diff --git a/.coveragerc b/.coveragerc new file mode 100644 index 00000000..3020825e --- /dev/null +++ b/.coveragerc @@ -0,0 +1,18 @@ +[run] +source = . +branch = false +omit = + ./venv/* + */tests/* + *__init__.py + setup.py + run_tests.py + +[report] +fail_under = 80 + +[html] +directory = coveragereport + +[xml] +output = coveragereport/coverage.xml \ No newline at end of file diff --git a/.github/workflows/sonarcloud.yml b/.github/workflows/sonarcloud.yml new file mode 100644 index 00000000..90c04984 --- /dev/null +++ b/.github/workflows/sonarcloud.yml @@ -0,0 +1,69 @@ +# This workflow uses actions that are not certified by GitHub. +# They are provided by a third-party and are governed by +# separate terms of service, privacy policy, and support +# documentation. + +# This workflow helps you trigger a SonarCloud analysis of your code and populates +# GitHub Code Scanning alerts with the vulnerabilities found. +# Free for open source project. + +name: SonarCloud analysis + +on: + pull_request: + branches: [feature/*] + workflow_dispatch: + +permissions: + pull-requests: read # allows SonarCloud to decorate PRs with analysis results + +jobs: + Analysis: + runs-on: ubuntu-latest + steps: + - name: Checkout the project from Git + uses: actions/checkout@v3 + with: + fetch-depth: 0 + - name: Setup Python 3.8 + uses: actions/setup-python@v3 + with: + python-version: "3.8" + - name: Setup Graphviz + uses: ts-graphviz/setup-graphviz@v1 + - name: Install dependencies + run: pip install -e ".[setup,test]" + - name: Run test using coverage + run: coverage run -m pytest + - name: Generate coverage report + run: coverage xml + - name: Analyze with SonarCloud + # You can pin the exact commit or the version. + # uses: SonarSource/sonarcloud-github-action@commithas or tag + uses: SonarSource/sonarcloud-github-action@v1.9.1 + env: + GITHUB_TOKEN: ${{ secrets.GITHUB_TOKEN }} # Needed to get PR information + SONAR_TOKEN: ${{ secrets.SONAR_TOKEN }} # Generate a token on Sonarcloud.io, add it to the secrets of this repo with the name SONAR_TOKEN (Settings > Secrets > Actions > add new repository secret) + with: + # Additional arguments for the sonarcloud scanner + args: + -Dsonar.projectKey=startleft + -Dsonar.organization=continuumsec + -Dsonar.python.version=3.8,3.9,3.10,3.11 + -Dsonar.qualitygate.wait=true + -Dsonar.python.coverage.reportPaths=coveragereport/coverage.xml + + # Args explanation + # Unique keys of your project and organization. You can find them in SonarCloud > Information (bottom-left menu) + # mandatory + # -Dsonar.projectKey= + # -Dsonar.organization= + + # Version of supported python versions to get a more precise analysis + # -Dsonar.python.version= + + # Flag to way for Analysis Quality Gate results, if fail the steps it will be marked as failed too. + # -Dsonar.qualitygate.wait= + + # The path for coverage report to use in the SonarCloud analysis, it must be in XML format. + # -Dsonar.python.coverage.reportPaths= \ No newline at end of file diff --git a/.gitignore b/.gitignore index 6bf65f79..6e582419 100644 --- a/.gitignore +++ b/.gitignore @@ -51,6 +51,10 @@ coverage.xml .hypothesis/ .pytest_cache/ test-reports/ +/coveragereport/ + +# SonarLint plugin +.scannerwork # Translations *.mo diff --git a/_sl_build/modules.py b/_sl_build/modules.py index 3f8ac6a1..7f98a870 100644 --- a/_sl_build/modules.py +++ b/_sl_build/modules.py @@ -2,33 +2,28 @@ ROOT_DIR = os.path.dirname(os.path.dirname(os.path.realpath(__file__))) -PROCESSORS = [ - {'name': 'slp_base', 'type': 'processor', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf', 'slp_visio', 'slp_mtmt']}, - {'name': 'slp_cft', 'type': 'processor', 'provider_type': 'CLOUDFORMATION', - 'forbidden_dependencies': ['startleft', 'slp_tf', 'slp_visio', 'slp_mtmt']}, - {'name': 'slp_tf', 'type': 'processor', 'provider_type': 'TERRAFORM', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_visio', 'slp_mtmt']}, - {'name': 'slp_visio', 'type': 'processor', 'provider_type': 'VISIO', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf', 'slp_mtmt']}, - {'name': 'slp_visio', 'type': 'processor', 'provider_type': 'LUCID', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf', 'slp_mtmt']}, - {'name': 'slp_mtmt', 'type': 'processor', 'provider_type': 'MTMT', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf', 'slp_visio']} -] - -_general_modules_forbidden_dependencies = ['startleft'] + [processor['name'] for processor in PROCESSORS] -GENERAL_MODULES = [ - {'name': 'sl_util', 'type': 'general', 'forbidden_dependencies': _general_modules_forbidden_dependencies}, - {'name': 'otm', 'type': 'general', 'forbidden_dependencies': _general_modules_forbidden_dependencies} -] - +STARTLEFT_MODULE = {'name': 'startleft', 'type': 'general', 'allowed_imports': ['slp_base', 'otm', 'sl_util']} # TODO Startleft needs to depend on TF and CFT processors until a decision is token about the search function -_startleft_forbidden_dependencies = [p['name'] for p in PROCESSORS if 'provider_type' in p and p['name'] not in ['slp_cft', 'slp_tf']] -STARTLEFT_MODULE = [{'name': 'startleft', 'type': 'general', 'forbidden_dependencies': _startleft_forbidden_dependencies}] - -ALL_MODULES = PROCESSORS + GENERAL_MODULES + STARTLEFT_MODULE +STARTLEFT_MODULE['allowed_imports'].extend(['slp_cft', 'slp_tf']) +# TODO Dependency between otm and sl_util must be removed +OTM_MODULE = {'name': 'otm', 'type': 'general', 'allowed_imports': ['sl_util']} +SL_UTIL_MODULE = {'name': 'sl_util', 'type': 'general', 'allowed_imports': ['otm']} +_slp_allowed_imports = ['slp_base', 'sl_util', 'otm'] +PROCESSORS = [ + {'name': 'slp_base', 'type': 'processor', 'allowed_imports': _slp_allowed_imports}, + {'name': 'slp_cft', 'type': 'processor', 'provider_type': 'CLOUDFORMATION', 'allowed_imports': _slp_allowed_imports}, + {'name': 'slp_tf', 'type': 'processor', 'provider_type': 'TERRAFORM', 'allowed_imports': _slp_allowed_imports}, + {'name': 'slp_tfplan', 'type': 'processor', 'provider_type': 'TFPLAN', 'allowed_imports': _slp_allowed_imports}, + {'name': 'slp_visio', 'type': 'processor', 'provider_type': 'VISIO', 'allowed_imports': _slp_allowed_imports}, + {'name': 'slp_visio', 'type': 'processor', 'provider_type': 'LUCID', 'allowed_imports': _slp_allowed_imports}, + {'name': 'slp_mtmt', 'type': 'processor', 'provider_type': 'MTMT', 'allowed_imports': _slp_allowed_imports} +] +""" + All the StartLeft modules are defined here, along with their dependencies. Further information is available in: + https://iriusrisk.github.io/startleft/development/Architecture +""" +ALL_MODULES = [STARTLEFT_MODULE] + [OTM_MODULE] + [SL_UTIL_MODULE] + PROCESSORS diff --git a/_sl_build/secure_importer.py b/_sl_build/secure_importer.py index ad393f5f..efc6af95 100644 --- a/_sl_build/secure_importer.py +++ b/_sl_build/secure_importer.py @@ -5,12 +5,12 @@ def _build_dependencies_map(): - module_dependencies = [{module['name']: module['forbidden_dependencies']} for module in ALL_MODULES] + module_dependencies = [{module['name']: module['allowed_imports']} for module in ALL_MODULES] return {name: dependencies for module in module_dependencies for name, dependencies in module.items()} _module_names = [module['name'] for module in ALL_MODULES] -_forbidden_dependencies = _build_dependencies_map() +_allowed_imports = _build_dependencies_map() def _get_base_module_name(full_name): @@ -22,15 +22,11 @@ def _is_module_restricted(importing_module: str, imported_module: str): base_imported_module = _get_base_module_name(imported_module) if not base_importing_module or not base_imported_module or \ + base_importing_module == base_imported_module or \ base_importing_module not in _module_names or base_imported_module not in _module_names: return False - forbidden_dependencies = _forbidden_dependencies[base_importing_module] - for fd in forbidden_dependencies: - if fd == base_imported_module: - return True - - return False + return base_imported_module not in _allowed_imports[base_importing_module] def _secure_importer(name, globals=None, locals=None, fromlist=(), level=0): diff --git a/docs/development/Create-a-new-StartLeft-Processor.md b/docs/development/Create-a-new-StartLeft-Processor.md index 27d47412..6518933b 100644 --- a/docs/development/Create-a-new-StartLeft-Processor.md +++ b/docs/development/Create-a-new-StartLeft-Processor.md @@ -391,7 +391,7 @@ Now we can create a simple test that verifies that the conversion process is wor create a `test_mais_processor.py` file inside the `slp_mais/slp_mais/tests/integration` folder: ```python import os -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base.tests.util.otm import validate_and_compare from slp_mais.slp_mais.mais_processor import MAISProcessor @@ -405,10 +405,10 @@ class TestMAISProcessor: def test_single_component_mais_file_ok(self): # GIVEN a simple MAIS file with a single component - mais_file = get_data(f'{resources_path}/mais-sample.json') + mais_file = get_byte_data(f'{resources_path}/mais-sample.json') # AND a MAIS mapping file that defines a mapping for that component - mapping_file = get_data(f'{resources_path}/mapping-sample.yaml') + mapping_file = get_byte_data(f'{resources_path}/mapping-sample.yaml') # AND an expected OTM result expected_otm = f'{resources_path}/expected-otm.otm' @@ -442,14 +442,13 @@ no code is needed, and you only need to perform the configuration steps below. ### Configure the module 1. Go to the `_sl_build/modules.py` class, where you can find the modules' configuration. -2. In the `PROCESSORS` variable, add `slp_mais` as `forbidden_dependency` for all the existent SLP modules. -3. Create a new entry in the array with the configuration for our `slp_mais` module: +2. Create a new entry in the array with the configuration for our `slp_mais` module: ```python { 'name': 'slp_mais', 'type': 'processor', 'provider_type': 'MAIS', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf', 'slp_visio', 'slp_mtmt'] + 'allowed_imports': _slp_allowed_imports } ``` diff --git a/examples/terraform/elb-tfplan.json b/examples/terraform/elb-tfplan.json deleted file mode 100644 index 1d526df1..00000000 --- a/examples/terraform/elb-tfplan.json +++ /dev/null @@ -1,596 +0,0 @@ -{ - "format_version": "1.1", - "terraform_version": "1.3.7", - "planned_values": { - "root_module": { - "resources": [{ - "address": "aws_alb.qux", - "mode": "managed", - "type": "aws_alb", - "name": "qux", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 0, - "values": { - "access_logs": [], - "customer_owned_ipv4_pool": null, - "desync_mitigation_mode": "defensive", - "drop_invalid_header_fields": false, - "enable_cross_zone_load_balancing": null, - "enable_deletion_protection": false, - "enable_http2": true, - "enable_waf_fail_open": false, - "idle_timeout": 60, - "internal": true, - "load_balancer_type": "application", - "name_prefix": null, - "preserve_host_header": false, - "tags": null, - "timeouts": null - }, - "sensitive_values": { - "access_logs": [], - "security_groups": [], - "subnet_mapping": [], - "subnets": [], - "tags_all": {}}}, { - "address": "aws_subnet.bar", - "mode": "managed", - "type": "aws_subnet", - "name": "bar", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 1, - "values": { - "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-west-2b", - "cidr_block": "10.1.2.0/24", - "customer_owned_ipv4_pool": null, - "enable_dns64": false, - "enable_resource_name_dns_a_record_on_launch": false, - "enable_resource_name_dns_aaaa_record_on_launch": false, - "ipv6_cidr_block": null, - "ipv6_native": false, - "map_customer_owned_ip_on_launch": null, - "map_public_ip_on_launch": false, - "outpost_arn": null, - "tags": null, - "timeouts": null - }, - "sensitive_values": { - "tags_all": {}}}, - { - "address": "aws_subnet.baz", - "mode": "managed", - "type": "aws_subnet", - "name": "baz", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 1, - "values": { - "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-west-2b", - "cidr_block": "10.1.1.0/24", - "customer_owned_ipv4_pool": null, - "enable_dns64": false, - "enable_resource_name_dns_a_record_on_launch": false, - "enable_resource_name_dns_aaaa_record_on_launch": false, - "ipv6_cidr_block": null, - "ipv6_native": false, - "map_customer_owned_ip_on_launch": null, - "map_public_ip_on_launch": false, - "outpost_arn": null, - "tags": null, - "timeouts": null - }, - "sensitive_values": { - "tags_all": {}}}, { - "address": "aws_vpc.foo", - "mode": "managed", - "type": "aws_vpc", - "name": "foo", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 1, - "values": { - "assign_generated_ipv6_cidr_block": null, - "cidr_block": "10.1.0.0/16", - "enable_dns_support": true, - "instance_tenancy": "default", - "ipv4_ipam_pool_id": null, - "ipv4_netmask_length": null, - "ipv6_ipam_pool_id": null, - "ipv6_netmask_length": null, - "tags": null - }, - "sensitive_values": { - "tags_all": {}}}, { - "address": "aws_wafregional_ipset.ipset", - "mode": "managed", - "type": "aws_wafregional_ipset", - "name": "ipset", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 0, - "values": { - "ip_set_descriptor": [{ - "type": "IPV4", - "value": "192.0.7.0/24" - }], - "name": "tfIPSet" - }, - "sensitive_values": { - "ip_set_descriptor": [{}]}}, { - "address": "aws_wafregional_rule.foo", - "mode": "managed", - "type": "aws_wafregional_rule", - "name": "foo", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 0, - "values": { - "metric_name": "tfWAFRule", - "name": "tfWAFRule", - "predicate": [{ - "negated": false, - "type": "IPMatch" - }], - "tags": null - }, - "sensitive_values": { - "predicate": [{}], - "tags_all": {}}}, { - "address": "aws_wafregional_web_acl.foo", - "mode": "managed", - "type": "aws_wafregional_web_acl", - "name": "foo", - "provider_name": "registry.terraform.io/hashicorp/aws", - "schema_version": 0, - "values": { - "default_action": [{ - "type": "ALLOW" - }], - "logging_configuration": [], - "metric_name": "foo", - "name": "foo", - "rule": [{ - "action": [{ - "type": "BLOCK" - }], - "override_action": [], - "priority": 1, - "type": "REGULAR" - }], - "tags": null - }, - "sensitive_values": { - "default_action": [{}], - "logging_configuration": [], - "rule": [{ - "action": [{}], - "override_action": [] - }], - "tags_all": {}}}]}}, - "resource_changes": [{ - "address": "aws_alb.qux", - "mode": "managed", - "type": "aws_alb", - "name": "qux", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "access_logs": [], - "customer_owned_ipv4_pool": null, - "desync_mitigation_mode": "defensive", - "drop_invalid_header_fields": false, - "enable_cross_zone_load_balancing": null, - "enable_deletion_protection": false, - "enable_http2": true, - "enable_waf_fail_open": false, - "idle_timeout": 60, - "internal": true, - "load_balancer_type": "application", - "name_prefix": null, - "preserve_host_header": false, - "tags": null, - "timeouts": null - }, - "after_unknown": { - "access_logs": [], - "arn": true, - "arn_suffix": true, - "dns_name": true, - "id": true, - "ip_address_type": true, - "name": true, - "security_groups": true, - "subnet_mapping": true, - "subnets": true, - "tags_all": true, - "vpc_id": true, - "zone_id": true - }, - "before_sensitive": false, - "after_sensitive": { - "access_logs": [], - "security_groups": [], - "subnet_mapping": [], - "subnets": [], - "tags_all": {}}}}, { - "address": "aws_subnet.bar", - "mode": "managed", - "type": "aws_subnet", - "name": "bar", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-west-2b", - "cidr_block": "10.1.2.0/24", - "customer_owned_ipv4_pool": null, - "enable_dns64": false, - "enable_resource_name_dns_a_record_on_launch": false, - "enable_resource_name_dns_aaaa_record_on_launch": false, - "ipv6_cidr_block": null, - "ipv6_native": false, - "map_customer_owned_ip_on_launch": null, - "map_public_ip_on_launch": false, - "outpost_arn": null, - "tags": null, - "timeouts": null - }, - "after_unknown": { - "arn": true, - "availability_zone_id": true, - "id": true, - "ipv6_cidr_block_association_id": true, - "owner_id": true, - "private_dns_hostname_type_on_launch": true, - "tags_all": true, - "vpc_id": true - }, - "before_sensitive": false, - "after_sensitive": { - "tags_all": {}}}}, { - "address": "aws_subnet.baz", - "mode": "managed", - "type": "aws_subnet", - "name": "baz", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "assign_ipv6_address_on_creation": false, - "availability_zone": "eu-west-2b", - "cidr_block": "10.1.1.0/24", - "customer_owned_ipv4_pool": null, - "enable_dns64": false, - "enable_resource_name_dns_a_record_on_launch": false, - "enable_resource_name_dns_aaaa_record_on_launch": false, - "ipv6_cidr_block": null, - "ipv6_native": false, - "map_customer_owned_ip_on_launch": null, - "map_public_ip_on_launch": false, - "outpost_arn": null, - "tags": null, - "timeouts": null - }, - "after_unknown": { - "arn": true, - "availability_zone_id": true, - "id": true, - "ipv6_cidr_block_association_id": true, - "owner_id": true, - "private_dns_hostname_type_on_launch": true, - "tags_all": true, - "vpc_id": true - }, - "before_sensitive": false, - "after_sensitive": { - "tags_all": {}}}}, { - "address": "aws_vpc.foo", - "mode": "managed", - "type": "aws_vpc", - "name": "foo", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "assign_generated_ipv6_cidr_block": null, - "cidr_block": "10.1.0.0/16", - "enable_dns_support": true, - "instance_tenancy": "default", - "ipv4_ipam_pool_id": null, - "ipv4_netmask_length": null, - "ipv6_ipam_pool_id": null, - "ipv6_netmask_length": null, - "tags": null - }, - "after_unknown": { - "arn": true, - "default_network_acl_id": true, - "default_route_table_id": true, - "default_security_group_id": true, - "dhcp_options_id": true, - "enable_classiclink": true, - "enable_classiclink_dns_support": true, - "enable_dns_hostnames": true, - "enable_network_address_usage_metrics": true, - "id": true, - "ipv6_association_id": true, - "ipv6_cidr_block": true, - "ipv6_cidr_block_network_border_group": true, - "main_route_table_id": true, - "owner_id": true, - "tags_all": true - }, - "before_sensitive": false, - "after_sensitive": { - "tags_all": {}}}}, { - "address": "aws_wafregional_ipset.ipset", - "mode": "managed", - "type": "aws_wafregional_ipset", - "name": "ipset", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "ip_set_descriptor": [{ - "type": "IPV4", - "value": "192.0.7.0/24" - }], - "name": "tfIPSet" - }, - "after_unknown": { - "arn": true, - "id": true, - "ip_set_descriptor": [{}]}, - "before_sensitive": false, - "after_sensitive": { - "ip_set_descriptor": [{}]}}}, { - "address": "aws_wafregional_rule.foo", - "mode": "managed", - "type": "aws_wafregional_rule", - "name": "foo", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "metric_name": "tfWAFRule", - "name": "tfWAFRule", - "predicate": [{ - "negated": false, - "type": "IPMatch" - }], - "tags": null - }, - "after_unknown": { - "arn": true, - "id": true, - "predicate": [{ - "data_id": true - }], - "tags_all": true - }, - "before_sensitive": false, - "after_sensitive": { - "predicate": [{}], - "tags_all": {}}}}, { - "address": "aws_wafregional_web_acl.foo", - "mode": "managed", - "type": "aws_wafregional_web_acl", - "name": "foo", - "provider_name": "registry.terraform.io/hashicorp/aws", - "change": { - "actions": ["create"], - "before": null, - "after": { - "default_action": [{ - "type": "ALLOW" - }], - "logging_configuration": [], - "metric_name": "foo", - "name": "foo", - "rule": [{ - "action": [{ - "type": "BLOCK" - }], - "override_action": [], - "priority": 1, - "type": "REGULAR" - }], - "tags": null - }, - "after_unknown": { - "arn": true, - "default_action": [{}], - "id": true, - "logging_configuration": [], - "rule": [{ - "action": [{}], - "override_action": [], - "rule_id": true - }], - "tags_all": true - }, - "before_sensitive": false, - "after_sensitive": { - "default_action": [{}], - "logging_configuration": [], - "rule": [{ - "action": [{}], - "override_action": [] - }], - "tags_all": {}}}}], - "configuration": { - "provider_config": { - "aws": { - "name": "aws", - "full_name": "registry.terraform.io/hashicorp/aws" - } - }, - "root_module": { - "resources": [{ - "address": "aws_alb.qux", - "mode": "managed", - "type": "aws_alb", - "name": "qux", - "provider_config_key": "aws", - "expressions": { - "internal": { - "constant_value": true - }, - "subnets": { - "references": ["aws_subnet.baz.id", "aws_subnet.baz", "aws_subnet.bar.id", "aws_subnet.bar"] - } - }, - "schema_version": 0 - }, { - "address": "aws_subnet.bar", - "mode": "managed", - "type": "aws_subnet", - "name": "bar", - "provider_config_key": "aws", - "expressions": { - "availability_zone": { - "constant_value": "eu-west-2b" - }, - "cidr_block": { - "constant_value": "10.1.2.0/24" - }, - "vpc_id": { - "references": ["aws_vpc.foo.id", "aws_vpc.foo"] - } - }, - "schema_version": 1 - }, { - "address": "aws_subnet.baz", - "mode": "managed", - "type": "aws_subnet", - "name": "baz", - "provider_config_key": "aws", - "expressions": { - "availability_zone": { - "constant_value": "eu-west-2b" - }, - "cidr_block": { - "constant_value": "10.1.1.0/24" - }, - "vpc_id": { - "references": ["aws_vpc.foo.id", "aws_vpc.foo"] - } - }, - "schema_version": 1 - }, { - "address": "aws_vpc.foo", - "mode": "managed", - "type": "aws_vpc", - "name": "foo", - "provider_config_key": "aws", - "expressions": { - "cidr_block": { - "constant_value": "10.1.0.0/16" - } - }, - "schema_version": 1 - }, { - "address": "aws_wafregional_ipset.ipset", - "mode": "managed", - "type": "aws_wafregional_ipset", - "name": "ipset", - "provider_config_key": "aws", - "expressions": { - "ip_set_descriptor": [{ - "type": { - "constant_value": "IPV4" - }, - "value": { - "constant_value": "192.0.7.0/24" - } - }], - "name": { - "constant_value": "tfIPSet" - } - }, - "schema_version": 0 - }, { - "address": "aws_wafregional_rule.foo", - "mode": "managed", - "type": "aws_wafregional_rule", - "name": "foo", - "provider_config_key": "aws", - "expressions": { - "metric_name": { - "constant_value": "tfWAFRule" - }, - "name": { - "constant_value": "tfWAFRule" - }, - "predicate": [{ - "data_id": { - "references": ["aws_wafregional_ipset.ipset.id", "aws_wafregional_ipset.ipset"] - }, - "negated": { - "constant_value": false - }, - "type": { - "constant_value": "IPMatch" - } - }] - }, - "schema_version": 0 - }, { - "address": "aws_wafregional_web_acl.foo", - "mode": "managed", - "type": "aws_wafregional_web_acl", - "name": "foo", - "provider_config_key": "aws", - "expressions": { - "default_action": [{ - "type": { - "constant_value": "ALLOW" - } - }], - "metric_name": { - "constant_value": "foo" - }, - "name": { - "constant_value": "foo" - }, - "rule": [{ - "action": [{ - "type": { - "constant_value": "BLOCK" - } - }], - "priority": { - "constant_value": 1 - }, - "rule_id": { - "references": ["aws_wafregional_rule.foo.id", "aws_wafregional_rule.foo"] - } - }] - }, - "schema_version": 0 - }] - } - }, - "relevant_attributes": [{ - "resource": "aws_wafregional_ipset.ipset", - "attribute": ["id"] - }, { - "resource": "aws_vpc.foo", - "attribute": ["id"] - }, { - "resource": "aws_wafregional_rule.foo", - "attribute": ["id"] - }, { - "resource": "aws_subnet.baz", - "attribute": ["id"] - }, { - "resource": "aws_subnet.bar", - "attribute": ["id"] - }] -} \ No newline at end of file diff --git a/slp_tf/tests/resources/tfplan/official-tfgraph.gv b/examples/tfplan/aws-ingesting-click-logs-using-terraform.gv similarity index 100% rename from slp_tf/tests/resources/tfplan/official-tfgraph.gv rename to examples/tfplan/aws-ingesting-click-logs-using-terraform.gv diff --git a/examples/tfplan/aws-ingesting-click-logs-using-terraform.json b/examples/tfplan/aws-ingesting-click-logs-using-terraform.json new file mode 100644 index 00000000..ac3dcc73 --- /dev/null +++ b/examples/tfplan/aws-ingesting-click-logs-using-terraform.json @@ -0,0 +1,3888 @@ +{ + "format_version": "1.1", + "terraform_version": "1.3.9", + "variables": { + "app_prefix": { + "value": "clicklogger" + }, + "lambda_source_zip_path": { + "value": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar" + }, + "stage_name": { + "value": "dev" + } + }, + "planned_values": { + "outputs": { + "S3": { + "sensitive": false + }, + "deployment-url": { + "sensitive": false + }, + "lambda-clicklogger": { + "sensitive": false + }, + "lambda-clicklogger-authorzer": { + "sensitive": false + } + }, + "root_module": { + "resources": [{ + "address": "aws_api_gateway_account.click_logger_api_gateway_account", + "mode": "managed", + "type": "aws_api_gateway_account", + "name": "click_logger_api_gateway_account", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "sensitive_values": { + "throttle_settings": [] + } + }, { + "address": "aws_api_gateway_authorizer.clicklogger-authorizer", + "mode": "managed", + "type": "aws_api_gateway_authorizer", + "name": "clicklogger-authorizer", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "authorizer_result_ttl_in_seconds": 300, + "identity_source": "method.request.header.Authorization", + "identity_validation_expression": null, + "name": "clicklogger-authorizer", + "provider_arns": null, + "type": "TOKEN" + }, + "sensitive_values": {}}, { + "address": "aws_api_gateway_deployment.clicklogger_deployment", + "mode": "managed", + "type": "aws_api_gateway_deployment", + "name": "clicklogger_deployment", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "description": null, + "stage_description": null, + "stage_name": "dev", + "triggers": null, + "variables": null + }, + "sensitive_values": {}}, { + "address": "aws_api_gateway_integration.integration", + "mode": "managed", + "type": "aws_api_gateway_integration", + "name": "integration", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "cache_key_parameters": null, + "connection_id": null, + "connection_type": "INTERNET", + "content_handling": null, + "credentials": null, + "http_method": "POST", + "integration_http_method": "POST", + "request_parameters": null, + "request_templates": null, + "timeout_milliseconds": 29000, + "tls_config": [], + "type": "AWS" + }, + "sensitive_values": { + "tls_config": [] + } + }, { + "address": "aws_api_gateway_integration_response.MyDemoIntegrationResponse", + "mode": "managed", + "type": "aws_api_gateway_integration_response", + "name": "MyDemoIntegrationResponse", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "content_handling": null, + "http_method": "POST", + "response_parameters": { + "method.response.header.Access-Control-Allow-Headers": "'Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token,X-Requested-With'", + "method.response.header.Access-Control-Allow-Methods": "'*'", + "method.response.header.Access-Control-Allow-Origin": "'*'" + }, + "response_templates": null, + "selection_pattern": null, + "status_code": "200" + }, + "sensitive_values": { + "response_parameters": {}}}, { + "address": "aws_api_gateway_method.method", + "mode": "managed", + "type": "aws_api_gateway_method", + "name": "method", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "api_key_required": false, + "authorization": "CUSTOM", + "authorization_scopes": null, + "http_method": "POST", + "operation_name": null, + "request_models": { + "application/json": "clickloggermodel" + }, + "request_parameters": { + "method.request.header.Authorization": true + } + }, + "sensitive_values": { + "request_models": {}, + "request_parameters": {}}}, { + "address": "aws_api_gateway_method_response.response_200", + "mode": "managed", + "type": "aws_api_gateway_method_response", + "name": "response_200", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "http_method": "POST", + "response_models": { + "application/json": "Empty" + }, + "response_parameters": { + "method.response.header.Access-Control-Allow-Headers": true, + "method.response.header.Access-Control-Allow-Methods": true, + "method.response.header.Access-Control-Allow-Origin": true + }, + "status_code": "200" + }, + "sensitive_values": { + "response_models": {}, + "response_parameters": {}}}, { + "address": "aws_api_gateway_method_settings.general_settings", + "mode": "managed", + "type": "aws_api_gateway_method_settings", + "name": "general_settings", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "method_path": "*/*", + "settings": [{ + "data_trace_enabled": true, + "logging_level": "INFO", + "metrics_enabled": true, + "throttling_burst_limit": 50, + "throttling_rate_limit": 100 + }], + "stage_name": "dev" + }, + "sensitive_values": { + "settings": [{}]}}, { + "address": "aws_api_gateway_model.clicklogger_model", + "mode": "managed", + "type": "aws_api_gateway_model", + "name": "clicklogger_model", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "content_type": "application/json", + "description": "clicklogger-JSON schema", + "name": "clickloggermodel", + "schema": "{\"$schema\":\"http://json-schema.org/draft-04/schema#\",\"additionalProperties\":false,\"properties\":{\"action\":{\"type\":\"string\"},\"callerid\":{\"type\":\"string\"},\"component\":{\"type\":\"string\"},\"contextid\":{\"type\":\"string\"},\"requestid\":{\"type\":\"string\"},\"type\":{\"type\":\"string\"}},\"required\":[\"contextid\",\"requestid\",\"callerid\",\"action\",\"component\",\"type\"],\"title\":\"clicklogger\",\"type\":\"object\"}" + }, + "sensitive_values": {}}, { + "address": "aws_api_gateway_request_validator.clicklogger_validator", + "mode": "managed", + "type": "aws_api_gateway_request_validator", + "name": "clicklogger_validator", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "name": "clicklogger-validator", + "validate_request_body": true, + "validate_request_parameters": true + }, + "sensitive_values": {}}, { + "address": "aws_api_gateway_resource.resource", + "mode": "managed", + "type": "aws_api_gateway_resource", + "name": "resource", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "path_part": "clicklogger" + }, + "sensitive_values": {}}, { + "address": "aws_api_gateway_rest_api.click_logger_api", + "mode": "managed", + "type": "aws_api_gateway_rest_api", + "name": "click_logger_api", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "body": null, + "description": "click logger api", + "minimum_compression_size": -1, + "name": "clicklogger-api", + "parameters": null, + "put_rest_api_mode": null, + "tags": null + }, + "sensitive_values": { + "binary_media_types": [], + "endpoint_configuration": [], + "tags_all": {}}}, { + "address": "aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "click_logger_firehose_delivery_stream_log_group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "kms_key_id": null, + "name": "/aws/kinesis_firehose_delivery_stream/clicklogger/click_logger_firehose_delivery_stream", + "retention_in_days": 3, + "skip_destroy": false, + "tags": null + }, + "sensitive_values": { + "tags_all": {}}}, { + "address": "aws_cloudwatch_log_group.clicklogger-api-log-group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "clicklogger-api-log-group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "kms_key_id": null, + "name": "/aws/apigateway/clicklogger-API-Gateway-Execution-Logs/dev", + "retention_in_days": 7, + "skip_destroy": false, + "tags": null + }, + "sensitive_values": { + "tags_all": {}}}, { + "address": "aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "lambda_click_logger_authorizer_log_group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "kms_key_id": null, + "name": "/aws/lambda/clicklogger/clicklogger-lambda-authorizer", + "retention_in_days": 3, + "skip_destroy": false, + "tags": null + }, + "sensitive_values": { + "tags_all": {}}}, { + "address": "aws_cloudwatch_log_group.lambda_click_logger_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "lambda_click_logger_log_group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "kms_key_id": null, + "name": "/aws/lambda/clicklogger/clicklogger-lambda", + "retention_in_days": 3, + "skip_destroy": false, + "tags": null + }, + "sensitive_values": { + "tags_all": {}}}, { + "address": "aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream", + "mode": "managed", + "type": "aws_cloudwatch_log_stream", + "name": "click_logger_firehose_delivery_stream", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "log_group_name": "/aws/kinesis_firehose_delivery_stream/clicklogger/click_logger_firehose_delivery_stream", + "name": "clicklogger-firehose-delivery-stream" + }, + "sensitive_values": {}}, { + "address": "aws_dynamodb_table.click-logger-table", + "mode": "managed", + "type": "aws_dynamodb_table", + "name": "click-logger-table", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 1, + "values": { + "attribute": [{ + "name": "callerid", + "type": "S" + }, { + "name": "contextid", + "type": "S" + }, { + "name": "requestid", + "type": "S" + }], + "billing_mode": "PROVISIONED", + "global_secondary_index": [{ + "hash_key": "contextid", + "name": "ContextCallerIndex", + "non_key_attributes": ["action", "clientip", "component", "createdtime", "requestid", "type"], + "projection_type": "INCLUDE", + "range_key": "callerid", + "read_capacity": 5, + "write_capacity": 5 + }], + "hash_key": "requestid", + "local_secondary_index": [], + "name": "clickloggertable", + "range_key": "contextid", + "read_capacity": 5, + "replica": [], + "restore_date_time": null, + "restore_source_name": null, + "restore_to_latest_time": null, + "stream_enabled": null, + "table_class": null, + "tags": { + "Environment": "dev", + "Name": "clickloggertable" + }, + "tags_all": { + "Environment": "dev", + "Name": "clickloggertable" + }, + "timeouts": null, + "write_capacity": 5 + }, + "sensitive_values": { + "attribute": [{}, {}, {}], + "global_secondary_index": [{ + "non_key_attributes": [false, false, false, false, false, false] + }], + "local_secondary_index": [], + "point_in_time_recovery": [], + "replica": [], + "server_side_encryption": [], + "tags": {}, + "tags_all": {}, + "ttl": [] + } + }, { + "address": "aws_glue_catalog_database.aws_glue_click_logger_database", + "mode": "managed", + "type": "aws_glue_catalog_database", + "name": "aws_glue_click_logger_database", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "description": "Click logger Glue database", + "name": "clickloggerdatabase", + "parameters": null, + "target_database": [] + }, + "sensitive_values": { + "create_table_default_permission": [], + "target_database": [] + } + }, { + "address": "aws_glue_catalog_table.aws_glue_click_logger_catalog_table", + "mode": "managed", + "type": "aws_glue_catalog_table", + "name": "aws_glue_click_logger_catalog_table", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "database_name": "clickloggerdatabase", + "description": null, + "name": "clickloggertable", + "owner": null, + "parameters": { + "EXTERNAL": "TRUE", + "parquet.compression": "SNAPPY" + }, + "partition_keys": [], + "retention": 0, + "storage_descriptor": [{ + "bucket_columns": null, + "columns": [{ + "comment": null, + "name": "requestid", + "parameters": null, + "type": "string" + }, { + "comment": null, + "name": "contextid", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "callerid", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "component", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "action", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "type", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "clientip", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "createdtime", + "parameters": null, + "type": "string" + }], + "compressed": false, + "input_format": "org.apache.hadoop.mapred.TextInputFormat", + "number_of_buckets": null, + "output_format": "org.apache.hadoop.hive.ql.io.HiveIgnoreKeyTextOutputFormat", + "parameters": { + "classification": "json", + "compression_type": "none", + "crawler_schema_deserializer_version": "1.0", + "crawler_schema_serializer_version": "1.0", + "type_of_data": "file" + }, + "schema_reference": [], + "ser_de_info": [{ + "name": "clickloggertable", + "parameters": { + "serialization.format": "1" + }, + "serialization_library": "org.openx.data.jsonserde.JsonSerDe" + }], + "skewed_info": [], + "sort_columns": [], + "stored_as_sub_directories": null + }], + "table_type": "EXTERNAL_TABLE", + "target_table": [], + "view_expanded_text": null, + "view_original_text": null + }, + "sensitive_values": { + "parameters": {}, + "partition_index": [], + "partition_keys": [], + "storage_descriptor": [{ + "columns": [{}, {}, {}, {}, {}, {}, {}, {}], + "parameters": {}, + "schema_reference": [], + "ser_de_info": [{ + "parameters": {}}], + "skewed_info": [], + "sort_columns": [] + }], + "target_table": [] + } + }, { + "address": "aws_iam_policy.click_loggerlambda_logging_policy", + "mode": "managed", + "type": "aws_iam_policy", + "name": "click_loggerlambda_logging_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "description": "IAM policy for logging from a lambda", + "name": "clicklogger-lambda-logging-policy", + "name_prefix": null, + "path": "/", + "tags": null + }, + "sensitive_values": { + "tags_all": {}}}, { + "address": "aws_iam_role.click_logger_api_gateway_cloudwatch_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_api_gateway_cloudwatch_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"apigateway.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-api-gateway-cloudwatch-global-role", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "sensitive_values": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}, { + "address": "aws_iam_role.click_logger_invocation_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_invocation_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"apigateway.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-api-gateway-auth-invocation", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "sensitive_values": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}, { + "address": "aws_iam_role.click_logger_lambda_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_lambda_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"lambda.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-lambda-role", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "sensitive_values": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}, { + "address": "aws_iam_role.click_logger_stream_consumer_firehose_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_stream_consumer_firehose_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-stream-consumer-firehose-role", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "sensitive_values": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}, { + "address": "aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_api_gateway_cloudwatch_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "name": "clicklogger-api-gateway-cloudwatch-policy", + "name_prefix": null, + "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"logs:CreateLogGroup\",\"logs:CreateLogStream\",\"logs:DescribeLogGroups\",\"logs:DescribeLogStreams\",\"logs:PutLogEvents\",\"logs:GetLogEvents\",\"logs:FilterLogEvents\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}" + }, + "sensitive_values": {}}, { + "address": "aws_iam_role_policy.click_logger_invocation_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_invocation_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "name": "clicklogger-invocation-policy", + "name_prefix": null + }, + "sensitive_values": {}}, { + "address": "aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_stream_consumer_firehose_inline_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "name": "clicklogger-stream-consumer-firehose-inline_policy", + "name_prefix": null, + "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"glue:*\",\"s3:*\",\"logs:*\",\"lambda:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}" + }, + "sensitive_values": {}}, { + "address": "aws_iam_role_policy_attachment.click_loggerlambda_policy", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "click_loggerlambda_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "policy_arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", + "role": "clicklogger-lambda-role" + }, + "sensitive_values": {}}, { + "address": "aws_iam_role_policy_attachment.lambda_logs", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "lambda_logs", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "role": "clicklogger-lambda-role" + }, + "sensitive_values": {}}, { + "address": "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream", + "mode": "managed", + "type": "aws_kinesis_firehose_delivery_stream", + "name": "click_logger_firehose_delivery_stream", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 1, + "values": { + "destination": "extended_s3", + "elasticsearch_configuration": [], + "extended_s3_configuration": [{ + "buffer_interval": 60, + "buffer_size": 64, + "cloudwatch_logging_options": [{ + "enabled": true, + "log_group_name": "/aws/kinesis_firehose_delivery_stream/click_logger_firehose_delivery_stream", + "log_stream_name": "click_logger_firehose_delivery_stream" + }], + "compression_format": "UNCOMPRESSED", + "data_format_conversion_configuration": [{ + "enabled": true, + "input_format_configuration": [{ + "deserializer": [{ + "hive_json_ser_de": [], + "open_x_json_ser_de": [{ + "case_insensitive": true, + "column_to_json_key_mappings": null, + "convert_dots_in_json_keys_to_underscores": false + }] + }] + }], + "output_format_configuration": [{ + "serializer": [{ + "orc_ser_de": [], + "parquet_ser_de": [{ + "block_size_bytes": 268435456, + "compression": "SNAPPY", + "enable_dictionary_compression": false, + "max_padding_bytes": 0, + "page_size_bytes": 1048576, + "writer_version": "V1" + }] + }] + }], + "schema_configuration": [{ + "database_name": "clickloggerdatabase", + "region": "us-east-1", + "table_name": "clickloggertable", + "version_id": "LATEST" + }] + }], + "dynamic_partitioning_configuration": [], + "error_output_prefix": "clicklog_error/error=!