Skip to content

"az network front-door waf-policy managed-rules add" only working for Type DefaultRuleSet Version 1.0  #24148

@mossywell

Description

@mossywell

az feedback auto-generates most of the information requested below, as of CLI version 2.0.62

Related command

az network front-door waf-policy managed-rules add --policy-name MyWaf" --resource-group "MyRg" --type Microsoft_DefaultRuleSet --version 2.0

Describe the bug

When the above command is run, it should add the "Microsoft_DefaultRuleSet" version 2.0 rule set to the WAF. However, it actually errors with:
(BadRequest) WebApplicationFirewallPolicy validation failed. More information "Managed rule set types or versions are not compatible.".
Indeed, the only combination of types and versions that work is:
--type DefaultRuleSet --version 1.0

To Reproduce

az network front-door waf-policy managed-rules add --policy-name MyWaf" --resource-group "MyRg" --type Microsoft_DefaultRuleSet --version 2.0

Expected behavior

The CLI should allow addition of all the rules sets specified in the GUI including:
Microsoft_DefaultRuleSet version 1.1 AND
Microsoft_DefaultRuleSet version 2.0

Environment summary

Azure Cloud Shell (PowerShell)

Additional context

Metadata

Metadata

Assignees

Labels

Auto-AssignAuto assign by botCXP AttentionThis issue is handled by CXP team.Networkaz network vnet/lb/nic/dns/etc...Network - Front DoorbugThis issue requires a change to an existing behavior in the product in order to be resolved.customer-reportedIssues that are reported by GitHub users external to the Azure organization.needs-team-attentionThis issue needs attention from Azure service team or SDK team

Type

No type

Projects

No projects

Relationships

None yet

Development

No branches or pull requests

Issue actions