Skip to content

Commit b1937e5

Browse files
committed
revert change introduced by Azure#361
1 parent 44433c6 commit b1937e5

1 file changed

Lines changed: 0 additions & 5 deletions

File tree

main.tf

Lines changed: 0 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -449,10 +449,6 @@ resource "azurerm_kubernetes_cluster" "main" {
449449
condition = !(var.kms_enabled && var.identity_type != "UserAssigned")
450450
error_message = "KMS etcd encryption doesn't work with system-assigned managed identity."
451451
}
452-
precondition {
453-
condition = !var.public_network_access_enabled || try(contains(var.api_server_authorized_ip_ranges, "0.0.0.0/32"), false)
454-
error_message = "When `public_network_access_enabled` is set to true, `0.0.0.0/32` must be added to `authorized_ip_ranges` in the `api_server_access_profile block` (https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/kubernetes_cluster#public_network_access_enabled)."
455-
}
456452
}
457453
}
458454

@@ -698,7 +694,6 @@ resource "azurerm_role_assignment" "acr" {
698694
# https://learn.microsoft.com/en-us/azure/aks/configure-kubenet#prerequisites
699695
# https://learn.microsoft.com/en-us/azure/aks/configure-azure-cni#prerequisites
700696
# https://github.com/Azure/terraform-azurerm-aks/issues/178
701-
702697
resource "azurerm_role_assignment" "network_contributor" {
703698
for_each = var.create_role_assignment_network_contributor ? local.subnet_ids : []
704699

0 commit comments

Comments
 (0)