You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
"ip_rules.0" is not a valid IPv4 address: "128.252.0.0/16"
The network_rules section of azurerm_storage_account accepts both IPs and CIDR notation. Looking at the code, it appears that the azurerm_storage_account_network_rules makes use of validation that azurerm_storage_account does not.
I would expect the behavior between these two resources to be identical. Not being able to utilize azurerm_storage_account_network_rules prevents a bunch of different scenarios from being possible due to circular dependencies occuring between storage and other resources.
When configuring the firewall through the Azure Portal, both CIDR and IPs are valid.
The text was updated successfully, but these errors were encountered:
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!
ghost
locked and limited conversation to collaborators
Mar 28, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Community Note
Issue
Trying to use
azurerm_storage_account_network_rules
with a CIDR notation fails (X.X.X.X/XX) with an IP validation error.The
network_rules
section ofazurerm_storage_account
accepts both IPs and CIDR notation. Looking at the code, it appears that theazurerm_storage_account_network_rules
makes use of validation thatazurerm_storage_account
does not.https://github.com/terraform-providers/terraform-provider-azurerm/blob/48d259b4894f91f7485644855a47e791264f4007/azurerm/resource_arm_storage_account_network_rules.go#L66-L76
https://github.com/terraform-providers/terraform-provider-azurerm/blob/48d259b4894f91f7485644855a47e791264f4007/azurerm/resource_arm_storage_account.go#L206-L212
I would expect the behavior between these two resources to be identical. Not being able to utilize
azurerm_storage_account_network_rules
prevents a bunch of different scenarios from being possible due to circular dependencies occuring between storage and other resources.When configuring the firewall through the Azure Portal, both CIDR and IPs are valid.
The text was updated successfully, but these errors were encountered: