-
Notifications
You must be signed in to change notification settings - Fork 3.4k
"az network front-door waf-policy managed-rules add" only working for Type DefaultRuleSet Version 1.0 #24148
Copy link
Copy link
Closed
Azure/azure-cli-extensions
#5458Labels
Auto-AssignAuto assign by botAuto assign by botCXP AttentionThis issue is handled by CXP team.This issue is handled by CXP team.Networkaz network vnet/lb/nic/dns/etc...az network vnet/lb/nic/dns/etc...Network - Front DoorbugThis issue requires a change to an existing behavior in the product in order to be resolved.This issue requires a change to an existing behavior in the product in order to be resolved.customer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.needs-team-attentionThis issue needs attention from Azure service team or SDK teamThis issue needs attention from Azure service team or SDK team
Milestone
Metadata
Metadata
Assignees
Labels
Auto-AssignAuto assign by botAuto assign by botCXP AttentionThis issue is handled by CXP team.This issue is handled by CXP team.Networkaz network vnet/lb/nic/dns/etc...az network vnet/lb/nic/dns/etc...Network - Front DoorbugThis issue requires a change to an existing behavior in the product in order to be resolved.This issue requires a change to an existing behavior in the product in order to be resolved.customer-reportedIssues that are reported by GitHub users external to the Azure organization.Issues that are reported by GitHub users external to the Azure organization.needs-team-attentionThis issue needs attention from Azure service team or SDK teamThis issue needs attention from Azure service team or SDK team
Type
Fields
Give feedbackNo fields configured for issues without a type.
Related command
az network front-door waf-policy managed-rules add --policy-name MyWaf" --resource-group "MyRg" --type Microsoft_DefaultRuleSet --version 2.0
Describe the bug
When the above command is run, it should add the "Microsoft_DefaultRuleSet" version 2.0 rule set to the WAF. However, it actually errors with:
(BadRequest) WebApplicationFirewallPolicy validation failed. More information "Managed rule set types or versions are not compatible.".
Indeed, the only combination of types and versions that work is:
--type DefaultRuleSet --version 1.0
To Reproduce
az network front-door waf-policy managed-rules add --policy-name MyWaf" --resource-group "MyRg" --type Microsoft_DefaultRuleSet --version 2.0
Expected behavior
The CLI should allow addition of all the rules sets specified in the GUI including:
Microsoft_DefaultRuleSet version 1.1 AND
Microsoft_DefaultRuleSet version 2.0
Environment summary
Azure Cloud Shell (PowerShell)
Additional context