-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AccTest: storage account (network rules) modify the test for private_link
property
#23383
AccTest: storage account (network rules) modify the test for private_link
property
#23383
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Left a question inline but this otherwise LGTM 👍
name = "acctestsearchservice%d" | ||
resource_group_name = azurerm_resource_group.test.name | ||
location = azurerm_resource_group.test.location | ||
sku = "basic" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
sanity checking: does the standard sku of search support private link? else this'd break in the future
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@tombuildsstuff Yes, I've tried the standard
sku, which works fine. I believe the sku doesn't matter as otherwise it should be mentioned in https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal#trusted-access-based-on-a-managed-identity?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this @magodo. LGTM 👍
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Since Sep.11 (working well before), the API request for creating (PUT) or updating (PATCH) a storage account's networkAcls.resourceAccessRules will fail with the following error message:
The reason is Storage has enabled a validation to block invalid resource access rules to be added to storage account.
The allowed resource access rules must be for resource types in this list, while "Microsoft.Network/privateEndpoints" is not in the list.
It's also worth mentioning that there is a comment in the previous test:
This seems to indicate the behavior is not supportive at all by the service.
This PR changes the resource being set to
private_link
from a private endpoint resource, to a resource that is "trusted".Test