{firehose:error-output-type}data=!{timestamp:yyyy}-!{timestamp:MM}-!{timestamp:dd}/", + "kms_key_arn": null, + "prefix": "clicklog/data=!{timestamp:yyyy}-!{timestamp:MM}-!{timestamp:dd}/", + "processing_configuration": [{ + "enabled": true, + "processors": [{ + "parameters": [{ + "parameter_name": "LambdaArn" + }], + "type": "Lambda" + }] + }], + "s3_backup_configuration": [], + "s3_backup_mode": "Disabled" + }], + "http_endpoint_configuration": [], + "kinesis_source_configuration": [], + "name": "clicklogger-firehose-delivery-stream", + "redshift_configuration": [], + "s3_configuration": [], + "server_side_encryption": [], + "splunk_configuration": [], + "tags": null, + "timeouts": null + }, + "sensitive_values": { + "elasticsearch_configuration": [], + "extended_s3_configuration": [{ + "cloudwatch_logging_options": [{}], + "data_format_conversion_configuration": [{ + "input_format_configuration": [{ + "deserializer": [{ + "hive_json_ser_de": [], + "open_x_json_ser_de": [{}]}]}], + "output_format_configuration": [{ + "serializer": [{ + "orc_ser_de": [], + "parquet_ser_de": [{}]}]}], + "schema_configuration": [{}]}], + "dynamic_partitioning_configuration": [], + "processing_configuration": [{ + "processors": [{ + "parameters": [{}]}]}], + "s3_backup_configuration": [] + }], + "http_endpoint_configuration": [], + "kinesis_source_configuration": [], + "redshift_configuration": [], + "s3_configuration": [], + "server_side_encryption": [], + "splunk_configuration": [], + "tags_all": {}}}, { + "address": "aws_lambda_function.lambda_clicklogger", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "STREAM_NAME": "clicklogger-firehose-delivery-stream" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda", + "handler": "com.clicklogs.Handlers.ClickLoggerHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "sensitive_values": { + "architectures": [], + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": [], + "file_system_config": [], + "image_config": [], + "snap_start": [], + "tags_all": {}, + "tracing_config": [], + "vpc_config": [] + } + }, { + "address": "aws_lambda_function.lambda_clicklogger_authorizer", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger_authorizer", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "AUTH_TOKENS": "ALLOW=ORDERAPP;ALLOW=BILLAPP;" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda-authorizer", + "handler": "com.clicklogs.Handlers.APIGatewayAuthorizerHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "sensitive_values": { + "architectures": [], + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": [], + "file_system_config": [], + "image_config": [], + "snap_start": [], + "tags_all": {}, + "tracing_config": [], + "vpc_config": [] + } + }, { + "address": "aws_lambda_function.lambda_clicklogger_stream_consumer", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger_stream_consumer", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "DB_TABLE": "clickloggertable" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda-stream-consumer", + "handler": "com.clicklogs.Handlers.ClickLoggerStreamHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "sensitive_values": { + "architectures": [], + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": [], + "file_system_config": [], + "image_config": [], + "snap_start": [], + "tags_all": {}, + "tracing_config": [], + "vpc_config": [] + } + }, { + "address": "aws_lambda_permission.apigw_lambda", + "mode": "managed", + "type": "aws_lambda_permission", + "name": "apigw_lambda", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "action": "lambda:InvokeFunction", + "event_source_token": null, + "function_url_auth_type": null, + "principal": "apigateway.amazonaws.com", + "principal_org_id": null, + "qualifier": null, + "source_account": null, + "statement_id": "AllowExecutionFromAPIGateway" + }, + "sensitive_values": {}}, { + "address": "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket", + "mode": "managed", + "type": "aws_s3_bucket", + "name": "click_logger_firehose_delivery_s3_bucket", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "acl": "private", + "bucket": "clicklogger-dev-firehose-delivery-bucket-154977180039", + "bucket_prefix": null, + "force_destroy": false, + "tags": { + "Environment": "dev", + "Name": "Firehose S3 Delivery bucket" + }, + "tags_all": { + "Environment": "dev", + "Name": "Firehose S3 Delivery bucket" + }, + "timeouts": null + }, + "sensitive_values": { + "cors_rule": [], + "grant": [], + "lifecycle_rule": [], + "logging": [], + "object_lock_configuration": [], + "replication_configuration": [], + "server_side_encryption_configuration": [], + "tags": {}, + "tags_all": {}, + "versioning": [], + "website": [] + } + }] + } + }, + "resource_changes": [{ + "address": "aws_api_gateway_account.click_logger_api_gateway_account", + "mode": "managed", + "type": "aws_api_gateway_account", + "name": "click_logger_api_gateway_account", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": {}, + "after_unknown": { + "cloudwatch_role_arn": true, + "id": true, + "throttle_settings": true + }, + "before_sensitive": false, + "after_sensitive": { + "throttle_settings": [] + } + } + }, { + "address": "aws_api_gateway_authorizer.clicklogger-authorizer", + "mode": "managed", + "type": "aws_api_gateway_authorizer", + "name": "clicklogger-authorizer", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "authorizer_result_ttl_in_seconds": 300, + "identity_source": "method.request.header.Authorization", + "identity_validation_expression": null, + "name": "clicklogger-authorizer", + "provider_arns": null, + "type": "TOKEN" + }, + "after_unknown": { + "arn": true, + "authorizer_credentials": true, + "authorizer_uri": true, + "id": true, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_api_gateway_deployment.clicklogger_deployment", + "mode": "managed", + "type": "aws_api_gateway_deployment", + "name": "clicklogger_deployment", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "description": null, + "stage_description": null, + "stage_name": "dev", + "triggers": null, + "variables": null + }, + "after_unknown": { + "created_date": true, + "execution_arn": true, + "id": true, + "invoke_url": true, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_api_gateway_integration.integration", + "mode": "managed", + "type": "aws_api_gateway_integration", + "name": "integration", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "cache_key_parameters": null, + "connection_id": null, + "connection_type": "INTERNET", + "content_handling": null, + "credentials": null, + "http_method": "POST", + "integration_http_method": "POST", + "request_parameters": null, + "request_templates": null, + "timeout_milliseconds": 29000, + "tls_config": [], + "type": "AWS" + }, + "after_unknown": { + "cache_namespace": true, + "id": true, + "passthrough_behavior": true, + "resource_id": true, + "rest_api_id": true, + "tls_config": [], + "uri": true + }, + "before_sensitive": false, + "after_sensitive": { + "tls_config": [] + } + } + }, { + "address": "aws_api_gateway_integration_response.MyDemoIntegrationResponse", + "mode": "managed", + "type": "aws_api_gateway_integration_response", + "name": "MyDemoIntegrationResponse", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "content_handling": null, + "http_method": "POST", + "response_parameters": { + "method.response.header.Access-Control-Allow-Headers": "'Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token,X-Requested-With'", + "method.response.header.Access-Control-Allow-Methods": "'*'", + "method.response.header.Access-Control-Allow-Origin": "'*'" + }, + "response_templates": null, + "selection_pattern": null, + "status_code": "200" + }, + "after_unknown": { + "id": true, + "resource_id": true, + "response_parameters": {}, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "response_parameters": {}}}}, { + "address": "aws_api_gateway_method.method", + "mode": "managed", + "type": "aws_api_gateway_method", + "name": "method", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "api_key_required": false, + "authorization": "CUSTOM", + "authorization_scopes": null, + "http_method": "POST", + "operation_name": null, + "request_models": { + "application/json": "clickloggermodel" + }, + "request_parameters": { + "method.request.header.Authorization": true + } + }, + "after_unknown": { + "authorizer_id": true, + "id": true, + "request_models": {}, + "request_parameters": {}, + "request_validator_id": true, + "resource_id": true, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "request_models": {}, + "request_parameters": {}}}}, { + "address": "aws_api_gateway_method_response.response_200", + "mode": "managed", + "type": "aws_api_gateway_method_response", + "name": "response_200", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "http_method": "POST", + "response_models": { + "application/json": "Empty" + }, + "response_parameters": { + "method.response.header.Access-Control-Allow-Headers": true, + "method.response.header.Access-Control-Allow-Methods": true, + "method.response.header.Access-Control-Allow-Origin": true + }, + "status_code": "200" + }, + "after_unknown": { + "id": true, + "resource_id": true, + "response_models": {}, + "response_parameters": {}, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "response_models": {}, + "response_parameters": {}}}}, { + "address": "aws_api_gateway_method_settings.general_settings", + "mode": "managed", + "type": "aws_api_gateway_method_settings", + "name": "general_settings", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "method_path": "*/*", + "settings": [{ + "data_trace_enabled": true, + "logging_level": "INFO", + "metrics_enabled": true, + "throttling_burst_limit": 50, + "throttling_rate_limit": 100 + }], + "stage_name": "dev" + }, + "after_unknown": { + "id": true, + "rest_api_id": true, + "settings": [{ + "cache_data_encrypted": true, + "cache_ttl_in_seconds": true, + "caching_enabled": true, + "require_authorization_for_cache_control": true, + "unauthorized_cache_control_header_strategy": true + }] + }, + "before_sensitive": false, + "after_sensitive": { + "settings": [{}]}}}, { + "address": "aws_api_gateway_model.clicklogger_model", + "mode": "managed", + "type": "aws_api_gateway_model", + "name": "clicklogger_model", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "content_type": "application/json", + "description": "clicklogger-JSON schema", + "name": "clickloggermodel", + "schema": "{\"$schema\":\"http://json-schema.org/draft-04/schema#\",\"additionalProperties\":false,\"properties\":{\"action\":{\"type\":\"string\"},\"callerid\":{\"type\":\"string\"},\"component\":{\"type\":\"string\"},\"contextid\":{\"type\":\"string\"},\"requestid\":{\"type\":\"string\"},\"type\":{\"type\":\"string\"}},\"required\":[\"contextid\",\"requestid\",\"callerid\",\"action\",\"component\",\"type\"],\"title\":\"clicklogger\",\"type\":\"object\"}" + }, + "after_unknown": { + "id": true, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_api_gateway_request_validator.clicklogger_validator", + "mode": "managed", + "type": "aws_api_gateway_request_validator", + "name": "clicklogger_validator", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "name": "clicklogger-validator", + "validate_request_body": true, + "validate_request_parameters": true + }, + "after_unknown": { + "id": true, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_api_gateway_resource.resource", + "mode": "managed", + "type": "aws_api_gateway_resource", + "name": "resource", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "path_part": "clicklogger" + }, + "after_unknown": { + "id": true, + "parent_id": true, + "path": true, + "rest_api_id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_api_gateway_rest_api.click_logger_api", + "mode": "managed", + "type": "aws_api_gateway_rest_api", + "name": "click_logger_api", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "body": null, + "description": "click logger api", + "minimum_compression_size": -1, + "name": "clicklogger-api", + "parameters": null, + "put_rest_api_mode": null, + "tags": null + }, + "after_unknown": { + "api_key_source": true, + "arn": true, + "binary_media_types": true, + "created_date": true, + "disable_execute_api_endpoint": true, + "endpoint_configuration": true, + "execution_arn": true, + "id": true, + "policy": true, + "root_resource_id": true, + "tags_all": true + }, + "before_sensitive": false, + "after_sensitive": { + "binary_media_types": [], + "endpoint_configuration": [], + "tags_all": {}}}}, { + "address": "aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "click_logger_firehose_delivery_stream_log_group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "kms_key_id": null, + "name": "/aws/kinesis_firehose_delivery_stream/clicklogger/click_logger_firehose_delivery_stream", + "retention_in_days": 3, + "skip_destroy": false, + "tags": null + }, + "after_unknown": { + "arn": true, + "id": true, + "name_prefix": true, + "tags_all": true + }, + "before_sensitive": false, + "after_sensitive": { + "tags_all": {}}}}, { + "address": "aws_cloudwatch_log_group.clicklogger-api-log-group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "clicklogger-api-log-group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "kms_key_id": null, + "name": "/aws/apigateway/clicklogger-API-Gateway-Execution-Logs/dev", + "retention_in_days": 7, + "skip_destroy": false, + "tags": null + }, + "after_unknown": { + "arn": true, + "id": true, + "name_prefix": true, + "tags_all": true + }, + "before_sensitive": false, + "after_sensitive": { + "tags_all": {}}}}, { + "address": "aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "lambda_click_logger_authorizer_log_group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "kms_key_id": null, + "name": "/aws/lambda/clicklogger/clicklogger-lambda-authorizer", + "retention_in_days": 3, + "skip_destroy": false, + "tags": null + }, + "after_unknown": { + "arn": true, + "id": true, + "name_prefix": true, + "tags_all": true + }, + "before_sensitive": false, + "after_sensitive": { + "tags_all": {}}}}, { + "address": "aws_cloudwatch_log_group.lambda_click_logger_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "lambda_click_logger_log_group", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "kms_key_id": null, + "name": "/aws/lambda/clicklogger/clicklogger-lambda", + "retention_in_days": 3, + "skip_destroy": false, + "tags": null + }, + "after_unknown": { + "arn": true, + "id": true, + "name_prefix": true, + "tags_all": true + }, + "before_sensitive": false, + "after_sensitive": { + "tags_all": {}}}}, { + "address": "aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream", + "mode": "managed", + "type": "aws_cloudwatch_log_stream", + "name": "click_logger_firehose_delivery_stream", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "log_group_name": "/aws/kinesis_firehose_delivery_stream/clicklogger/click_logger_firehose_delivery_stream", + "name": "clicklogger-firehose-delivery-stream" + }, + "after_unknown": { + "arn": true, + "id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_dynamodb_table.click-logger-table", + "mode": "managed", + "type": "aws_dynamodb_table", + "name": "click-logger-table", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "attribute": [{ + "name": "callerid", + "type": "S" + }, { + "name": "contextid", + "type": "S" + }, { + "name": "requestid", + "type": "S" + }], + "billing_mode": "PROVISIONED", + "global_secondary_index": [{ + "hash_key": "contextid", + "name": "ContextCallerIndex", + "non_key_attributes": ["action", "clientip", "component", "createdtime", "requestid", "type"], + "projection_type": "INCLUDE", + "range_key": "callerid", + "read_capacity": 5, + "write_capacity": 5 + }], + "hash_key": "requestid", + "local_secondary_index": [], + "name": "clickloggertable", + "range_key": "contextid", + "read_capacity": 5, + "replica": [], + "restore_date_time": null, + "restore_source_name": null, + "restore_to_latest_time": null, + "stream_enabled": null, + "table_class": null, + "tags": { + "Environment": "dev", + "Name": "clickloggertable" + }, + "tags_all": { + "Environment": "dev", + "Name": "clickloggertable" + }, + "timeouts": null, + "write_capacity": 5 + }, + "after_unknown": { + "arn": true, + "attribute": [{}, {}, {}], + "global_secondary_index": [{ + "non_key_attributes": [false, false, false, false, false, false] + }], + "id": true, + "local_secondary_index": [], + "point_in_time_recovery": true, + "replica": [], + "server_side_encryption": true, + "stream_arn": true, + "stream_label": true, + "stream_view_type": true, + "tags": {}, + "tags_all": {}, + "ttl": true + }, + "before_sensitive": false, + "after_sensitive": { + "attribute": [{}, {}, {}], + "global_secondary_index": [{ + "non_key_attributes": [false, false, false, false, false, false] + }], + "local_secondary_index": [], + "point_in_time_recovery": [], + "replica": [], + "server_side_encryption": [], + "tags": {}, + "tags_all": {}, + "ttl": [] + } + } + }, { + "address": "aws_glue_catalog_database.aws_glue_click_logger_database", + "mode": "managed", + "type": "aws_glue_catalog_database", + "name": "aws_glue_click_logger_database", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "description": "Click logger Glue database", + "name": "clickloggerdatabase", + "parameters": null, + "target_database": [] + }, + "after_unknown": { + "arn": true, + "catalog_id": true, + "create_table_default_permission": true, + "id": true, + "location_uri": true, + "target_database": [] + }, + "before_sensitive": false, + "after_sensitive": { + "create_table_default_permission": [], + "target_database": [] + } + } + }, { + "address": "aws_glue_catalog_table.aws_glue_click_logger_catalog_table", + "mode": "managed", + "type": "aws_glue_catalog_table", + "name": "aws_glue_click_logger_catalog_table", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "database_name": "clickloggerdatabase", + "description": null, + "name": "clickloggertable", + "owner": null, + "parameters": { + "EXTERNAL": "TRUE", + "parquet.compression": "SNAPPY" + }, + "partition_keys": [], + "retention": 0, + "storage_descriptor": [{ + "bucket_columns": null, + "columns": [{ + "comment": null, + "name": "requestid", + "parameters": null, + "type": "string" + }, { + "comment": null, + "name": "contextid", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "callerid", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "component", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "action", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "type", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "clientip", + "parameters": null, + "type": "string" + }, { + "comment": "", + "name": "createdtime", + "parameters": null, + "type": "string" + }], + "compressed": false, + "input_format": "org.apache.hadoop.mapred.TextInputFormat", + "number_of_buckets": null, + "output_format": "org.apache.hadoop.hive.ql.io.HiveIgnoreKeyTextOutputFormat", + "parameters": { + "classification": "json", + "compression_type": "none", + "crawler_schema_deserializer_version": "1.0", + "crawler_schema_serializer_version": "1.0", + "type_of_data": "file" + }, + "schema_reference": [], + "ser_de_info": [{ + "name": "clickloggertable", + "parameters": { + "serialization.format": "1" + }, + "serialization_library": "org.openx.data.jsonserde.JsonSerDe" + }], + "skewed_info": [], + "sort_columns": [], + "stored_as_sub_directories": null + }], + "table_type": "EXTERNAL_TABLE", + "target_table": [], + "view_expanded_text": null, + "view_original_text": null + }, + "after_unknown": { + "arn": true, + "catalog_id": true, + "id": true, + "parameters": {}, + "partition_index": true, + "partition_keys": [], + "storage_descriptor": [{ + "columns": [{}, {}, {}, {}, {}, {}, {}, {}], + "location": true, + "parameters": {}, + "schema_reference": [], + "ser_de_info": [{ + "parameters": {}}], + "skewed_info": [], + "sort_columns": [] + }], + "target_table": [] + }, + "before_sensitive": false, + "after_sensitive": { + "parameters": {}, + "partition_index": [], + "partition_keys": [], + "storage_descriptor": [{ + "columns": [{}, {}, {}, {}, {}, {}, {}, {}], + "parameters": {}, + "schema_reference": [], + "ser_de_info": [{ + "parameters": {}}], + "skewed_info": [], + "sort_columns": [] + }], + "target_table": [] + } + } + }, { + "address": "aws_iam_policy.click_loggerlambda_logging_policy", + "mode": "managed", + "type": "aws_iam_policy", + "name": "click_loggerlambda_logging_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "description": "IAM policy for logging from a lambda", + "name": "clicklogger-lambda-logging-policy", + "name_prefix": null, + "path": "/", + "tags": null + }, + "after_unknown": { + "arn": true, + "id": true, + "policy": true, + "policy_id": true, + "tags_all": true + }, + "before_sensitive": false, + "after_sensitive": { + "tags_all": {}}}}, { + "address": "aws_iam_role.click_logger_api_gateway_cloudwatch_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_api_gateway_cloudwatch_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"apigateway.