Skip to content

Commit fffdfc5

Browse files
Ptnan7Jingnan Xu
andauthored
{Front Door} Bump Az.FrontDoor version to 2025-10-01 (#28799)
Co-authored-by: Jingnan Xu <[email protected]>
1 parent 54bab20 commit fffdfc5

File tree

127 files changed

+2551
-1993
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

127 files changed

+2551
-1993
lines changed

src/FrontDoor/FrontDoor.Autorest/README.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -28,16 +28,16 @@ For information on how to develop for `Az.FrontDoor`, see [how-to.md](how-to.md)
2828
2929
```yaml
3030
# pin the swagger version by using the commit id instead of branch name
31-
commit: f11631f1c1057d8363f9e3f9597c73b90f8924c8
31+
commit: 03253947022beee13bf4782c4ebef93a0afa237b
3232
require:
3333
# readme.azure.noprofile.md is the common configuration file
3434
- $(this-folder)/../../readme.azure.noprofile.md
3535
# If the swagger has not been put in the repo, you may uncomment the following line and refer to it locally
3636
input-file:
3737
# You need to specify your swagger files here.
38-
- $(repo)/specification/frontdoor/resource-manager/Microsoft.Network/stable/2025-03-01/webapplicationfirewall.json
39-
- $(repo)/specification/frontdoor/resource-manager/Microsoft.Network/stable/2025-03-01/network.json
40-
- $(repo)/specification/frontdoor/resource-manager/Microsoft.Network/stable/2021-06-01/frontdoor.json
38+
- $(repo)/specification/frontdoor/resource-manager/Microsoft.Network/stable/2025-10-01/webapplicationfirewall.json
39+
- $(repo)/specification/frontdoor/resource-manager/Microsoft.Network/stable/2025-10-01/network.json
40+
- $(repo)/specification/frontdoor/resource-manager/Microsoft.Network/stable/2025-10-01/frontdoor.json
4141

4242
try-require:
4343
- $(repo)/specification/xxx/resource-manager/readme.powershell.md

src/FrontDoor/FrontDoor.Autorest/UX/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"resourceType": "FrontDoorWebApplicationFirewallPolicies",
3-
"apiVersion": "2025-03-01",
3+
"apiVersion": "2025-10-01",
44
"learnMore": {
55
"url": "https://learn.microsoft.com/powershell/module/az.frontdoor"
66
},

src/FrontDoor/FrontDoor.Autorest/UX/Microsoft.Network/frontDoors-frontendEndpoints.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"resourceType": "frontDoors/frontendEndpoints",
3-
"apiVersion": "2021-06-01",
3+
"apiVersion": "2025-10-01",
44
"learnMore": {
55
"url": "https://learn.microsoft.com/powershell/module/az.frontdoor"
66
},

src/FrontDoor/FrontDoor.Autorest/UX/Microsoft.Network/frontDoors-rulesEngines.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"resourceType": "frontDoors/rulesEngines",
3-
"apiVersion": "2021-06-01",
3+
"apiVersion": "2025-10-01",
44
"learnMore": {
55
"url": "https://learn.microsoft.com/powershell/module/az.frontdoor"
66
},

src/FrontDoor/FrontDoor.Autorest/UX/Microsoft.Network/frontDoors.json

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"resourceType": "frontDoors",
3-
"apiVersion": "2021-06-01",
3+
"apiVersion": "2025-10-01",
44
"learnMore": {
55
"url": "https://learn.microsoft.com/powershell/module/az.frontdoor"
66
},

src/FrontDoor/FrontDoor.Autorest/custom/autogen-model-cmdlets/New-AzFrontDoorWafMatchConditionObject.ps1

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ function New-AzFrontDoorWafMatchConditionObject {
4242
[bool]
4343
$NegateCondition,
4444
[Parameter(Mandatory, HelpMessage="Comparison type to use for matching with the variable value.")]
45-
[Microsoft.Azure.PowerShell.Cmdlets.FrontDoor.PSArgumentCompleterAttribute("Any", "IPMatch", "GeoMatch", "Equal", "Contains", "LessThan", "GreaterThan", "LessThanOrEqual", "GreaterThanOrEqual", "BeginsWith", "EndsWith", "RegEx")]
45+
[Microsoft.Azure.PowerShell.Cmdlets.FrontDoor.PSArgumentCompleterAttribute("Any", "IPMatch", "GeoMatch", "Equal", "Contains", "LessThan", "GreaterThan", "LessThanOrEqual", "GreaterThanOrEqual", "BeginsWith", "EndsWith", "RegEx", "ServiceTagMatch")]
4646
[string]
4747
$OperatorProperty,
4848
[Parameter(HelpMessage="Match against a specific key from the QueryString, PostArgs, RequestHeader or Cookies variables. Default is null.")]

src/FrontDoor/FrontDoor.Autorest/docs/Disable-AzFrontDoorCustomDomainHttps.md

Lines changed: 2 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -42,24 +42,7 @@ Disable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontD
4242
```
4343

4444
```output
45-
HostName : frontendpointname1.custom.xyz
46-
SessionAffinityEnabledState : Disabled
47-
SessionAffinityTtlSeconds : 0
48-
WebApplicationFirewallPolicyLink :
49-
Backends :
50-
CustomHttpsProvisioningState : Disabling
51-
CustomHttpsProvisioningSubstate : DeletingCertificate
52-
CertificateSource : FrontDoor
53-
ProtocolType : ServerNameIndication
54-
Vault :
55-
SecretName :
56-
SecretVersion :
57-
CertificateType :
58-
ResourceState : Enabled
59-
Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
60-
/providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
61-
Name : frontendpointname1-custom-xyz
62-
Type : Microsoft.Network/frontdoors/frontendendpoints
45+
$true
6346
```
6447

6548
Disable HTTPS for a custom domain "frontendpointname1-custom-xyz" with FrontDoorName as "frontdoor1" and ResourceGroupName as "resourcegroup1".
@@ -70,24 +53,7 @@ Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorNa
7053
```
7154

7255
```output
73-
HostName : frontendpointname1.custom.xyz
74-
SessionAffinityEnabledState : Disabled
75-
SessionAffinityTtlSeconds : 0
76-
WebApplicationFirewallPolicyLink :
77-
Backends :
78-
CustomHttpsProvisioningState : Disabling
79-
CustomHttpsProvisioningSubstate : DeletingCertificate
80-
CertificateSource : FrontDoor
81-
ProtocolType : ServerNameIndication
82-
Vault :
83-
SecretName :
84-
SecretVersion :
85-
CertificateType :
86-
ResourceState : Enabled
87-
Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
88-
/providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
89-
Name : frontendpointname1-custom-xyz
90-
Type : Microsoft.Network/frontdoors/frontendendpoints
56+
$true
9157
```
9258

9359
Disable HTTPS for a custom domain with PSFrontendEndpoint object.

src/FrontDoor/FrontDoor.Autorest/docs/Enable-AzFrontDoorCustomDomainHttps.md

Lines changed: 3 additions & 67 deletions
Original file line numberDiff line numberDiff line change
@@ -71,84 +71,20 @@ Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDo
7171
```
7272

7373
```output
74-
HostName : frontendpointname1.custom.xyz
75-
SessionAffinityEnabledState : Disabled
76-
SessionAffinityTtlSeconds : 0
77-
WebApplicationFirewallPolicyLink :
78-
Backends :
79-
CustomHttpsProvisioningState : Enabling
80-
CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
81-
CertificateSource : FrontDoor
82-
ProtocolType : ServerNameIndication
83-
MinimumTlsVersion : 1.2
84-
Vault :
85-
SecretName :
86-
SecretVersion :
87-
CertificateType :
88-
ResourceState : Enabled
89-
Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
90-
/providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
91-
Name : frontendpointname1-custom-xyz
92-
Type : Microsoft.Network/frontdoors/frontendendpoints
74+
$true
9375
```
9476

9577
Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of Front Door "frontdoor1" in resource group "resourcegroup1" using Front Door managed certificate.
9678

97-
### Example 2: Enable HTTPS for a custom domain with FrontDoorName and ResourceGroupName using customer's own certificate in Key Vault with the specific version.
98-
```powershell
99-
$vaultId = (Get-AzKeyVault -VaultName $vaultName).ResourceId
100-
Enable-AzFrontDoorCustomDomainHttps -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -FrontendEndpointName "frontendpointname1-custom-xyz" -VaultId $vaultId -secretName $secretName -SecretVersion $secretVersion -MinimumTlsVersion "1.0"
101-
```
102-
103-
```output
104-
HostName : frontendpointname1.custom.xyz
105-
SessionAffinityEnabledState : Disabled
106-
SessionAffinityTtlSeconds : 0
107-
WebApplicationFirewallPolicyLink :
108-
Backends :
109-
CustomHttpsProvisioningState : Enabling
110-
CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
111-
CertificateSource : AzureKeyVault
112-
ProtocolType : ServerNameIndication
113-
MinimumTlsVersion : 1.0
114-
Vault :
115-
SecretName :
116-
SecretVersion :
117-
CertificateType :
118-
ResourceState : Enabled
119-
Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
120-
/providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
121-
Name : frontendpointname1-custom-xyz
122-
Type : Microsoft.Network/frontdoors/frontendendpoints
123-
```
124-
12579
Enable HTTPS for a custom domain "frontendpointname1-custom-xyz" that is part of Front Door "frontdoor1" in resource group "resourcegroup1" using customer's own certificate in Key Vault with the specific version.
12680

