Azure Key Vault access policies"
3843
}
3944
} else {
4045
Write-Warning "Azure Key Vault '$keyVaultName' could not be found, please check if the provided vault name and/or resource group name is correct."

src/Arcus.Scripting.Tests.Unit/Arcus.Scripting.KeyVault.tests.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -22,7 +22,7 @@ InModuleScope Arcus.Scripting.KeyVault {
2222
Mock Get-AzKeyVault { return [pscustomobject]@{ accessPolicies = @($accessPolicy) } }
2323

2424
# Act
25-
$accessPoliciesParameter = Get-AzKeyVaultAccessPolicies -KeyVaultName "key vault" -ResourceGroupName "resource group name"
25+
$accessPoliciesParameter = Get-AzKeyVaultAccessPolicies -KeyVaultName "key vault" -ResourceGroupName "resource group name" -verbose
2626

2727
# Assert
2828
$accessPolicies = $accessPoliciesParameter.list

0 commit comments

Comments
 (0)