Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

AWSManagedRulesATPRuleSet no supported by wrappers? #120

Open
zMynxx opened this issue Sep 14, 2023 · 0 comments
Open

AWSManagedRulesATPRuleSet no supported by wrappers? #120

zMynxx opened this issue Sep 14, 2023 · 0 comments

Comments

@zMynxx
Copy link

zMynxx commented Sep 14, 2023

Hey guys,
I'm using terragrunt and the wrappers version of this repo. I've been going round and round trying it fit and apply AWSManagedRulesATPRuleSet configuration with no success.
Doing research I could find 1, 2, 3, and was able to successfully provision the following configuration using terraform:

  resource "aws_wafv2_web_acl" "atp-example" {
    name        = "managed-atp-example"
    description = "Example of a managed ATP rule."
    scope       = "REGIONAL"
    default_action {
      allow {}
    }
    rule {
      name     = "atp-rule-1"
      priority = 1
      override_action {
        count {}
      }
      statement {
        managed_rule_group_statement {
          name        = "AWSManagedRulesATPRuleSet"
          vendor_name = "AWS"
          managed_rule_group_configs {
            aws_managed_rules_atp_rule_set {
              login_path = "/__auth__"
              request_inspection {
                password_field {
                  identifier = "password"
                }
                payload_type = "FORM_ENCODED"
                username_field {
                  identifier = "username"
                }
              }
              response_inspection {
                status_code {
                  failure_codes = ["403"]
                  success_codes = ["200"]
                }
              }
            }
            rule_action_overrides {
              name = "AttributeCompromisedCredentials"
              action_to_use {
                count {}
              }
            }
          }
        }
      }
      visibility_config {
        cloudwatch_metrics_enabled = false
        metric_name                = "friendly-rule-metric-name"
        sampled_requests_enabled   = false
      }
    }
    visibility_config {
      cloudwatch_metrics_enabled = false
      metric_name                = "friendly-metric-name"
      sampled_requests_enabled   = false
    }
  }

However, running find against 'main.tf' with 'aws_managed_rules_atp_rule_set' lead to no results.
Is this not supported by the wrappers version?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Development

No branches or pull requests

1 participant