127-
### Example 3: Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate.
81+
### Example 2: Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate.
12882
```powershell
12983
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "resourcegroup1" -FrontDoorName "frontdoor1" -Name "frontendpointname1-custom-xyz" | Enable-AzFrontDoorCustomDomainHttps
13084
```
13185

13286
```output
133-
HostName : frontendpointname1.custom.xyz
134-
SessionAffinityEnabledState : Disabled
135-
SessionAffinityTtlSeconds : 0
136-
WebApplicationFirewallPolicyLink :
137-
Backends :
138-
CustomHttpsProvisioningState : Enabling
139-
CustomHttpsProvisioningSubstate : SubmittingDomainControlValidationRequest
140-
CertificateSource : FrontDoor
141-
ProtocolType : ServerNameIndication
142-
MinimumTlsVersion : 1.2
143-
Vault :
144-
SecretName :
145-
SecretVersion :
146-
CertificateType :
147-
ResourceState : Enabled
148-
Id : /subscriptions/{guid}/resourcegroups/resourcegroup1
149-
/providers/Microsoft.Network/frontdoors/frontdoor1/frontendendpoints/frontendpointname1-custom-xyz
150-
Name : frontendpointname1-custom-xyz
151-
Type : Microsoft.Network/frontdoors/frontendendpoints
87+
$true
15288
```
15389

15490
Enable HTTPS for a custom domain with PSFrontendEndpoint object using Front Door managed certificate.

src/FrontDoor/FrontDoor.Autorest/docs/Get-AzFrontDoor.md

Lines changed: 32 additions & 81 deletions
Original file line numberDiff line numberDiff line change
@@ -45,39 +45,10 @@ Get-AzFrontDoor
4545
```
4646

4747
```output
48-
FriendlyName : frontdoor1
49-
FrontDoorId : {guid}
50-
RoutingRules : {routingrule1}
51-
BackendPools : {backendpool1}
52-
HealthProbeSettings : {healthProbeSetting1}
53-
LoadBalancingSettings : {loadbalancingsetting1}
54-
FrontendEndpoints : {frontendendpoint1}
55-
EnabledState : Enabled
56-
ResourceState : Enabled
57-
ProvisioningState : Succeeded
58-
Cname :
59-
Tags : {tag1, tag2}
60-
Id : /subscriptions/{guid}/resourcegroups/{guid1}/providers/M
61-
icrosoft.Network/frontdoors/frontdoor1
62-
Name : frontdoor1
63-
Type : Microsoft.Network/frontdoor1
64-
65-
FriendlyName : frontdoor1
66-
FrontDoorId : {guid}
67-
RoutingRules : {routingrule1}
68-
BackendPools : {backendpool1}
69-
HealthProbeSettings : {healthProbeSetting1}
70-
LoadBalancingSettings : {loadbalancingsetting1}
71-
FrontendEndpoints : {frontendendpoint1}
72-
EnabledState : Enabled
73-
ResourceState : Enabled
74-
ProvisioningState : Succeeded
75-
Cname :
76-
Tags : {tag1, tag2}
77-
Id : /subscriptions/{guid}/resourcegroups/{guid2}/providers/M
78-
icrosoft.Network/frontdoors/frontdoor1
79-
Name : frontdoor1
80-
Type : Microsoft.Network/frontdoor1
48+
Location Name ResourceGroupName
49+
-------- ---- -----------------
50+
Global {Name0} {rg0}
51+
CentralUs {Name1} {rg1}
8152
```
8253

8354
Get all FrontDoors in the current subscription.
@@ -88,39 +59,8 @@ Get-AzFrontDoor -ResourceGroupName "rg1"
8859
```
8960

