forked from hashicorp/terraform-provider-azurerm
/
web_application_firewall_policy.go
40 lines (36 loc) · 1.14 KB
/
web_application_firewall_policy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
package validate
import "github.com/hashicorp/terraform-plugin-sdk/helper/validation"
var ValidateWebApplicationFirewallPolicyRuleGroupName = validation.StringInSlice([]string{
"crs_20_protocol_violations",
"crs_21_protocol_anomalies",
"crs_23_request_limits",
"crs_30_http_policy",
"crs_35_bad_robots",
"crs_40_generic_attacks",
"crs_41_sql_injection_attacks",
"crs_41_xss_attacks",
"crs_42_tight_security",
"crs_45_trojans",
"General",
"REQUEST-911-METHOD-ENFORCEMENT",
"REQUEST-913-SCANNER-DETECTION",
"REQUEST-920-PROTOCOL-ENFORCEMENT",
"REQUEST-921-PROTOCOL-ATTACK",
"REQUEST-930-APPLICATION-ATTACK-LFI",
"REQUEST-931-APPLICATION-ATTACK-RFI",
"REQUEST-932-APPLICATION-ATTACK-RCE",
"REQUEST-933-APPLICATION-ATTACK-PHP",
"REQUEST-941-APPLICATION-ATTACK-XSS",
"REQUEST-942-APPLICATION-ATTACK-SQLI",
"REQUEST-943-APPLICATION-ATTACK-SESSION-FIXATION",
}, false)
var ValidateWebApplicationFirewallPolicyRuleSetVersion = validation.StringInSlice([]string{
"1.0",
"2.2.9",
"3.0",
"3.1",
}, false)
var ValidateWebApplicationFirewallPolicyRuleSetType = validation.StringInSlice([]string{
"OWASP",
"Microsoft_BotManagerRuleSet",
}, false)