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-api-gateway-cloudwatch-global-role", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "after_unknown": { + "arn": true, + "create_date": true, + "id": true, + "inline_policy": true, + "managed_policy_arns": true, + "name_prefix": true, + "tags_all": true, + "unique_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}}, { + "address": "aws_iam_role.click_logger_invocation_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_invocation_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"apigateway.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-api-gateway-auth-invocation", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "after_unknown": { + "arn": true, + "create_date": true, + "id": true, + "inline_policy": true, + "managed_policy_arns": true, + "name_prefix": true, + "tags_all": true, + "unique_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}}, { + "address": "aws_iam_role.click_logger_lambda_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_lambda_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"lambda.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-lambda-role", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "after_unknown": { + "arn": true, + "create_date": true, + "id": true, + "inline_policy": true, + "managed_policy_arns": true, + "name_prefix": true, + "tags_all": true, + "unique_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}}, { + "address": "aws_iam_role.click_logger_stream_consumer_firehose_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_stream_consumer_firehose_role", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "assume_role_policy": "{\"Statement\":[{\"Action\":\"sts:AssumeRole\",\"Effect\":\"Allow\",\"Principal\":{\"Service\":\"firehose.amazonaws.com\"},\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}", + "description": null, + "force_detach_policies": false, + "max_session_duration": 3600, + "name": "clicklogger-stream-consumer-firehose-role", + "path": "/", + "permissions_boundary": null, + "tags": null + }, + "after_unknown": { + "arn": true, + "create_date": true, + "id": true, + "inline_policy": true, + "managed_policy_arns": true, + "name_prefix": true, + "tags_all": true, + "unique_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "inline_policy": [], + "managed_policy_arns": [], + "tags_all": {}}}}, { + "address": "aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_api_gateway_cloudwatch_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "name": "clicklogger-api-gateway-cloudwatch-policy", + "name_prefix": null, + "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"logs:CreateLogGroup\",\"logs:CreateLogStream\",\"logs:DescribeLogGroups\",\"logs:DescribeLogStreams\",\"logs:PutLogEvents\",\"logs:GetLogEvents\",\"logs:FilterLogEvents\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}" + }, + "after_unknown": { + "id": true, + "role": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_iam_role_policy.click_logger_invocation_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_invocation_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "name": "clicklogger-invocation-policy", + "name_prefix": null + }, + "after_unknown": { + "id": true, + "policy": true, + "role": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_stream_consumer_firehose_inline_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "name": "clicklogger-stream-consumer-firehose-inline_policy", + "name_prefix": null, + "policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Action\":[\"glue:*\",\"s3:*\",\"logs:*\",\"lambda:*\"],\"Effect\":\"Allow\",\"Resource\":\"*\"}]}" + }, + "after_unknown": { + "id": true, + "role": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_iam_role_policy_attachment.click_loggerlambda_policy", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "click_loggerlambda_policy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "policy_arn": "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole", + "role": "clicklogger-lambda-role" + }, + "after_unknown": { + "id": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_iam_role_policy_attachment.lambda_logs", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "lambda_logs", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "role": "clicklogger-lambda-role" + }, + "after_unknown": { + "id": true, + "policy_arn": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream", + "mode": "managed", + "type": "aws_kinesis_firehose_delivery_stream", + "name": "click_logger_firehose_delivery_stream", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "destination": "extended_s3", + "elasticsearch_configuration": [], + "extended_s3_configuration": [{ + "buffer_interval": 60, + "buffer_size": 64, + "cloudwatch_logging_options": [{ + "enabled": true, + "log_group_name": "/aws/kinesis_firehose_delivery_stream/click_logger_firehose_delivery_stream", + "log_stream_name": "click_logger_firehose_delivery_stream" + }], + "compression_format": "UNCOMPRESSED", + "data_format_conversion_configuration": [{ + "enabled": true, + "input_format_configuration": [{ + "deserializer": [{ + "hive_json_ser_de": [], + "open_x_json_ser_de": [{ + "case_insensitive": true, + "column_to_json_key_mappings": null, + "convert_dots_in_json_keys_to_underscores": false + }] + }] + }], + "output_format_configuration": [{ + "serializer": [{ + "orc_ser_de": [], + "parquet_ser_de": [{ + "block_size_bytes": 268435456, + "compression": "SNAPPY", + "enable_dictionary_compression": false, + "max_padding_bytes": 0, + "page_size_bytes": 1048576, + "writer_version": "V1" + }] + }] + }], + "schema_configuration": [{ + "database_name": "clickloggerdatabase", + "region": "us-east-1", + "table_name": "clickloggertable", + "version_id": "LATEST" + }] + }], + "dynamic_partitioning_configuration": [], + "error_output_prefix": "clicklog_error/error=!{firehose:error-output-type}data=!{timestamp:yyyy}-!{timestamp:MM}-!{timestamp:dd}/", + "kms_key_arn": null, + "prefix": "clicklog/data=!{timestamp:yyyy}-!{timestamp:MM}-!{timestamp:dd}/", + "processing_configuration": [{ + "enabled": true, + "processors": [{ + "parameters": [{ + "parameter_name": "LambdaArn" + }], + "type": "Lambda" + }] + }], + "s3_backup_configuration": [], + "s3_backup_mode": "Disabled" + }], + "http_endpoint_configuration": [], + "kinesis_source_configuration": [], + "name": "clicklogger-firehose-delivery-stream", + "redshift_configuration": [], + "s3_configuration": [], + "server_side_encryption": [], + "splunk_configuration": [], + "tags": null, + "timeouts": null + }, + "after_unknown": { + "arn": true, + "destination_id": true, + "elasticsearch_configuration": [], + "extended_s3_configuration": [{ + "bucket_arn": true, + "cloudwatch_logging_options": [{}], + "data_format_conversion_configuration": [{ + "input_format_configuration": [{ + "deserializer": [{ + "hive_json_ser_de": [], + "open_x_json_ser_de": [{}]}]}], + "output_format_configuration": [{ + "serializer": [{ + "orc_ser_de": [], + "parquet_ser_de": [{}]}]}], + "schema_configuration": [{ + "catalog_id": true, + "role_arn": true + }] + }], + "dynamic_partitioning_configuration": [], + "processing_configuration": [{ + "processors": [{ + "parameters": [{ + "parameter_value": true + }] + }] + }], + "role_arn": true, + "s3_backup_configuration": [] + }], + "http_endpoint_configuration": [], + "id": true, + "kinesis_source_configuration": [], + "redshift_configuration": [], + "s3_configuration": [], + "server_side_encryption": [], + "splunk_configuration": [], + "tags_all": true, + "version_id": true + }, + "before_sensitive": false, + "after_sensitive": { + "elasticsearch_configuration": [], + "extended_s3_configuration": [{ + "cloudwatch_logging_options": [{}], + "data_format_conversion_configuration": [{ + "input_format_configuration": [{ + "deserializer": [{ + "hive_json_ser_de": [], + "open_x_json_ser_de": [{}]}]}], + "output_format_configuration": [{ + "serializer": [{ + "orc_ser_de": [], + "parquet_ser_de": [{}]}]}], + "schema_configuration": [{}]}], + "dynamic_partitioning_configuration": [], + "processing_configuration": [{ + "processors": [{ + "parameters": [{}]}]}], + "s3_backup_configuration": [] + }], + "http_endpoint_configuration": [], + "kinesis_source_configuration": [], + "redshift_configuration": [], + "s3_configuration": [], + "server_side_encryption": [], + "splunk_configuration": [], + "tags_all": {}}}}, { + "address": "aws_lambda_function.lambda_clicklogger", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "STREAM_NAME": "clicklogger-firehose-delivery-stream" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda", + "handler": "com.clicklogs.Handlers.ClickLoggerHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "after_unknown": { + "architectures": true, + "arn": true, + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": true, + "file_system_config": [], + "id": true, + "image_config": [], + "invoke_arn": true, + "last_modified": true, + "qualified_arn": true, + "qualified_invoke_arn": true, + "role": true, + "signing_job_arn": true, + "signing_profile_version_arn": true, + "snap_start": [], + "source_code_size": true, + "tags_all": true, + "tracing_config": true, + "version": true, + "vpc_config": [] + }, + "before_sensitive": false, + "after_sensitive": { + "architectures": [], + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": [], + "file_system_config": [], + "image_config": [], + "snap_start": [], + "tags_all": {}, + "tracing_config": [], + "vpc_config": [] + } + } + }, { + "address": "aws_lambda_function.lambda_clicklogger_authorizer", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger_authorizer", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "AUTH_TOKENS": "ALLOW=ORDERAPP;ALLOW=BILLAPP;" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda-authorizer", + "handler": "com.clicklogs.Handlers.APIGatewayAuthorizerHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "after_unknown": { + "architectures": true, + "arn": true, + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": true, + "file_system_config": [], + "id": true, + "image_config": [], + "invoke_arn": true, + "last_modified": true, + "qualified_arn": true, + "qualified_invoke_arn": true, + "role": true, + "signing_job_arn": true, + "signing_profile_version_arn": true, + "snap_start": [], + "source_code_size": true, + "tags_all": true, + "tracing_config": true, + "version": true, + "vpc_config": [] + }, + "before_sensitive": false, + "after_sensitive": { + "architectures": [], + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": [], + "file_system_config": [], + "image_config": [], + "snap_start": [], + "tags_all": {}, + "tracing_config": [], + "vpc_config": [] + } + } + }, { + "address": "aws_lambda_function.lambda_clicklogger_stream_consumer", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger_stream_consumer", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "DB_TABLE": "clickloggertable" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda-stream-consumer", + "handler": "com.clicklogs.Handlers.ClickLoggerStreamHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "after_unknown": { + "architectures": true, + "arn": true, + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": true, + "file_system_config": [], + "id": true, + "image_config": [], + "invoke_arn": true, + "last_modified": true, + "qualified_arn": true, + "qualified_invoke_arn": true, + "role": true, + "signing_job_arn": true, + "signing_profile_version_arn": true, + "snap_start": [], + "source_code_size": true, + "tags_all": true, + "tracing_config": true, + "version": true, + "vpc_config": [] + }, + "before_sensitive": false, + "after_sensitive": { + "architectures": [], + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": [], + "file_system_config": [], + "image_config": [], + "snap_start": [], + "tags_all": {}, + "tracing_config": [], + "vpc_config": [] + } + } + }, { + "address": "aws_lambda_permission.apigw_lambda", + "mode": "managed", + "type": "aws_lambda_permission", + "name": "apigw_lambda", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "action": "lambda:InvokeFunction", + "event_source_token": null, + "function_url_auth_type": null, + "principal": "apigateway.amazonaws.com", + "principal_org_id": null, + "qualifier": null, + "source_account": null, + "statement_id": "AllowExecutionFromAPIGateway" + }, + "after_unknown": { + "function_name": true, + "id": true, + "source_arn": true, + "statement_id_prefix": true + }, + "before_sensitive": false, + "after_sensitive": {}}}, { + "address": "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket", + "mode": "managed", + "type": "aws_s3_bucket", + "name": "click_logger_firehose_delivery_s3_bucket", + "provider_name": "registry.terraform.io/hashicorp/aws", + "change": { + "actions": ["create"], + "before": null, + "after": { + "acl": "private", + "bucket": "clicklogger-dev-firehose-delivery-bucket-154977180039", + "bucket_prefix": null, + "force_destroy": false, + "tags": { + "Environment": "dev", + "Name": "Firehose S3 Delivery bucket" + }, + "tags_all": { + "Environment": "dev", + "Name": "Firehose S3 Delivery bucket" + }, + "timeouts": null + }, + "after_unknown": { + "acceleration_status": true, + "arn": true, + "bucket_domain_name": true, + "bucket_regional_domain_name": true, + "cors_rule": true, + "grant": true, + "hosted_zone_id": true, + "id": true, + "lifecycle_rule": true, + "logging": true, + "object_lock_configuration": true, + "object_lock_enabled": true, + "policy": true, + "region": true, + "replication_configuration": true, + "request_payer": true, + "server_side_encryption_configuration": true, + "tags": {}, + "tags_all": {}, + "versioning": true, + "website": true, + "website_domain": true, + "website_endpoint": true + }, + "before_sensitive": false, + "after_sensitive": { + "cors_rule": [], + "grant": [], + "lifecycle_rule": [], + "logging": [], + "object_lock_configuration": [], + "replication_configuration": [], + "server_side_encryption_configuration": [], + "tags": {}, + "tags_all": {}, + "versioning": [], + "website": [] + } + } + }], + "output_changes": { + "S3": { + "actions": ["create"], + "before": null, + "after": { + "acl": "private", + "bucket": "clicklogger-dev-firehose-delivery-bucket-154977180039", + "bucket_prefix": null, + "force_destroy": false, + "tags": { + "Environment": "dev", + "Name": "Firehose S3 Delivery bucket" + }, + "tags_all": { + "Environment": "dev", + "Name": "Firehose S3 Delivery bucket" + }, + "timeouts": null + }, + "after_unknown": { + "acceleration_status": true, + "arn": true, + "bucket_domain_name": true, + "bucket_regional_domain_name": true, + "cors_rule": true, + "grant": true, + "hosted_zone_id": true, + "id": true, + "lifecycle_rule": true, + "logging": true, + "object_lock_configuration": true, + "object_lock_enabled": true, + "policy": true, + "region": true, + "replication_configuration": true, + "request_payer": true, + "server_side_encryption_configuration": true, + "tags": {}, + "tags_all": {}, + "versioning": true, + "website": true, + "website_domain": true, + "website_endpoint": true + }, + "before_sensitive": false, + "after_sensitive": false + }, + "deployment-url": { + "actions": ["create"], + "before": null, + "after_unknown": true, + "before_sensitive": false, + "after_sensitive": false + }, + "lambda-clicklogger": { + "actions": ["create"], + "before": null, + "after": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "STREAM_NAME": "clicklogger-firehose-delivery-stream" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda", + "handler": "com.clicklogs.Handlers.ClickLoggerHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "after_unknown": { + "architectures": true, + "arn": true, + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": true, + "file_system_config": [], + "id": true, + "image_config": [], + "invoke_arn": true, + "last_modified": true, + "qualified_arn": true, + "qualified_invoke_arn": true, + "role": true, + "signing_job_arn": true, + "signing_profile_version_arn": true, + "snap_start": [], + "source_code_size": true, + "tags_all": true, + "tracing_config": true, + "version": true, + "vpc_config": [] + }, + "before_sensitive": false, + "after_sensitive": false + }, + "lambda-clicklogger-authorzer": { + "actions": ["create"], + "before": null, + "after": { + "code_signing_config_arn": null, + "dead_letter_config": [], + "description": null, + "environment": [{ + "variables": { + "AUTH_TOKENS": "ALLOW=ORDERAPP;ALLOW=BILLAPP;" + } + }], + "file_system_config": [], + "filename": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "function_name": "clicklogger-lambda-authorizer", + "handler": "com.clicklogs.Handlers.APIGatewayAuthorizerHandler::handleRequest", + "image_config": [], + "image_uri": null, + "kms_key_arn": null, + "layers": null, + "memory_size": 2048, + "package_type": "Zip", + "publish": false, + "replace_security_groups_on_destroy": null, + "replacement_security_group_ids": null, + "reserved_concurrent_executions": -1, + "runtime": "java8", + "s3_bucket": null, + "s3_key": null, + "s3_object_version": null, + "skip_destroy": false, + "snap_start": [], + "source_code_hash": "XKEVaTDaaoic+gbj9uSkhorAcywFBvdUcHsX9QfgYIU=", + "tags": null, + "timeout": 300, + "timeouts": null, + "vpc_config": [] + }, + "after_unknown": { + "architectures": true, + "arn": true, + "dead_letter_config": [], + "environment": [{ + "variables": {}}], + "ephemeral_storage": true, + "file_system_config": [], + "id": true, + "image_config": [], + "invoke_arn": true, + "last_modified": true, + "qualified_arn": true, + "qualified_invoke_arn": true, + "role": true, + "signing_job_arn": true, + "signing_profile_version_arn": true, + "snap_start": [], + "source_code_size": true, + "tags_all": true, + "tracing_config": true, + "version": true, + "vpc_config": [] + }, + "before_sensitive": false, + "after_sensitive": false + } + }, + "prior_state": { + "format_version": "1.0", + "terraform_version": "1.3.9", + "values": { + "root_module": { + "resources": [{ + "address": "data.aws_caller_identity.current", + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "account_id": "154977180039", + "arn": "arn:aws:iam::656177851052:user/someuser", + "id": "194477180039", + "user_id": "ANYUSERID" + }, + "sensitive_values": {}}, { + "address": "data.aws_iam_policy_document.AWSLambdaTrustPolicy", + "mode": "data", + "type": "aws_iam_policy_document", + "name": "AWSLambdaTrustPolicy", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "id": "3693445097", + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"lambda.amazonaws.com\"\n }\n }\n ]\n}", + "override_json": null, + "override_policy_documents": null, + "policy_id": null, + "source_json": null, + "source_policy_documents": null, + "statement": [{ + "actions": ["sts:AssumeRole"], + "condition": [], + "effect": "Allow", + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [{ + "identifiers": ["lambda.amazonaws.com"], + "type": "Service" + }], + "resources": [], + "sid": "" + }], + "version": "2012-10-17" + }, + "sensitive_values": { + "statement": [{ + "actions": [false], + "condition": [], + "not_actions": [], + "not_principals": [], + "not_resources": [], + "principals": [{ + "identifiers": [false] + }], + "resources": [] + }] + } + }, { + "address": "data.aws_region.current", + "mode": "data", + "type": "aws_region", + "name": "current", + "provider_name": "registry.terraform.io/hashicorp/aws", + "schema_version": 0, + "values": { + "description": "US East (N. Virginia)", + "endpoint": "ec2.us-east-1.amazonaws.com", + "id": "us-east-1", + "name": "us-east-1" + }, + "sensitive_values": {}}]}}}, + "configuration": { + "provider_config": { + "aws": { + "name": "aws", + "full_name": "registry.terraform.io/hashicorp/aws", + "expressions": { + "region": { + "constant_value": "us-east-1" + } + } + } + }, + "root_module": { + "outputs": { + "S3": { + "expression": { + "references": ["aws_s3_bucket.click_logger_firehose_delivery_s3_bucket"] + } + }, + "deployment-url": { + "expression": { + "references": ["aws_api_gateway_deployment.clicklogger_deployment.invoke_url", "aws_api_gateway_deployment.clicklogger_deployment"] + } + }, + "lambda-clicklogger": { + "expression": { + "references": ["aws_lambda_function.lambda_clicklogger"] + } + }, + "lambda-clicklogger-authorzer": { + "expression": { + "references": ["aws_lambda_function.lambda_clicklogger_authorizer"] + } + } + }, + "resources": [{ + "address": "aws_api_gateway_account.click_logger_api_gateway_account", + "mode": "managed", + "type": "aws_api_gateway_account", + "name": "click_logger_api_gateway_account", + "provider_config_key": "aws", + "expressions": { + "cloudwatch_role_arn": { + "references": ["aws_iam_role.click_logger_api_gateway_cloudwatch_role.arn", "aws_iam_role.click_logger_api_gateway_cloudwatch_role"] + } + }, + "schema_version": 0 + }, { + "address": "aws_api_gateway_authorizer.clicklogger-authorizer", + "mode": "managed", + "type": "aws_api_gateway_authorizer", + "name": "clicklogger-authorizer", + "provider_config_key": "aws", + "expressions": { + "authorizer_credentials": { + "references": ["aws_iam_role.click_logger_invocation_role.arn", "aws_iam_role.click_logger_invocation_role"] + }, + "authorizer_uri": { + "references": ["aws_lambda_function.lambda_clicklogger_authorizer.invoke_arn", "aws_lambda_function.lambda_clicklogger_authorizer"] + }, + "identity_source": { + "constant_value": "method.request.header.Authorization" + }, + "name": { + "constant_value": "clicklogger-authorizer" + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "type": { + "constant_value": "TOKEN" + } + }, + "schema_version": 0 + }, { + "address": "aws_api_gateway_deployment.clicklogger_deployment", + "mode": "managed", + "type": "aws_api_gateway_deployment", + "name": "clicklogger_deployment", + "provider_config_key": "aws", + "expressions": { + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "stage_name": { + "references": ["var.stage_name"] + } + }, + "schema_version": 0, + "depends_on": ["aws_api_gateway_integration.integration"] + }, { + "address": "aws_api_gateway_integration.integration", + "mode": "managed", + "type": "aws_api_gateway_integration", + "name": "integration", + "provider_config_key": "aws", + "expressions": { + "http_method": { + "references": ["aws_api_gateway_method.method.http_method", "aws_api_gateway_method.method"] + }, + "integration_http_method": { + "constant_value": "POST" + }, + "resource_id": { + "references": ["aws_api_gateway_resource.resource.id", "aws_api_gateway_resource.resource"] + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "type": { + "constant_value": "AWS" + }, + "uri": { + "references": ["aws_lambda_function.lambda_clicklogger.invoke_arn", "aws_lambda_function.lambda_clicklogger"] + } + }, + "schema_version": 0, + "depends_on": ["aws_api_gateway_rest_api.click_logger_api", "aws_api_gateway_resource.resource", "aws_api_gateway_method.method"] + }, { + "address": "aws_api_gateway_integration_response.MyDemoIntegrationResponse", + "mode": "managed", + "type": "aws_api_gateway_integration_response", + "name": "MyDemoIntegrationResponse", + "provider_config_key": "aws", + "expressions": { + "http_method": { + "references": ["aws_api_gateway_method.method.http_method", "aws_api_gateway_method.method"] + }, + "resource_id": { + "references": ["aws_api_gateway_resource.resource.id", "aws_api_gateway_resource.resource"] + }, + "response_parameters": { + "constant_value": { + "method.response.header.Access-Control-Allow-Headers": "'Content-Type,X-Amz-Date,Authorization,X-Api-Key,X-Amz-Security-Token,X-Requested-With'", + "method.response.header.Access-Control-Allow-Methods": "'*'", + "method.response.header.Access-Control-Allow-Origin": "'*'" + } + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "status_code": { + "references": ["aws_api_gateway_method_response.response_200.status_code", "aws_api_gateway_method_response.response_200"] + } + }, + "schema_version": 0, + "depends_on": ["aws_api_gateway_resource.resource", "aws_api_gateway_rest_api.click_logger_api", "aws_api_gateway_method_response.response_200", "aws_api_gateway_method.method", "aws_api_gateway_integration.integration"] + }, { + "address": "aws_api_gateway_method.method", + "mode": "managed", + "type": "aws_api_gateway_method", + "name": "method", + "provider_config_key": "aws", + "expressions": { + "authorization": { + "constant_value": "CUSTOM" + }, + "authorizer_id": { + "references": ["aws_api_gateway_authorizer.clicklogger-authorizer.id", "aws_api_gateway_authorizer.clicklogger-authorizer"] + }, + "http_method": { + "constant_value": "POST" + }, + "request_models": { + "references": ["aws_api_gateway_model.clicklogger_model.name", "aws_api_gateway_model.clicklogger_model"] + }, + "request_parameters": { + "constant_value": { + "method.request.header.Authorization": true + } + }, + "request_validator_id": { + "references": ["aws_api_gateway_request_validator.clicklogger_validator.id", "aws_api_gateway_request_validator.clicklogger_validator"] + }, + "resource_id": { + "references": ["aws_api_gateway_resource.resource.id", "aws_api_gateway_resource.resource"] + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + } + }, + "schema_version": 0, + "depends_on": ["aws_api_gateway_rest_api.click_logger_api", "aws_api_gateway_resource.resource", "aws_api_gateway_authorizer.clicklogger-authorizer", "aws_api_gateway_model.clicklogger_model", "aws_api_gateway_request_validator.clicklogger_validator"] + }, { + "address": "aws_api_gateway_method_response.response_200", + "mode": "managed", + "type": "aws_api_gateway_method_response", + "name": "response_200", + "provider_config_key": "aws", + "expressions": { + "http_method": { + "references": ["aws_api_gateway_method.method.http_method", "aws_api_gateway_method.method"] + }, + "resource_id": { + "references": ["aws_api_gateway_resource.resource.id", "aws_api_gateway_resource.resource"] + }, + "response_models": { + "constant_value": { + "application/json": "Empty" + } + }, + "response_parameters": { + "constant_value": { + "method.response.header.Access-Control-Allow-Headers": true, + "method.response.header.Access-Control-Allow-Methods": true, + "method.response.header.Access-Control-Allow-Origin": true + } + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "status_code": { + "constant_value": "200" + } + }, + "schema_version": 0, + "depends_on": ["aws_api_gateway_resource.resource", "aws_api_gateway_rest_api.click_logger_api", "aws_api_gateway_method.method"] + }, { + "address": "aws_api_gateway_method_settings.general_settings", + "mode": "managed", + "type": "aws_api_gateway_method_settings", + "name": "general_settings", + "provider_config_key": "aws", + "expressions": { + "method_path": { + "constant_value": "*/*" + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "settings": [{ + "data_trace_enabled": { + "constant_value": true + }, + "logging_level": { + "constant_value": "INFO" + }, + "metrics_enabled": { + "constant_value": true + }, + "throttling_burst_limit": { + "constant_value": 50 + }, + "throttling_rate_limit": { + "constant_value": 100 + } + }], + "stage_name": { + "references": ["aws_api_gateway_deployment.clicklogger_deployment.stage_name", "aws_api_gateway_deployment.clicklogger_deployment"] + } + }, + "schema_version": 0 + }, { + "address": "aws_api_gateway_model.clicklogger_model", + "mode": "managed", + "type": "aws_api_gateway_model", + "name": "clicklogger_model", + "provider_config_key": "aws", + "expressions": { + "content_type": { + "constant_value": "application/json" + }, + "description": { + "references": ["var.app_prefix"] + }, + "name": { + "references": ["var.app_prefix"] + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "schema": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_api_gateway_request_validator.clicklogger_validator", + "mode": "managed", + "type": "aws_api_gateway_request_validator", + "name": "clicklogger_validator", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix"] + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "validate_request_body": { + "constant_value": true + }, + "validate_request_parameters": { + "constant_value": true + } + }, + "schema_version": 0 + }, { + "address": "aws_api_gateway_resource.resource", + "mode": "managed", + "type": "aws_api_gateway_resource", + "name": "resource", + "provider_config_key": "aws", + "expressions": { + "parent_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.root_resource_id", "aws_api_gateway_rest_api.click_logger_api"] + }, + "path_part": { + "constant_value": "clicklogger" + }, + "rest_api_id": { + "references": ["aws_api_gateway_rest_api.click_logger_api.id", "aws_api_gateway_rest_api.click_logger_api"] + } + }, + "schema_version": 0, + "depends_on": ["aws_api_gateway_rest_api.click_logger_api"] + }, { + "address": "aws_api_gateway_rest_api.click_logger_api", + "mode": "managed", + "type": "aws_api_gateway_rest_api", + "name": "click_logger_api", + "provider_config_key": "aws", + "expressions": { + "description": { + "constant_value": "click logger api" + }, + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "click_logger_firehose_delivery_stream_log_group", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix"] + }, + "retention_in_days": { + "constant_value": 3 + } + }, + "schema_version": 0 + }, { + "address": "aws_cloudwatch_log_group.clicklogger-api-log-group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "clicklogger-api-log-group", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix", "var.stage_name"] + }, + "retention_in_days": { + "constant_value": 7 + } + }, + "schema_version": 0 + }, { + "address": "aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "lambda_click_logger_authorizer_log_group", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix", "aws_lambda_function.lambda_clicklogger_authorizer.function_name", "aws_lambda_function.lambda_clicklogger_authorizer"] + }, + "retention_in_days": { + "constant_value": 3 + } + }, + "schema_version": 0, + "depends_on": ["aws_lambda_function.lambda_clicklogger_authorizer"] + }, { + "address": "aws_cloudwatch_log_group.lambda_click_logger_log_group", + "mode": "managed", + "type": "aws_cloudwatch_log_group", + "name": "lambda_click_logger_log_group", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix", "aws_lambda_function.lambda_clicklogger.function_name", "aws_lambda_function.lambda_clicklogger"] + }, + "retention_in_days": { + "constant_value": 3 + } + }, + "schema_version": 0, + "depends_on": ["aws_lambda_function.lambda_clicklogger"] + }, { + "address": "aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream", + "mode": "managed", + "type": "aws_cloudwatch_log_stream", + "name": "click_logger_firehose_delivery_stream", + "provider_config_key": "aws", + "expressions": { + "log_group_name": { + "references": ["aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group.name", "aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group"] + }, + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_dynamodb_table.click-logger-table", + "mode": "managed", + "type": "aws_dynamodb_table", + "name": "click-logger-table", + "provider_config_key": "aws", + "expressions": { + "attribute": [{ + "name": { + "constant_value": "requestid" + }, + "type": { + "constant_value": "S" + } + }, { + "name": { + "constant_value": "contextid" + }, + "type": { + "constant_value": "S" + } + }, { + "name": { + "constant_value": "callerid" + }, + "type": { + "constant_value": "S" + } + }], + "billing_mode": { + "constant_value": "PROVISIONED" + }, + "global_secondary_index": [{ + "hash_key": { + "constant_value": "contextid" + }, + "name": { + "constant_value": "ContextCallerIndex" + }, + "non_key_attributes": { + "constant_value": ["requestid", "action", "clientip", "component", "createdtime", "type"] + }, + "projection_type": { + "constant_value": "INCLUDE" + }, + "range_key": { + "constant_value": "callerid" + }, + "read_capacity": { + "constant_value": 5 + }, + "write_capacity": { + "constant_value": 5 + } + }], + "hash_key": { + "constant_value": "requestid" + }, + "name": { + "references": ["var.app_prefix"] + }, + "range_key": { + "constant_value": "contextid" + }, + "read_capacity": { + "constant_value": 5 + }, + "tags": { + "references": ["var.app_prefix", "var.stage_name"] + }, + "write_capacity": { + "constant_value": 5 + } + }, + "schema_version": 1 + }, { + "address": "aws_glue_catalog_database.aws_glue_click_logger_database", + "mode": "managed", + "type": "aws_glue_catalog_database", + "name": "aws_glue_click_logger_database", + "provider_config_key": "aws", + "expressions": { + "description": { + "constant_value": "Click logger Glue database" + }, + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_glue_catalog_table.aws_glue_click_logger_catalog_table", + "mode": "managed", + "type": "aws_glue_catalog_table", + "name": "aws_glue_click_logger_catalog_table", + "provider_config_key": "aws", + "expressions": { + "database_name": { + "references": ["var.app_prefix"] + }, + "name": { + "references": ["var.app_prefix"] + }, + "parameters": { + "constant_value": { + "EXTERNAL": "TRUE", + "parquet.compression": "SNAPPY" + } + }, + "retention": { + "constant_value": 0 + }, + "storage_descriptor": [{ + "columns": [{ + "name": { + "constant_value": "requestid" + }, + "type": { + "constant_value": "string" + } + }, { + "name": { + "constant_value": "contextid" + }, + "type": { + "constant_value": "string" + } + }, { + "comment": { + "constant_value": "" + }, + "name": { + "constant_value": "callerid" + }, + "type": { + "constant_value": "string" + } + }, { + "comment": { + "constant_value": "" + }, + "name": { + "constant_value": "component" + }, + "type": { + "constant_value": "string" + } + }, { + "comment": { + "constant_value": "" + }, + "name": { + "constant_value": "action" + }, + "type": { + "constant_value": "string" + } + }, { + "comment": { + "constant_value": "" + }, + "name": { + "constant_value": "type" + }, + "type": { + "constant_value": "string" + } + }, { + "comment": { + "constant_value": "" + }, + "name": { + "constant_value": "clientip" + }, + "type": { + "constant_value": "string" + } + }, { + "comment": { + "constant_value": "" + }, + "name": { + "constant_value": "createdtime" + }, + "type": { + "constant_value": "string" + } + }], + "compressed": { + "constant_value": false + }, + "input_format": { + "constant_value": "org.apache.hadoop.mapred.TextInputFormat" + }, + "location": { + "references": ["aws_s3_bucket.click_logger_firehose_delivery_s3_bucket.arn", "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket"] + }, + "output_format": { + "constant_value": "org.apache.hadoop.hive.ql.io.HiveIgnoreKeyTextOutputFormat" + }, + "parameters": { + "constant_value": { + "classification": "json", + "compression_type": "none", + "crawler_schema_deserializer_version": "1.0", + "crawler_schema_serializer_version": "1.0", + "type_of_data": "file" + } + }, + "ser_de_info": [{ + "name": { + "references": ["var.app_prefix"] + }, + "parameters": { + "constant_value": { + "serialization.format": 1 + } + }, + "serialization_library": { + "constant_value": "org.openx.data.jsonserde.JsonSerDe" + } + }] + }], + "table_type": { + "constant_value": "EXTERNAL_TABLE" + } + }, + "schema_version": 0, + "depends_on": ["aws_glue_catalog_database.aws_glue_click_logger_database", "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket"] + }, { + "address": "aws_iam_policy.click_loggerlambda_logging_policy", + "mode": "managed", + "type": "aws_iam_policy", + "name": "click_loggerlambda_logging_policy", + "provider_config_key": "aws", + "expressions": { + "description": { + "constant_value": "IAM policy for logging from a lambda" + }, + "name": { + "references": ["var.app_prefix"] + }, + "path": { + "constant_value": "/" + }, + "policy": { + "references": ["aws_dynamodb_table.click-logger-table.arn", "aws_dynamodb_table.click-logger-table", "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream.arn", "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role.click_logger_api_gateway_cloudwatch_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_api_gateway_cloudwatch_role", + "provider_config_key": "aws", + "expressions": { + "assume_role_policy": { + "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Principal\": {\n \"Service\": \"apigateway.amazonaws.com\"\n },\n \"Action\": \"sts:AssumeRole\"\n }\n ]\n}\n" + }, + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role.click_logger_invocation_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_invocation_role", + "provider_config_key": "aws", + "expressions": { + "assume_role_policy": { + "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"apigateway.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n" + }, + "name": { + "references": ["var.app_prefix"] + }, + "path": { + "constant_value": "/" + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role.click_logger_lambda_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_lambda_role", + "provider_config_key": "aws", + "expressions": { + "assume_role_policy": { + "references": ["data.aws_iam_policy_document.AWSLambdaTrustPolicy.json", "data.aws_iam_policy_document.AWSLambdaTrustPolicy"] + }, + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role.click_logger_stream_consumer_firehose_role", + "mode": "managed", + "type": "aws_iam_role", + "name": "click_logger_stream_consumer_firehose_role", + "provider_config_key": "aws", + "expressions": { + "assume_role_policy": { + "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"Service\": \"firehose.amazonaws.com\"\n },\n \"Effect\": \"Allow\",\n \"Sid\": \"\"\n }\n ]\n}\n" + }, + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_api_gateway_cloudwatch_policy", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix"] + }, + "policy": { + "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"logs:CreateLogGroup\",\n \"logs:CreateLogStream\",\n \"logs:DescribeLogGroups\",\n \"logs:DescribeLogStreams\",\n \"logs:PutLogEvents\",\n \"logs:GetLogEvents\",\n \"logs:FilterLogEvents\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n" + }, + "role": { + "references": ["aws_iam_role.click_logger_api_gateway_cloudwatch_role.id", "aws_iam_role.click_logger_api_gateway_cloudwatch_role"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role_policy.click_logger_invocation_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_invocation_policy", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix"] + }, + "policy": { + "references": ["aws_lambda_function.lambda_clicklogger_authorizer.arn", "aws_lambda_function.lambda_clicklogger_authorizer"] + }, + "role": { + "references": ["aws_iam_role.click_logger_invocation_role.id", "aws_iam_role.click_logger_invocation_role"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy", + "mode": "managed", + "type": "aws_iam_role_policy", + "name": "click_logger_stream_consumer_firehose_inline_policy", + "provider_config_key": "aws", + "expressions": { + "name": { + "references": ["var.app_prefix"] + }, + "policy": { + "constant_value": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Effect\": \"Allow\",\n \"Action\": [\n \"glue:*\",\n \"s3:*\",\n \"logs:*\",\n \"lambda:*\"\n ],\n \"Resource\": \"*\"\n }\n ]\n}\n" + }, + "role": { + "references": ["aws_iam_role.click_logger_stream_consumer_firehose_role.id", "aws_iam_role.click_logger_stream_consumer_firehose_role"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role_policy_attachment.click_loggerlambda_policy", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "click_loggerlambda_policy", + "provider_config_key": "aws", + "expressions": { + "policy_arn": { + "constant_value": "arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole" + }, + "role": { + "references": ["aws_iam_role.click_logger_lambda_role.name", "aws_iam_role.click_logger_lambda_role"] + } + }, + "schema_version": 0 + }, { + "address": "aws_iam_role_policy_attachment.lambda_logs", + "mode": "managed", + "type": "aws_iam_role_policy_attachment", + "name": "lambda_logs", + "provider_config_key": "aws", + "expressions": { + "policy_arn": { + "references": ["aws_iam_policy.click_loggerlambda_logging_policy.arn", "aws_iam_policy.click_loggerlambda_logging_policy"] + }, + "role": { + "references": ["aws_iam_role.click_logger_lambda_role.name", "aws_iam_role.click_logger_lambda_role"] + } + }, + "schema_version": 0 + }, { + "address": "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream", + "mode": "managed", + "type": "aws_kinesis_firehose_delivery_stream", + "name": "click_logger_firehose_delivery_stream", + "provider_config_key": "aws", + "expressions": { + "destination": { + "constant_value": "extended_s3" + }, + "extended_s3_configuration": [{ + "bucket_arn": { + "references": ["aws_s3_bucket.click_logger_firehose_delivery_s3_bucket.arn", "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket"] + }, + "buffer_interval": { + "constant_value": 60 + }, + "buffer_size": { + "constant_value": 64 + }, + "cloudwatch_logging_options": [{ + "enabled": { + "constant_value": true + }, + "log_group_name": { + "constant_value": "/aws/kinesis_firehose_delivery_stream/click_logger_firehose_delivery_stream" + }, + "log_stream_name": { + "constant_value": "click_logger_firehose_delivery_stream" + } + }], + "compression_format": { + "constant_value": "UNCOMPRESSED" + }, + "data_format_conversion_configuration": [{ + "enabled": { + "constant_value": true + }, + "input_format_configuration": [{ + "deserializer": [{ + "open_x_json_ser_de": [{ + "case_insensitive": { + "constant_value": true + } + }] + }] + }], + "output_format_configuration": [{ + "serializer": [{ + "parquet_ser_de": [{ + "compression": { + "constant_value": "SNAPPY" + } + }] + }] + }], + "schema_configuration": [{ + "database_name": { + "references": ["aws_glue_catalog_database.aws_glue_click_logger_database.name", "aws_glue_catalog_database.aws_glue_click_logger_database"] + }, + "region": { + "references": ["data.aws_region.current.name", "data.aws_region.current"] + }, + "role_arn": { + "references": ["aws_iam_role.click_logger_stream_consumer_firehose_role.arn", "aws_iam_role.click_logger_stream_consumer_firehose_role"] + }, + "table_name": { + "references": ["aws_glue_catalog_table.aws_glue_click_logger_catalog_table.name", "aws_glue_catalog_table.aws_glue_click_logger_catalog_table"] + } + }] + }], + "error_output_prefix": { + "constant_value": "clicklog_error/error=!{firehose:error-output-type}data=!{timestamp:yyyy}-!{timestamp:MM}-!{timestamp:dd}/" + }, + "prefix": { + "constant_value": "clicklog/data=!{timestamp:yyyy}-!{timestamp:MM}-!{timestamp:dd}/" + }, + "processing_configuration": [{ + "enabled": { + "constant_value": "true" + }, + "processors": [{ + "parameters": [{ + "parameter_name": { + "constant_value": "LambdaArn" + }, + "parameter_value": { + "references": ["aws_lambda_function.lambda_clicklogger_stream_consumer.arn", "aws_lambda_function.lambda_clicklogger_stream_consumer"] + } + }], + "type": { + "constant_value": "Lambda" + } + }] + }], + "role_arn": { + "references": ["aws_iam_role.click_logger_stream_consumer_firehose_role.arn", "aws_iam_role.click_logger_stream_consumer_firehose_role"] + } + }], + "name": { + "references": ["var.app_prefix"] + } + }, + "schema_version": 1, + "depends_on": ["aws_s3_bucket.click_logger_firehose_delivery_s3_bucket"] + }, { + "address": "aws_lambda_function.lambda_clicklogger", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger", + "provider_config_key": "aws", + "expressions": { + "environment": [{ + "variables": { + "references": ["aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream.name", "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream"] + } + }], + "filename": { + "references": ["var.lambda_source_zip_path"] + }, + "function_name": { + "references": ["var.app_prefix"] + }, + "handler": { + "constant_value": "com.clicklogs.Handlers.ClickLoggerHandler::handleRequest" + }, + "memory_size": { + "constant_value": 2048 + }, + "role": { + "references": ["aws_iam_role.click_logger_lambda_role.arn", "aws_iam_role.click_logger_lambda_role"] + }, + "runtime": { + "constant_value": "java8" + }, + "source_code_hash": { + "references": ["var.lambda_source_zip_path"] + }, + "timeout": { + "constant_value": 300 + } + }, + "schema_version": 0, + "depends_on": ["aws_iam_role.click_logger_lambda_role", "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream"] + }, { + "address": "aws_lambda_function.lambda_clicklogger_authorizer", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger_authorizer", + "provider_config_key": "aws", + "expressions": { + "environment": [{ + "variables": { + "constant_value": { + "AUTH_TOKENS": "ALLOW=ORDERAPP;ALLOW=BILLAPP;" + } + } + }], + "filename": { + "references": ["var.lambda_source_zip_path"] + }, + "function_name": { + "references": ["var.app_prefix"] + }, + "handler": { + "constant_value": "com.clicklogs.Handlers.APIGatewayAuthorizerHandler::handleRequest" + }, + "memory_size": { + "constant_value": 2048 + }, + "role": { + "references": ["aws_iam_role.click_logger_lambda_role.arn", "aws_iam_role.click_logger_lambda_role"] + }, + "runtime": { + "constant_value": "java8" + }, + "source_code_hash": { + "references": ["var.lambda_source_zip_path"] + }, + "timeout": { + "constant_value": 300 + } + }, + "schema_version": 0, + "depends_on": ["aws_iam_role.click_logger_lambda_role"] + }, { + "address": "aws_lambda_function.lambda_clicklogger_stream_consumer", + "mode": "managed", + "type": "aws_lambda_function", + "name": "lambda_clicklogger_stream_consumer", + "provider_config_key": "aws", + "expressions": { + "environment": [{ + "variables": { + "references": ["aws_dynamodb_table.click-logger-table.name", "aws_dynamodb_table.click-logger-table"] + } + }], + "filename": { + "references": ["var.lambda_source_zip_path"] + }, + "function_name": { + "references": ["var.app_prefix"] + }, + "handler": { + "constant_value": "com.clicklogs.Handlers.ClickLoggerStreamHandler::handleRequest" + }, + "memory_size": { + "constant_value": 2048 + }, + "role": { + "references": ["aws_iam_role.click_logger_lambda_role.arn", "aws_iam_role.click_logger_lambda_role"] + }, + "runtime": { + "constant_value": "java8" + }, + "source_code_hash": { + "references": ["var.lambda_source_zip_path"] + }, + "timeout": { + "constant_value": 300 + } + }, + "schema_version": 0, + "depends_on": ["aws_iam_role.click_logger_lambda_role", "aws_dynamodb_table.click-logger-table"] + }, { + "address": "aws_lambda_permission.apigw_lambda", + "mode": "managed", + "type": "aws_lambda_permission", + "name": "apigw_lambda", + "provider_config_key": "aws", + "expressions": { + "action": { + "constant_value": "lambda:InvokeFunction" + }, + "function_name": { + "references": ["aws_lambda_function.lambda_clicklogger.arn", "aws_lambda_function.lambda_clicklogger"] + }, + "principal": { + "constant_value": "apigateway.amazonaws.com" + }, + "source_arn": { + "references": ["aws_api_gateway_rest_api.click_logger_api.execution_arn", "aws_api_gateway_rest_api.click_logger_api"] + }, + "statement_id": { + "constant_value": "AllowExecutionFromAPIGateway" + } + }, + "schema_version": 0, + "depends_on": ["aws_lambda_function.lambda_clicklogger", "aws_api_gateway_rest_api.click_logger_api"] + }, { + "address": "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket", + "mode": "managed", + "type": "aws_s3_bucket", + "name": "click_logger_firehose_delivery_s3_bucket", + "provider_config_key": "aws", + "expressions": { + "acl": { + "constant_value": "private" + }, + "bucket": { + "references": ["var.app_prefix", "var.stage_name", "data.aws_caller_identity.current.account_id", "data.aws_caller_identity.current"] + }, + "tags": { + "references": ["var.stage_name"] + } + }, + "schema_version": 0 + }, { + "address": "data.aws_caller_identity.current", + "mode": "data", + "type": "aws_caller_identity", + "name": "current", + "provider_config_key": "aws", + "schema_version": 0 + }, { + "address": "data.aws_iam_policy_document.AWSLambdaTrustPolicy", + "mode": "data", + "type": "aws_iam_policy_document", + "name": "AWSLambdaTrustPolicy", + "provider_config_key": "aws", + "expressions": { + "statement": [{ + "actions": { + "constant_value": ["sts:AssumeRole"] + }, + "effect": { + "constant_value": "Allow" + }, + "principals": [{ + "identifiers": { + "constant_value": ["lambda.amazonaws.com"] + }, + "type": { + "constant_value": "Service" + } + }] + }] + }, + "schema_version": 0 + }, { + "address": "data.aws_region.current", + "mode": "data", + "type": "aws_region", + "name": "current", + "provider_config_key": "aws", + "schema_version": 0 + }], + "variables": { + "app_prefix": { + "default": "clicklogger", + "description": "Application prefix for the AWS services that are built" + }, + "lambda_source_zip_path": { + "default": "..//..//source//clicklogger//target//clicklogger-1.0-SNAPSHOT.jar", + "description": "Java lambda zip" + }, + "stage_name": { + "default": "dev" + } + } + } + }, + "relevant_attributes": [{ + "resource": "aws_iam_role.click_logger_lambda_role", + "attribute": ["arn"] + }, { + "resource": "aws_iam_role.click_logger_invocation_role", + "attribute": ["arn"] + }, { + "resource": "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket", + "attribute": ["arn"] + }, { + "resource": "aws_iam_role.click_logger_stream_consumer_firehose_role", + "attribute": ["arn"] + }, { + "resource": "aws_dynamodb_table.click-logger-table", + "attribute": ["arn"] + }, { + "resource": "aws_api_gateway_rest_api.click_logger_api", + "attribute": ["id"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger_authorizer", + "attribute": ["arn"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger_authorizer", + "attribute": ["invoke_arn"] + }, { + "resource": "aws_glue_catalog_database.aws_glue_click_logger_database", + "attribute": ["name"] + }, { + "resource": "aws_glue_catalog_table.aws_glue_click_logger_catalog_table", + "attribute": ["name"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger_stream_consumer", + "attribute": ["arn"] + }, { + "resource": "aws_api_gateway_rest_api.click_logger_api", + "attribute": ["execution_arn"] + }, { + "resource": "aws_iam_role.click_logger_stream_consumer_firehose_role", + "attribute": ["id"] + }, { + "resource": "aws_iam_role.click_logger_lambda_role", + "attribute": ["name"] + }, { + "resource": "aws_iam_role.click_logger_invocation_role", + "attribute": ["id"] + }, { + "resource": "data.aws_caller_identity.current", + "attribute": ["account_id"] + }, { + "resource": "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream", + "attribute": ["name"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger", + "attribute": ["arn"] + }, { + "resource": "aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group", + "attribute": ["name"] + }, { + "resource": "aws_iam_policy.click_loggerlambda_logging_policy", + "attribute": ["arn"] + }, { + "resource": "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket", + "attribute": [] + }, { + "resource": "aws_api_gateway_deployment.clicklogger_deployment", + "attribute": ["invoke_url"] + }, { + "resource": "aws_iam_role.click_logger_api_gateway_cloudwatch_role", + "attribute": ["arn"] + }, { + "resource": "aws_iam_role.click_logger_api_gateway_cloudwatch_role", + "attribute": ["id"] + }, { + "resource": "aws_api_gateway_resource.resource", + "attribute": ["id"] + }, { + "resource": "aws_api_gateway_method.method", + "attribute": ["http_method"] + }, { + "resource": "aws_api_gateway_rest_api.click_logger_api", + "attribute": ["root_resource_id"] + }, { + "resource": "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream", + "attribute": ["arn"] + }, { + "resource": "aws_api_gateway_method_response.response_200", + "attribute": ["status_code"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger_authorizer", + "attribute": ["function_name"] + }, { + "resource": "aws_api_gateway_model.clicklogger_model", + "attribute": ["name"] + }, { + "resource": "aws_api_gateway_request_validator.clicklogger_validator", + "attribute": ["id"] + }, { + "resource": "data.aws_region.current", + "attribute": ["name"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger", + "attribute": ["function_name"] + }, { + "resource": "aws_api_gateway_deployment.clicklogger_deployment", + "attribute": ["stage_name"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger", + "attribute": [] + }, { + "resource": "data.aws_iam_policy_document.AWSLambdaTrustPolicy", + "attribute": ["json"] + }, { + "resource": "aws_dynamodb_table.click-logger-table", + "attribute": ["name"] + }, { + "resource": "aws_api_gateway_authorizer.clicklogger-authorizer", + "attribute": ["id"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger", + "attribute": ["invoke_arn"] + }, { + "resource": "aws_lambda_function.lambda_clicklogger_authorizer", + "attribute": [] + }] +} \ No newline at end of file diff --git a/examples/tfplan/iriusrisk-tfplan-aws-mapping.yaml b/examples/tfplan/iriusrisk-tfplan-aws-mapping.yaml new file mode 100644 index 00000000..9d18d905 --- /dev/null +++ b/examples/tfplan/iriusrisk-tfplan-aws-mapping.yaml @@ -0,0 +1,297 @@ +trustzones: + - id: b61d6911-338d-46a8-9f39-8dcd24abfe91 + name: Public Cloud + type: b61d6911-338d-46a8-9f39-8dcd24abfe91 + $default: true + + # SG MAPPING (AUXILIARY SG) + # type 4 + - id: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + name: Internet + type: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + $source: {$singleton: {$type: "aws_security_group", $props: ["egress[0].cidr_blocks", "ingress[0].cidr_blocks"]}} + +# The order of the components is important because parent components must be defined before child components +components: + + - type: CD-ACM + $source: {$singleton: {$type: "aws_acm_certificate"}} + + - type: cloudwatch + $source: {$singleton: {$type: "aws_cloudwatch_metric_alarm"}} + + - type: dynamodb + $source: {$type: "aws_dynamodb_table"} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)dynamodb$ + name: DynamoDB from VPCEndpoint + + - type: vpc + $source: {$type: "aws_vpc"} + + - type: ec2 + $source: {$type: "aws_instance"} + parent: {$path: "resource_properties.subnet_id"} + + - type: empty-component + $source: {$type: "aws_subnet"} + parent: {$path: "resource_properties.vpc_id"} + + - type: empty-component + $source: {$type: "aws_vpc_endpoint"} + parent: {$path: "resource_properties.subnet_ids"} +# (Previous) parent: {$findFirst: ["*.subnet_ids[]", "*.vpc_id | [0] | re_sub('[\\$\\{\\}]', '', @) | re_sub('aws_[\\w-]+\\.', '', @) | re_sub('\\.id', '', @)"]} +# This findFirst never executes the second condition as *.subnet_ids[] always will return an array (maybe empty) and findFirst only works with None + + + - type: empty-component + $source: {$type: "aws_internet_gateway"} + + - type: elastic-container-service + $source: {$type: "aws_ecs_service"} + parent: {$path: "resource_properties.network_configuration[0].subnets"} + $children: {$path: "resource_properties.task_definition"} + + - type: docker-container + $source: {$type: "aws_ecs_task_definition"} + + - type: load-balancer + $source: {$type: ["aws_lb", "aws_elb", "aws_alb"]} + parent: {$path: "resource_properties.subnets"} + + - type: kms + $source: {$singleton: {$type: "aws_kms_key"}} + + - type: aws-lambda-function + $source: {$type: "aws_lambda_function"} + + - type: cloudwatch + $source: {$singleton: {$type: "aws_cloudwatch_log_group"}} + + - type: rds + $source: {$type: ["aws_db_instance", "aws_rds_cluster"]} + + - type: route-53 + $source: {$type: "aws_route53_zone"} + + - type: CD-EC2-AUTO-SCALING + $source: { $type: "aws_autoscaling_group" } + + - type: empty-component + $source: { $type: "cloudflare_record" } + + - type: s3 + $source: {$type: "aws_s3_bucket"} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)s3$ + name: S3 from VPCEndpoint + + - type: CD-SECRETS-MANAGER + $source: {$singleton: {$type: "aws_secretsmanager_secret"}} + + - type: sqs-simple-queue-service + $source: {$type: "aws_sqs_queue"} + + - type: CD-SYSTEMS-MANAGER + $source: {$singleton: {$type: {$regex: ^aws_ssm_\w*$}}} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)ssm$ + name: {$numberOfSources: {oneSource: {$path: "Type"}, multipleSource: {$format: "Systems Manager from VPCEndpoint (grouped)"}}} + - regex: ^(.*)ssmmessages$ + name: {$numberOfSources: {oneSource: {$path: "Type"}, multipleSource: {$format: "Systems Manager from VPCEndpoint (grouped)"}}} + + - type: empty-component + $source: {$type: "aws_synthetics_canary"} + parent: {$path: "resource_properties.vpc_config[0].subnet_ids"} + + - type: api-gateway + $source: {$singleton: {$type: {$regex: ^aws_api_gateway_\w*$}}} + + + - type: athena + $source: {$singleton: {$type: {$regex: ^aws_athena_\w*$}}} + + - type: CD-MQ + $source: {$singleton: {$type: {$regex: ^aws_mq_\w*$}}} + + - type: cf-cloudfront + $source: {$singleton: {$type: {$regex: ^aws_cloudfront_\w*$}}} + + - type: cloudtrail + $source: {$type: "aws_cloudtrail"} + + - type: cognito + $source: {$type: ["aws_cognito_user_pool", "aws_cognito_identity_pool"]} + + - type: CD-CONFIG + $source: {$singleton: {$type: {$regex: ^aws_config_\w*$}}} + + - type: elastic-container-registry + $source: {$singleton: {$type: {$regex: ^aws_ecr_\w*$}}} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)ecr.dkr$ + name: ECR from VPCEndpoint + + - type: elastic-container-kubernetes + $source: {$type: "aws_eks_cluster"} + + - type: elasticache + $source: {$singleton: {$type: {$regex: ^aws_elasticache_\w*$}}} + + - type: CD-GUARDDUTY + $source: {$singleton: {$type: {$regex: ^aws_guardduty_\w*$}}} + + - type: CD-INSPECTOR + $source: {$singleton: {$type: {$regex: ^aws_inspector_\w*$}}} + + - type: CD-MACIE + $source: {$singleton: {$type: {$regex: ^aws_macie2_\w*$}}} + + - type: CD-AWS-NETWORK-FIREWALL + $source: {$type: "aws_networkfirewall_firewall"} + parent: {$path: "resource_properties.vpc_id"} + + - type: redshift + $source: {$type: "aws_redshift_cluster"} + + - type: CD-SES + $source: {$singleton: {$type: {$regex: ^aws_ses_\w*$}}} + + - type: sns + $source: {$singleton: {$type: {$regex: ^aws_sns_\w*$}}} + + - type: step-functions + $source: {$type: {$regex: ^aws_sfn_\w*$}} + + - type: CD-WAF + $source: {$singleton: {$type: {$regex: ^aws_waf_\w*$}}} + + - type: kinesis-data-analytics + $source: {$singleton: {$type: {$regex: ^aws_kinesis_analytics_\w*$}}} + + - type: kinesis-data-analytics + $source: {$singleton: {$type: {$regex: ^aws_kinesis_stream\w*$}}} + + - type: kinesis-data-firehose + $source: {$singleton: {$type: {$regex: ^aws_kinesis_firehose_\w*$}}} + + - type: generic-client + name: {$ip: {$path: "resource_properties.egress[0].cidr_blocks"}} + $source: {$type: "aws_security_group", $props: "egress[0].cidr_blocks"} + parent: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + tags: + - Outbound connection destination IP + + - type: generic-client + name: {$ip: {$path: "resource_properties.ingress[0].cidr_blocks"}} + $source: {$type: "aws_security_group", $props: "ingress[0].cidr_blocks"} + parent: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + tags: + - Inbound connection source IP + + - type: rds + $source: {$module: "terraform-aws-modules/rds/aws"} + + - type: vpc + $source: {$module: "terraform-aws-modules/vpc/aws"} + + - type: load-balancer + $source: {$module: "terraform-aws-modules/alb/aws"} + +dataflows: + #### Security Groups #### + #### Type 1 #### - Resource to Security Group + - $source: {$props: "security_group_ids"} + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.security_group_ids"}} + + - $source: {$props: "security_groups"} + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.security_groups"}} + + - $source: {$props: "network_configuration | [0].security_groups"} + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.network_configuration[0].security_groups"}} + + - $source: {$props: "vpc_config" } + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.vpc_config[0].security_group_ids"}} + + #### Type 