9061
```output
91-
FriendlyName : frontdoor1
92-
FrontDoorId : {guid}
93-
RoutingRules : {routingrule1}
94-
BackendPools : {backendpool1}
95-
HealthProbeSettings : {healthProbeSetting1}
96-
LoadBalancingSettings : {loadbalancingsetting1}
97-
FrontendEndpoints : {frontendendpoint1}
98-
EnabledState : Enabled
99-
ResourceState : Enabled
100-
ProvisioningState : Succeeded
101-
Cname :
102-
Tags : {tag1, tag2}
103-
Id : /subscriptions/{guid}/resourcegroups/rg1/providers/M
104-
icrosoft.Network/frontdoors/frontdoor1
105-
Name : frontdoor1
106-
Type : Microsoft.Network/frontdoor1
107-
108-
FriendlyName : frontdoor2
109-
FrontDoorId : {guid}
110-
RoutingRules : {routingrule1}
111-
BackendPools : {backendpool1}
112-
HealthProbeSettings : {healthProbeSetting1}
113-
LoadBalancingSettings : {loadbalancingsetting1}
114-
FrontendEndpoints : {frontendendpoint1}
115-
EnabledState : Enabled
116-
ResourceState : Enabled
117-
ProvisioningState : Succeeded
118-
Cname :
119-
Tags : {tag1, tag2}
120-
Id : /subscriptions/{guid}/resourcegroups/rg1/providers/M
121-
icrosoft.Network/frontdoors/frontdoor1
122-
Name : frontdoor1
123-
Type : Microsoft.Network/frontdoor1
62+
Global name1 rg1
63+
Global name2 rg1
12464
```
12565

12666
Get all FrontDoors in resource group "rg1" in the current subscription.
@@ -131,22 +71,33 @@ Get-AzFrontDoor -ResourceGroupName "rg1" -Name "frontDoor1"
13171
```
13272

13373
```output
134-
FriendlyName : frontdoor1
135-
FrontDoorId : {guid}
136-
RoutingRules : {routingrule1}
137-
BackendPools : {backendpool1}
138-
HealthProbeSettings : {healthProbeSetting1}
139-
LoadBalancingSettings : {loadbalancingsetting1}
140-
FrontendEndpoints : {frontendendpoint1}
141-
EnabledState : Enabled
142-
ResourceState : Enabled
143-
ProvisioningState : Succeeded
144-
Cname :
145-
Tags : {tag1, tag2}
146-
Id : /subscriptions/{guid}/resourcegroups/rg1/providers/M
74+
BackendPool : {BackendPool0}
75+
BackendPoolsSetting : {
76+
"enforceCertificateNameCheck": "Enabled",
77+
"sendRecvTimeoutSeconds": 30
78+
}
79+
Cname :
80+
EnabledState : Disabled
81+
ExtendedProperty : {
82+
"MigratedTo": {link0}
83+
}
84+
FriendlyName : frontDoor1
85+
FrontdoorId : {guid0}
86+
FrontendEndpoint : {Endpoint0}
87+
HealthProbeSetting : {HealthProbeSetting0}
88+
Id : /subscriptions/{guid}/resourcegroups/rg1/providers/M
14789
icrosoft.Network/frontdoors/frontdoor1
148-
Name : frontdoor1
149-
Type : Microsoft.Network/frontdoor1
90+
LoadBalancingSetting : {LoadBalancingSetting0}
91+
Location : Global
92+
Name : frontDoor1
93+
ProvisioningState : Succeeded
94+
ResourceGroupName : {rg1}
95+
ResourceState : Migrated
96+
RoutingRule : {RoutingRule0,RoutingRule1}
97+
RulesEngine : {RulesEngine0,RulesEngine1}
98+
Tag : {
99+
}
100+
Type : Microsoft.Network/frontdoors
150101
```
151102

152103
Get the FrontDoors in resource group "rg1" with name "frontDoor1" in the current subscription.

src/FrontDoor/FrontDoor.Autorest/docs/Get-AzFrontDoorFrontendEndpoint.md

Lines changed: 1 addition & 15 deletions
Original file line numberDiff line numberDiff line change
@@ -53,21 +53,7 @@ Gets a Frontend endpoint with the specified name within the specified Front Door
5353

5454
## EXAMPLES
5555

56-
### Example 1: Get all frontend endpoints from a Front Door
57-
```powershell
58-
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "myResourceGroup" -FrontDoorName "myFrontDoor"
59-
```
60-
61-
```output
62-
HostName SessionAffinityEnabledState SessionAffinityTtlSecond WebApplicationFirewallPolicyLinkId CustomHttpsProvisioningState ResourceState
63-
-------- --------------------------- ------------------------ ---------------------------------- ---------------------------- -------------
64-
myFrontDoor-azurefd.net Disabled 0 Enabled Enabled
65-
www.contoso.com Disabled 0 /subscriptions/.../myWafPolicy Enabled Enabled
66-
```
67-
68-
Get all frontend endpoints configured in the specified Front Door resource.
69-
70-
### Example 2: Get a specific frontend endpoint by name
56+
### Example 1: Get a specific frontend endpoint by name
7157
```powershell
7258
Get-AzFrontDoorFrontendEndpoint -ResourceGroupName "myResourceGroup" -FrontDoorName "myFrontDoor" -Name "myFrontDoor-azurefd-net"
7359
```

0 commit comments

Comments
 (0)