2 #### Security Group to Security Group + - $source: {$type: "aws_security_group_rule", $props: "type=='ingress'"} + source: {$hub: {$path: "resource_properties.source_security_group_id"}} + destination: {$hub: {$path: "resource_properties.security_group_id"}} + tags: + - $path: "resource_properties.description" + - $path: "resource_properties.protocol" + - $path: "resource_properties.from_port|to_string(@)" + - $path: "resource_properties.to_port|to_string(@)" + + - $source: {$type: "aws_security_group_rule", $props: "type=='egress'"} + source: {$hub: {$path: "resource_properties.security_group_id"}} + destination: {$hub: {$path: "resource_properties.source_security_group_id"}} + tags: + - $path: "resource_properties.description" + - $path: "resource_properties.protocol" + - $path: "resource_properties.from_port|to_string(@)" + - $path: "resource_properties.to_port|to_string(@)" + + #### Type 3 #### - Security Group to Resource + - $source: {$type: "aws_security_group"} + source: {$path: "resource_properties.ingress[0].cidr_blocks"} + destination: {$hub: {$path: "resource_id"}} + tags: + - $path: "resource_properties.ingress[0].description" + - $path: "resource_properties.ingress[0].protocol" + - $path: "resource_properties.ingress[0].from_port|to_string(@)" + - $path: "resource_properties.ingress[0].to_port|to_string(@)" + + - $source: {$type: "aws_security_group"} + source: {$hub: {$path: "resource_id"}} + destination: {$path: "resource_properties.egress[0].cidr_blocks"} + tags: + - $path: "resource_properties.egress[0].description" + - $path: "resource_properties.egress[0].protocol" + - $path: "resource_properties.egress[0].cidr_blocks|join(',', @)" + + #### Security Groups #### + - name: {$format: "dataflow to Lambda function in {resource_name}"} + $source: {$type: "aws_lambda_event_source_mapping"} + source: {$path: "resource_properties.event_source_arn"} + destination: {$path: "resource_properties.function_name"} + + - name: {$format: "dataflow from Lambda function on Failure {resource_name}"} + $source: {$type: "aws_lambda_event_source_mapping"} + source: {$path: "resource_properties.function_name"} + destination: {$path: "resource_properties.destination_config[0].on_failure[0].destination_arn"} + + # The parameter "logging" is deprecated. Use the resource "aws_s3_bucket_logging" instead + - name: {$format: "S3 dataflow from {resource_name}"} + $source: {$type: "aws_s3_bucket"} + source: {$path: "resource_id"} + destination: {$path: "resource_properties.logging[0].target_bucket"} + + - name: {$format: "S3 dataflow from {resource_type}"} + $source: {$type: "aws_s3_bucket_logging"} + source: {$path: "resource_properties.bucket" } + destination: {$path: "resource_properties.target_bucket"} + # The parameter "logging" is deprecated. Use the resource "aws_s3_bucket_logging" instead + + - name: {$format: "API gateway data flow from {resource_type}"} + $source: {$type: "aws_api_gateway_authorizer"} + source: {$numberOfSources: {oneSource: {$path: "resource_id"}, multipleSource: {$format: "api-gateway (grouped)"}}} + destination: {$path: "resource_properties.provider_arns[0]"} + tags: + - API gateway dataflow diff --git a/run_configurations.zip b/run_configurations.zip index 63a0a1c6..4b60268c 100644 Binary files a/run_configurations.zip and b/run_configurations.zip differ diff --git a/setup.py b/setup.py index 59a29cae..08129420 100644 --- a/setup.py +++ b/setup.py @@ -46,6 +46,7 @@ "test": [ 'tox==4.4.6', 'pytest==7.2.2', + 'coverage==7.2.3', 'responses==0.22.0', 'deepdiff==6.2.3', 'httpx==0.23.3', diff --git a/sl_util/sl_util/file_utils.py b/sl_util/sl_util/file_utils.py index 18e49d95..331fd6e1 100644 --- a/sl_util/sl_util/file_utils.py +++ b/sl_util/sl_util/file_utils.py @@ -1,5 +1,6 @@ import os import tempfile +from magic import Magic def copy_to_disk(diag_file: tempfile.SpooledTemporaryFile, suffix: str): @@ -12,12 +13,6 @@ def delete(filename: str): os.unlink(filename) -def get_data(filename: str) -> str: - with open(filename, 'r') as f: - iac_data = f.read() - return iac_data - - def get_byte_data(filename: str) -> bytes: with open(filename, 'rb') as f: iac_data = f.read() @@ -25,4 +20,12 @@ def get_byte_data(filename: str) -> bytes: def read_byte_data(data: bytes, encoding: str = 'utf-8') -> str: - return data.decode(encoding) \ No newline at end of file + return data.decode(encoding) + + +def get_file_type_by_content(file_content: bytes) -> str: + return Magic(mime=True).from_buffer(file_content) + + +def get_file_type_by_name(file_name: str) -> str: + return Magic(mime=True).from_file(file_name) diff --git a/sl_util/sl_util/str_utils.py b/sl_util/sl_util/str_utils.py index ae2b2444..ff40c639 100644 --- a/sl_util/sl_util/str_utils.py +++ b/sl_util/sl_util/str_utils.py @@ -6,3 +6,7 @@ def deterministic_uuid(source): if source: random.seed(source) return str(uuid.UUID(int=random.getrandbits(128), version=4)) + + +def get_bytes(s: str, encoding='utf-8') -> bytes: + return bytes(s, encoding) diff --git a/sl_util/sl_util/str_utls.py b/sl_util/sl_util/str_utls.py deleted file mode 100644 index ae2b2444..00000000 --- a/sl_util/sl_util/str_utls.py +++ /dev/null @@ -1,8 +0,0 @@ -import random -import uuid - - -def deterministic_uuid(source): - if source: - random.seed(source) - return str(uuid.UUID(int=random.getrandbits(128), version=4)) diff --git a/sl_util/tests/unit/test_str_utils.py b/sl_util/tests/unit/test_str_utils.py index 57d74ebe..4c103d1c 100644 --- a/sl_util/tests/unit/test_str_utils.py +++ b/sl_util/tests/unit/test_str_utils.py @@ -1,6 +1,6 @@ from pytest import mark -from sl_util.sl_util.str_utls import deterministic_uuid +from sl_util.sl_util.str_utils import deterministic_uuid class TestStrUtils: diff --git a/slp_base/slp_base/errors.py b/slp_base/slp_base/errors.py index 38c9121c..1fa5f71a 100644 --- a/slp_base/slp_base/errors.py +++ b/slp_base/slp_base/errors.py @@ -31,7 +31,7 @@ class CommonError(Exception): def __init__(self, title, detail=None, message=None): self.title = title - self.detail = detail + self.detail = detail or message self.message = message def __str__(self): diff --git a/slp_base/slp_base/provider_type.py b/slp_base/slp_base/provider_type.py index 36ff1859..f31a0931 100644 --- a/slp_base/slp_base/provider_type.py +++ b/slp_base/slp_base/provider_type.py @@ -6,8 +6,9 @@ class IacType(str, Provider): CLOUDFORMATION = ("CLOUDFORMATION", "CloudFormation", RepresentationType.CODE, ['application/json', 'text/yaml', 'text/plain', 'application/octet-stream']) TERRAFORM = ("TERRAFORM", "Terraform", RepresentationType.CODE, - ['text/plain', 'application/octet-stream', 'application/json', 'application/msword', - 'text/vnd.graphviz']) + ['text/plain', 'application/octet-stream', 'application/json']) + TFPLAN = ("TFPLAN", "Terraform Plan", RepresentationType.CODE, + ['text/plain', 'application/json', 'application/msword', 'text/vnd.graphviz', 'application/octet-stream']) class DiagramType(str, Provider): @@ -20,4 +21,3 @@ class DiagramType(str, Provider): class EtmType(str, Provider): MTMT = ("MTMT", "Microsoft Threat Modeling Tool", RepresentationType.THREAT_MODEL, ['application/octet-stream', 'application/xml', 'text/plain']) - diff --git a/slp_base/slp_base/provider_validator.py b/slp_base/slp_base/provider_validator.py index 3f259c6e..504017cf 100644 --- a/slp_base/slp_base/provider_validator.py +++ b/slp_base/slp_base/provider_validator.py @@ -5,17 +5,13 @@ def generate_content_type_error(provider: Provider, source_file_name: str, exception=SourceFileNotValidError): - title = f'{provider.provider_name} file is not valid' - details = f'Invalid content type for {source_file_name}' - msg = details - return exception(title, msg, msg) + return exception(title=f'{provider.provider_name} file is not valid', + message=f'Invalid content type for {source_file_name}') def generate_size_error(provider: Provider, source_file_name: str, exception=SourceFileNotValidError): - title = f'{provider.provider_name} file is not valid' - details = f'Provided {source_file_name} is not valid. Invalid size' - msg = details - return exception(title, msg, msg) + return exception(title=f'{provider.provider_name} file is not valid', + message=f'Provided {source_file_name} is not valid. Invalid size') class ProviderValidator(metaclass=abc.ABCMeta): diff --git a/slp_base/tests/unit/test_provider_resolver.py b/slp_base/tests/unit/test_provider_resolver.py index d1506ed7..166f7187 100644 --- a/slp_base/tests/unit/test_provider_resolver.py +++ b/slp_base/tests/unit/test_provider_resolver.py @@ -5,18 +5,18 @@ import pytest from slp_base import OTMProcessor, ProviderParser, MappingLoader, MappingValidator, ProviderLoader, ProviderValidator, \ - LoadingSourceFileError, ProviderNotFoundError + ProviderNotFoundError from slp_base.slp_base.provider_resolver import ProviderResolver +_slp_allowed_imports = ['slp_base', 'sl_util', 'otm'] MOCKED_PROCESSORS = [ - {'name': 'slp_base_MOCKED', 'type': 'processor', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf', 'slp_mtmt']}, + {'name': 'slp_base_MOCKED', 'type': 'processor', 'allowed_imports': _slp_allowed_imports}, {'name': 'slp_cft_MOCKED', 'type': 'processor', 'provider_type': 'CLOUDFORMATION', - 'forbidden_dependencies': ['startleft', 'slp_tf', 'slp_mtmt']}, + 'allowed_imports': _slp_allowed_imports}, {'name': 'slp_tf_MOCKED', 'type': 'processor', 'provider_type': 'TERRAFORM', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_mtmt']}, + 'allowed_imports': _slp_allowed_imports}, {'name': 'slp_mtmt_MOCKED', 'type': 'processor', 'provider_type': 'MTMT', - 'forbidden_dependencies': ['startleft', 'slp_cft', 'slp_tf']} + 'allowed_imports': _slp_allowed_imports} ] diff --git a/slp_cft/slp_cft/validate/cft_validator.py b/slp_cft/slp_cft/validate/cft_validator.py index 209db5f6..01a26a0f 100644 --- a/slp_cft/slp_cft/validate/cft_validator.py +++ b/slp_cft/slp_cft/validate/cft_validator.py @@ -1,7 +1,6 @@ import logging -import magic - +from sl_util.sl_util.file_utils import get_file_type_by_content from slp_base import IacType from slp_base.slp_base import ProviderValidator from slp_base.slp_base.errors import IacFileNotValidError @@ -22,7 +21,7 @@ def __init__(self, cloudformation_data_list: [bytes]): def validate(self): logger.info('Validating CloudFormation file') self.__validate_size() - self.__validate_content_type() + self.validate_content_type() def __validate_size(self): for cft_data in self.cloudformation_data_list: @@ -30,9 +29,7 @@ def __validate_size(self): if size > MAX_SIZE or size < MIN_SIZE: raise generate_size_error(IacType.CLOUDFORMATION, 'iac_file', IacFileNotValidError) - def __validate_content_type(self): + def validate_content_type(self): for cft_data in self.cloudformation_data_list: - magik = magic.Magic(mime=True) - mime = magik.from_buffer(cft_data) - if mime not in IacType.CLOUDFORMATION.valid_mime: + if get_file_type_by_content(cft_data) not in IacType.CLOUDFORMATION.valid_mime: raise generate_content_type_error(IacType.CLOUDFORMATION, 'iac_file', IacFileNotValidError) diff --git a/slp_cft/tests/integration/test_cft_processor.py b/slp_cft/tests/integration/test_cft_processor.py index f478cf01..85f28427 100644 --- a/slp_cft/tests/integration/test_cft_processor.py +++ b/slp_cft/tests/integration/test_cft_processor.py @@ -1,6 +1,6 @@ import pytest -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base.slp_base.errors import OTMBuildingError, MappingFileNotValidError, IacFileNotValidError, \ LoadingIacFileError from slp_base.tests.util.otm import validate_and_compare_otm, validate_and_compare @@ -29,10 +29,10 @@ class TestCloudformationProcessor: def test_altsource_components(self): # GIVEN a valid CFT file with altsource resources - cft_file = get_data(test_resource_paths.altsource_components_json) + cft_file = get_byte_data(test_resource_paths.altsource_components_json) # AND a valid CFT mapping file - mapping_file = get_data(test_resource_paths.default_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.default_cloudformation_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cft_file], [mapping_file]).process() @@ -43,10 +43,10 @@ def test_altsource_components(self): def test_orphan_component_is_not_mapped(self): # GIVEN a valid CFT file with a resource (VPCssm) with a parent which is not declared as component itself (CustomVPC) - cloudformation_file = get_data(test_resource_paths.cloudformation_orphan_component) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_orphan_component) # AND a valid CFT mapping file - mapping_file = get_data(test_resource_paths.default_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.default_cloudformation_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -57,10 +57,10 @@ def test_orphan_component_is_not_mapped(self): def test_component_dataflow_ids(self): # GIVEN a valid CFT file with some resources - cloudformation_file = get_data(test_resource_paths.cloudformation_for_security_group_tests_json) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_for_security_group_tests_json) # AND a valid CFT mapping file - mapping_file = get_data(test_resource_paths.default_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.default_cloudformation_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -210,10 +210,10 @@ def test_component_dataflow_ids(self): def test_run_valid_mappings(self): # GIVEN a valid CFT file with some resources - cloudformation_file = get_data(test_resource_paths.cloudformation_for_mappings_tests_json) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_for_mappings_tests_json) # AND a valid CFT mapping file - mapping_file = get_data(test_resource_paths.default_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.default_cloudformation_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -266,10 +266,10 @@ def test_run_valid_mappings(self): def test_mapping_component_without_parent(self): # GIVEN a valid CFT file - cloudformation_file = get_data(test_resource_paths.cloudformation_component_without_parent) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_component_without_parent) # AND an invalid CFT mapping file with a mapping without parent - mapping_file = get_data(test_resource_paths.cloudformation_mapping_component_without_parent) + mapping_file = get_byte_data(test_resource_paths.cloudformation_mapping_component_without_parent) # WHEN the CFT file is processed # THEN an OTMBuildingError is raised @@ -282,10 +282,10 @@ def test_mapping_component_without_parent(self): def test_mapping_skipped_component_without_parent(self): # GIVEN a valid CFT file - cloudformation_file = get_data(test_resource_paths.cloudformation_skipped_component_without_parent) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_skipped_component_without_parent) # AND a CFT mapping file that skips the component without parent - mapping_file = get_data(test_resource_paths.cloudformation_mapping_component_without_parent) + mapping_file = get_byte_data(test_resource_paths.cloudformation_mapping_component_without_parent) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -304,10 +304,10 @@ def test_mapping_skipped_component_without_parent(self): def test_security_groups_use_case_a_1_with_3_components(self): # GIVEN a valid CFT file - cloudformation_file = get_data(test_resource_paths.cloudformation_for_security_group_tests_json) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_for_security_group_tests_json) # AND a CFT mapping file that skips the component without parent - mapping_file = get_data(test_resource_paths.cloudformation_for_security_groups_mapping) + mapping_file = get_byte_data(test_resource_paths.cloudformation_for_security_groups_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -339,10 +339,10 @@ def test_security_groups_use_case_a_1_with_3_components(self): def test_run_security_groups_use_case_a_2(self): # GIVEN a valid CFT file - cloudformation_file = get_data(test_resource_paths.cloudformation_for_security_group_tests_2_json) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_for_security_group_tests_2_json) # AND a CFT mapping file that skips the component without parent - mapping_file = get_data(test_resource_paths.cloudformation_for_security_groups_mapping) + mapping_file = get_byte_data(test_resource_paths.cloudformation_for_security_groups_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -394,10 +394,10 @@ def test_run_security_groups_use_case_a_2(self): def test_run_security_groups_use_case_b(self): # GIVEN a valid CFT file - cloudformation_file = get_data(test_resource_paths.cloudformation_for_security_group_tests_json) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_for_security_group_tests_json) # AND a CFT mapping file that skips the component without parent - mapping_file = get_data(test_resource_paths.cloudformation_for_security_groups_mapping) + mapping_file = get_byte_data(test_resource_paths.cloudformation_for_security_groups_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -455,19 +455,19 @@ def test_run_security_groups_use_case_b(self): @pytest.mark.parametrize('mapping_file', [None, [None]]) def test_mapping_files_not_provided(self, mapping_file): # GIVEN a sample valid IaC file (and none mapping file) - cloudformation_file = [get_data(SAMPLE_VALID_CFT_FILE)] + cloudformation_file = [get_byte_data(SAMPLE_VALID_CFT_FILE)] # WHEN creating OTM project from IaC file # THEN raises TypeError with pytest.raises(TypeError): - CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [get_data(mapping_file)]).process() + CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [get_byte_data(mapping_file)]).process() def test_invalid_mapping_files(self): # GIVEN a sample valid IaC file - cloudformation_file = get_data(SAMPLE_VALID_CFT_FILE) + cloudformation_file = get_byte_data(SAMPLE_VALID_CFT_FILE) # AND an invalid iac mappings file - mapping_file = [get_data(test_resource_paths.invalid_yaml)] + mapping_file = [get_byte_data(test_resource_paths.invalid_yaml)] # WHEN creating OTM project from IaC file # THEN raises MappingFileNotValidError @@ -475,15 +475,15 @@ def test_invalid_mapping_files(self): CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], mapping_file).process() @pytest.mark.parametrize('cloudformation_file', - [[get_data(test_resource_paths.cloudformation_invalid_size)], - [get_data(test_resource_paths.cloudformation_invalid_size), - get_data(test_resource_paths.cloudformation_invalid_size)], - [get_data(test_resource_paths.cloudformation_invalid_size), - get_data(test_resource_paths.cloudformation_resources_file)]]) + [[get_byte_data(test_resource_paths.cloudformation_invalid_size)], + [get_byte_data(test_resource_paths.cloudformation_invalid_size), + get_byte_data(test_resource_paths.cloudformation_invalid_size)], + [get_byte_data(test_resource_paths.cloudformation_invalid_size), + get_byte_data(test_resource_paths.cloudformation_resources_file)]]) def test_invalid_cloudformation_file(self, cloudformation_file): # GIVEN a sample invalid CFT file # AND a valid iac mappings file - mapping_file = [get_data(SAMPLE_VALID_MAPPING_FILE)] + mapping_file = [get_byte_data(SAMPLE_VALID_MAPPING_FILE)] # WHEN creating OTM project from IaC file # THEN raises OTMBuildingError @@ -492,9 +492,9 @@ def test_invalid_cloudformation_file(self, cloudformation_file): def test_run_valid_simple_iac_mapping_file(self): # GIVEN a valid CFT file - cloudformation_file = get_data(SAMPLE_SINGLE_VALID_CFT_FILE) + cloudformation_file = get_byte_data(SAMPLE_SINGLE_VALID_CFT_FILE) # AND a valid mapping file - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE_IR) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE_IR) # WHEN the method CloudformationProcessor::process is invoked otm = CloudformationProcessor('multiple-files', 'multiple-files', [cloudformation_file], @@ -506,11 +506,11 @@ def test_run_valid_simple_iac_mapping_file(self): def test_run_valid_multiple_iac_mapping_files(self): # GIVEN the valid CFT file - networks_cft_file = get_data(SAMPLE_NETWORKS_CFT_FILE) + networks_cft_file = get_byte_data(SAMPLE_NETWORKS_CFT_FILE) # AND another valid CFT file - resources_cft_file = get_data(SAMPLE_RESOURCES_CFT_FILE) + resources_cft_file = get_byte_data(SAMPLE_RESOURCES_CFT_FILE) # AND a valid mapping file - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE_IR) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE_IR) # WHEN the method CloudformationProcessor::process is invoked otm = CloudformationProcessor('multiple-files', 'multiple-files', [networks_cft_file, resources_cft_file], [mapping_file]).process() @@ -520,7 +520,7 @@ def test_run_valid_multiple_iac_mapping_files(self): def test_run_empty_multiple_iac_files(self): # GIVEN a request without any iac_file key - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE_IR) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE_IR) # WHEN the method CloudformationProcessor::process is invoked # THEN an RequestValidationError is raised with pytest.raises(LoadingIacFileError): @@ -528,12 +528,12 @@ def test_run_empty_multiple_iac_files(self): @pytest.mark.parametrize('source', [ # GIVEN a standalone SecurityGroupEgress configuration - [get_data(test_resource_paths.standalone_securitygroupegress_configuration)], + [get_byte_data(test_resource_paths.standalone_securitygroupegress_configuration)], # GIVEN a standalone SecurityGroupIngress configuration - [get_data(test_resource_paths.standalone_securitygroupingress_configuration)]]) + [get_byte_data(test_resource_paths.standalone_securitygroupingress_configuration)]]) def test_security_group_configuration(self, source): # AND a CFT mapping file - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE) # WHEN the method CloudformationProcessor::process is invoked otm = CloudformationProcessor('id', 'name', source, [mapping_file]).process() # THEN otm has a generic-client in Internet Trustzone @@ -543,9 +543,9 @@ def test_security_group_configuration(self, source): def test_multiple_stack_plus_s3_ec2(self): # GIVEN the file with multiple Subnet AWS::EC2::Instance different configurations - cloudformation_file = get_data(test_resource_paths.multiple_stack_plus_s3_ec2) + cloudformation_file = get_byte_data(test_resource_paths.multiple_stack_plus_s3_ec2) # AND a valid iac mappings file - mapping_file = [get_data(SAMPLE_VALID_MAPPING_FILE)] + mapping_file = [get_byte_data(SAMPLE_VALID_MAPPING_FILE)] # WHEN processing otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], mapping_file).process() @@ -559,10 +559,10 @@ def test_multiple_stack_plus_s3_ec2(self): def test_parsing_cft_json_file_with_ref(self): # GIVEN a cloudformation JSON file - cloudformation_file = get_data(SAMPLE_REF_DEFAULT_JSON) + cloudformation_file = get_byte_data(SAMPLE_REF_DEFAULT_JSON) # AND a mapping file that matches a component whose name is a Ref Value # AND the ref value is a Parameter with Default Attribute - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE_IR) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE_IR) # WHEN parsing the file otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -571,10 +571,10 @@ def test_parsing_cft_json_file_with_ref(self): def test_parsing_cft_yaml_file_with_ref(self): # GIVEN a cloudformation YAML file - cloudformation_file = get_data(SAMPLE_REF_DEFAULT_YAML) + cloudformation_file = get_byte_data(SAMPLE_REF_DEFAULT_YAML) # AND a mapping file that matches a component whose name is a Ref Value # AND the ref value is a Resource - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE_IR) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE_IR) # WHEN parsing the file otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -583,10 +583,10 @@ def test_parsing_cft_yaml_file_with_ref(self): def test_parsing_cft_json_file_without_ref(self): # GIVEN a cloudformation file - cloudformation_file = get_data(SAMPLE_REF_WITHOUT_DEFAULT_JSON) + cloudformation_file = get_byte_data(SAMPLE_REF_WITHOUT_DEFAULT_JSON) # AND a mapping file that matches a component whose name is a Ref Value # AND the ref value is a Parameter without Default Attribute - mapping_file = get_data(SAMPLE_VALID_MAPPING_FILE_IR) + mapping_file = get_byte_data(SAMPLE_VALID_MAPPING_FILE_IR) # WHEN parsing the file otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -595,8 +595,8 @@ def test_parsing_cft_json_file_without_ref(self): def test_mapping_without_ref_attribute(self): # GIVEN a mapping file with searchPath: ["Properties.SubnetId.Ref","Properties.SubnetId"] function - cloudformation_file = get_data(test_resource_paths.multiple_stack_plus_s3_ec2) - mapping_file = get_data(SAMPLE_MAPPING_FILE_WITHOUT_REF) + cloudformation_file = get_byte_data(test_resource_paths.multiple_stack_plus_s3_ec2) + mapping_file = get_byte_data(SAMPLE_MAPPING_FILE_WITHOUT_REF) # WHEN parsing a CFT otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -608,10 +608,10 @@ def test_mapping_without_ref_attribute(self): def test_minimal_cft_file(self): # Given a minimal valid CFT file - cft_minimal_file = get_data(test_resource_paths.cloudformation_minimal_content) + cft_minimal_file = get_byte_data(test_resource_paths.cloudformation_minimal_content) # and the default mapping file for CFT - mapping_file = get_data(test_resource_paths.default_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.default_cloudformation_mapping) # When parsing the file with Startleft and the default mapping file otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cft_minimal_file], [mapping_file]).process() @@ -624,10 +624,10 @@ def test_minimal_cft_file(self): def test_generate_empty_otm_with_empty_mapping_file(self): # Given an empty mapping file - mapping_file = get_data(test_resource_paths.empty_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.empty_cloudformation_mapping) # and a valid CFT file with content - cloudformation_file = get_data(test_resource_paths.cloudformation_for_mappings_tests_json) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_for_mappings_tests_json) # When parsing the file with Startleft and the empty mapping file otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -639,10 +639,10 @@ def test_generate_empty_otm_with_empty_mapping_file(self): def test_security_group_components_from_same_resource(self): # GIVEN a valid CFT file with a security group containing both an inbound and an outbound rule - cloudformation_file = get_data(test_resource_paths.cloudformation_components_from_same_resource) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_components_from_same_resource) # AND a valid CFT mapping file - mapping_file = get_data(test_resource_paths.default_cloudformation_mapping) + mapping_file = get_byte_data(test_resource_paths.default_cloudformation_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -662,10 +662,10 @@ def test_security_group_components_from_same_resource(self): def test_trustzone_types(self): # GIVEN a valid CFT file - cloudformation_file = get_data(test_resource_paths.cloudformation_minimal_content) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_minimal_content) # AND a valid CFT mapping file that defines two TZs, one with type and the one without type - mapping_file = get_data(test_resource_paths.cloudformation_trustzone_types_mapping) + mapping_file = get_byte_data(test_resource_paths.cloudformation_trustzone_types_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() @@ -676,10 +676,10 @@ def test_trustzone_types(self): def test_components_with_trustzones_of_same_type(self): # GIVEN a valid CFT file WITH some components mapped to different TZs of the same type - cloudformation_file = get_data(test_resource_paths.cloudformation_components_with_trustzones_of_same_type) + cloudformation_file = get_byte_data(test_resource_paths.cloudformation_components_with_trustzones_of_same_type) # AND a valid CFT mapping file that defines two different TZs of the same type - mapping_file = get_data(test_resource_paths.cloudformation_multiple_trustzones_same_type_mapping) + mapping_file = get_byte_data(test_resource_paths.cloudformation_multiple_trustzones_same_type_mapping) # WHEN the CFT file is processed otm = CloudformationProcessor(SAMPLE_ID, SAMPLE_NAME, [cloudformation_file], [mapping_file]).process() diff --git a/slp_cft/tests/unit/parse/mapping/test_cft_base_mapper.py b/slp_cft/tests/unit/parse/mapping/test_cft_base_mapper.py index 29b6ca9e..f7f4ffc5 100644 --- a/slp_cft/tests/unit/parse/mapping/test_cft_base_mapper.py +++ b/slp_cft/tests/unit/parse/mapping/test_cft_base_mapper.py @@ -3,7 +3,7 @@ from slp_cft.slp_cft.parse.mapping.mappers.cft_base_mapper import CloudformationBaseMapper from slp_cft.slp_cft.parse.mapping.cft_sourcemodel import CloudformationSourceModel from slp_cft.slp_cft.load.cft_loader import CloudformationLoader -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_cft.tests.resources import test_resource_paths REF_FUNCTION_COMMON_SOURCE = {'Type': 'AWS::EC2::SecurityGroup', 'Condition': 'EC2SecurityEnabled', 'Properties': @@ -40,7 +40,7 @@ def test_get_tags_with_attribute_not_found(self, mock_source_model): def test_retrieve_name_with_ref_function_parameters_and_default(self): # GIVEN a cloudformation JSON file # AND the ref value is a Parameter with Default Attribute - cft_file = get_data(test_resource_paths.cloudformation_with_ref_function_and_default_property_json) + cft_file = get_byte_data(test_resource_paths.cloudformation_with_ref_function_and_default_property_json) cft_loader = CloudformationLoader([cft_file]) cft_loader.load() @@ -57,7 +57,7 @@ def test_retrieve_name_with_ref_function_parameters_and_default(self): def test_retrieve_name_with_ref_function_parameters_without_default(self): # GIVEN a cloudformation JSON file # AND the ref value is a Parameter without Default Attribute - cft_file = get_data(test_resource_paths.cloudformation_with_ref_function_and_without_default_property_json) + cft_file = get_byte_data(test_resource_paths.cloudformation_with_ref_function_and_without_default_property_json) cft_loader = CloudformationLoader([cft_file]) cft_loader.load() @@ -74,7 +74,7 @@ def test_retrieve_name_with_ref_function_parameters_without_default(self): def test_retrieve_name_with_ref_function_without_parameters(self): # GIVEN a cloudformation JSON file # AND the ref value is a Parameter without Parameters - cft_file = get_data(test_resource_paths.cloudformation_with_ref_function_and_without_parameters) + cft_file = get_byte_data(test_resource_paths.cloudformation_with_ref_function_and_without_parameters) cft_loader = CloudformationLoader([cft_file]) cft_loader.load() diff --git a/slp_mtmt/slp_mtmt/mtmt_validator.py b/slp_mtmt/slp_mtmt/mtmt_validator.py index 7250b69c..cd37521e 100644 --- a/slp_mtmt/slp_mtmt/mtmt_validator.py +++ b/slp_mtmt/slp_mtmt/mtmt_validator.py @@ -1,6 +1,6 @@ import logging -import magic as magik +from sl_util.sl_util.file_utils import get_file_type_by_content from slp_base import ProviderValidator, EtmType from slp_base.slp_base.provider_validator import generate_content_type_error, generate_size_error @@ -28,7 +28,5 @@ def __validate_size(self): raise generate_size_error(EtmType.MTMT, 'source_file') def __validate_content_type(self): - magic = magik.Magic(mime=True) - mime = magic.from_buffer(self.mt_data) - if mime not in EtmType.MTMT.valid_mime: + if get_file_type_by_content(self.mt_data) not in EtmType.MTMT.valid_mime: raise generate_content_type_error(EtmType.MTMT, 'source_file') diff --git a/slp_mtmt/slp_mtmt/parse/mtmt_trustzone_parser.py b/slp_mtmt/slp_mtmt/parse/mtmt_trustzone_parser.py index 168fbe64..5c3c4bfa 100644 --- a/slp_mtmt/slp_mtmt/parse/mtmt_trustzone_parser.py +++ b/slp_mtmt/slp_mtmt/parse/mtmt_trustzone_parser.py @@ -2,7 +2,7 @@ from otm.otm.entity.parent_type import ParentType from otm.otm.entity.trustzone import Trustzone -from sl_util.sl_util.str_utls import deterministic_uuid +from sl_util.sl_util.str_utils import deterministic_uuid from slp_mtmt.slp_mtmt.entity.mtmt_entity_border import MTMBorder from slp_mtmt.slp_mtmt.mtmt_entity import MTMT from slp_mtmt.slp_mtmt.mtmt_mapping_file_loader import MTMTMapping diff --git a/slp_tf/slp_tf/tf_processor.py b/slp_tf/slp_tf/tf_processor.py index 4f2ea881..5cc858e5 100644 --- a/slp_tf/slp_tf/tf_processor.py +++ b/slp_tf/slp_tf/tf_processor.py @@ -1,12 +1,9 @@ -from slp_tf.slp_tf.tfplan.mapping.tfplan_mapping_file_loader import TfplanMappingFileLoader -from slp_tf.slp_tf.tfplan.tfplan_parser import TfplanParser from slp_base.slp_base import MappingLoader, MappingValidator from slp_base.slp_base import OTMProcessor from slp_base.slp_base import ProviderValidator from slp_base.slp_base.provider_loader import ProviderLoader from slp_base.slp_base.provider_parser import ProviderParser from slp_tf.slp_tf.load.tf_loader import TerraformLoader -from slp_tf.slp_tf.tfplan.load.tfplan_loader import TfplanLoader, get_tfplan, get_tfgraph from slp_tf.slp_tf.load.tf_mapping_file_loader import TerraformMappingFileLoader from slp_tf.slp_tf.parse.tf_parser import TerraformParser from slp_tf.slp_tf.validate.tf_mapping_file_validator import TerraformMappingFileValidator @@ -24,9 +21,6 @@ def __init__(self, project_id: str, project_name: str, sources: [bytes], mapping self.sources = sources self.mappings = mappings - self.tfplan_source: bytes = get_tfplan(self.sources) - self.tfgraph_source: bytes = get_tfgraph(self.sources) - self.terraform_loader = None self.mapping_loader = None @@ -34,29 +28,18 @@ def get_provider_validator(self) -> ProviderValidator: return TerraformValidator(self.sources) def get_provider_loader(self) -> ProviderLoader: - self.terraform_loader = \ - TfplanLoader(self.tfplan_source, self.tfgraph_source) if self.tfplan_source else TerraformLoader(self.sources) + self.terraform_loader = TerraformLoader(self.sources) return self.terraform_loader def get_mapping_validator(self) -> MappingValidator: return TerraformMappingFileValidator(self.mappings) def get_mapping_loader(self) -> MappingLoader: - self.mapping_loader = TfplanMappingFileLoader(self.mappings) \ - if self.tfplan_source and self.tfgraph_source else TerraformMappingFileLoader(self.mappings) - + self.mapping_loader = TerraformMappingFileLoader(self.mappings) return self.mapping_loader def get_provider_parser(self) -> ProviderParser: - return \ - TfplanParser( - self.project_id, - self.project_name, - self.terraform_loader.get_terraform(), - self.terraform_loader.get_tfgraph(), - self.mapping_loader.get_mappings()) \ - if self.tfplan_source and self.tfgraph_source \ - else TerraformParser( + return TerraformParser( self.project_id, self.project_name, self.terraform_loader.get_terraform(), diff --git a/slp_tf/slp_tf/tfplan/load/tfplan_loader.py b/slp_tf/slp_tf/tfplan/load/tfplan_loader.py deleted file mode 100644 index 1d805734..00000000 --- a/slp_tf/slp_tf/tfplan/load/tfplan_loader.py +++ /dev/null @@ -1,106 +0,0 @@ -from typing import Callable - -import pygraphviz -from networkx import nx_agraph - -from slp_tf.slp_tf.load.tf_loader import hcl2_reader -from sl_util.sl_util.file_utils import read_byte_data -from sl_util.sl_util.json_utils import yaml_reader, is_json - -from slp_base import ProviderLoader, LoadingIacFileError -from slp_tf.slp_tf.tfplan.load.tfplan_to_resource_dict import TfplanToResourceDict - - -def __is_graph(source: bytes): - try: - load_tfgraph(source) - return True - except Exception: - return False - - -def __is_hcl2(source: bytes): - try: - hcl2_reader(source) - return True - except Exception: - return False - - -def __get_source(sources: [bytes], selector: Callable) -> bytes: - if len(sources) == 1 and selector(sources[0]): - return sources[0] - - if len(sources) == 2: - first_source_is_requested_type = selector(sources[0]) - second_source_is_requested_type = selector(sources[1]) - - if first_source_is_requested_type and second_source_is_requested_type: - raise LoadingIacFileError( - title='Multiple Terraform plan files', - message='Only one Terraform plan and an optional Terraform graph supported') - - if (first_source_is_requested_type and __is_hcl2(sources[1])) or \ - (second_source_is_requested_type and __is_hcl2(sources[0])): - raise LoadingIacFileError( - title='Mixed Terraform sources', - message='Terraform config files mixed with Terraform plan or graph are not supported') - - if first_source_is_requested_type: - return sources[0] - if second_source_is_requested_type: - return sources[1] - - -def get_tfplan(sources: [bytes]) -> bytes: - return __get_source(sources, is_json) - - -def get_tfgraph(sources: [bytes]) -> bytes: - return __get_source(sources, __is_graph) - - -def load_tfgraph(source: bytes): - return nx_agraph.from_agraph(pygraphviz.AGraph(read_byte_data(source))) - - -class TfplanLoader(ProviderLoader): - - def __init__(self, tfplan_source: bytes, tfgraph_source: bytes = None): - self.tfplan_source: bytes = tfplan_source - self.tfgraph_source: bytes = tfgraph_source - - self.tfplan: dict = {} - - self.terraform: dict = {} - self.tfgraph: dict = {} - - def load(self): - self.__load_tfplan() - - if self.tfgraph_source: - self.tfgraph = load_tfgraph(self.tfgraph_source) - - def get_terraform(self): - return self.terraform - - def get_tfgraph(self): - return self.tfgraph - - def __load_tfplan(self): - try: - self.tfplan = yaml_reader(self.tfplan_source) - if self.tfplan: - self.__map_tfplan_to_resources() - except Exception: - raise LoadingIacFileError( - title='IaC file is not valid', - message='The provided IaC file could not be processed' - ) - - def __map_tfplan_to_resources(self): - resources = TfplanToResourceDict(self.tfplan.get('configuration', {}).get('root_module', {}).get('resources', {}))\ - .map_modules([self.tfplan['planned_values']['root_module']]) - - if resources: - self.terraform = {'resource': resources} diff --git a/slp_tf/slp_tf/validate/tf_validator.py b/slp_tf/slp_tf/validate/tf_validator.py index 2b27e6f2..7916c19f 100644 --- a/slp_tf/slp_tf/validate/tf_validator.py +++ b/slp_tf/slp_tf/validate/tf_validator.py @@ -1,6 +1,6 @@ import logging -import magic +from sl_util.sl_util.file_utils import get_file_type_by_content from slp_base import IacFileNotValidError, IacType from slp_base.slp_base import ProviderValidator @@ -33,7 +33,5 @@ def __validate_size(self): def __validate_content_type(self): for tf_data in self.terraform_data_list: - magik = magic.Magic(mime=True) - mime = magik.from_buffer(tf_data) - if mime not in IacType.TERRAFORM.valid_mime: + if get_file_type_by_content(tf_data) not in IacType.TERRAFORM.valid_mime: raise generate_content_type_error(IacType.TERRAFORM, 'iac_file', IacFileNotValidError) diff --git a/slp_tf/tests/__init__.py b/slp_tf/tests/__init__.py index 803613f9..e69de29b 100644 --- a/slp_tf/tests/__init__.py +++ b/slp_tf/tests/__init__.py @@ -1,3 +0,0 @@ -import pytest - -pytest.register_assert_rewrite('slp_tf.tests.unit.tfplan.otm_graph_util') \ No newline at end of file diff --git a/slp_tf/tests/integration/test_tf_calculate_children.py b/slp_tf/tests/integration/test_tf_calculate_children.py index 685b008e..94755b65 100644 --- a/slp_tf/tests/integration/test_tf_calculate_children.py +++ b/slp_tf/tests/integration/test_tf_calculate_children.py @@ -1,6 +1,6 @@ import pytest -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_tf import TerraformProcessor from slp_tf.tests.resources import test_resource_paths from slp_tf.tests.resources.test_resource_paths import expected_aws_parent_children_components, \ @@ -18,10 +18,10 @@ class TestTerraformCalculateChildren: @pytest.mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_aws_parent_children_components(self, mapping_file): # GIVEN a valid TF file with some resources - terraform_file = get_data(test_resource_paths.terraform_aws_parent_children_components) + terraform_file = get_byte_data(test_resource_paths.terraform_aws_parent_children_components) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -31,16 +31,16 @@ def test_aws_parent_children_components(self, mapping_file): assert result == expected @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(tf_mapping_children_by_type_name), id="by {type}.{name}"), - pytest.param(get_data(tf_mapping_children_by_full_path_attribute), id="by full path attribute"), - pytest.param(get_data(tf_mapping_children_by_name), id="by {name}")]) + pytest.param(get_byte_data(tf_mapping_children_by_type_name), id="by {type}.{name}"), + pytest.param(get_byte_data(tf_mapping_children_by_full_path_attribute), id="by full path attribute"), + pytest.param(get_byte_data(tf_mapping_children_by_name), id="by {name}")]) def test_define_children_relationship(self, mapping_file): """ Generate an OTM for TF file with children definition """ # GIVEN a TF file with two resources # AND a mapping file with children definition - tf_file = get_data(test_resource_paths.terraform_aws_parent_children_components) + tf_file = get_byte_data(test_resource_paths.terraform_aws_parent_children_components) # WHEN processing otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() diff --git a/slp_tf/tests/integration/test_tf_calculate_modules.py b/slp_tf/tests/integration/test_tf_calculate_modules.py index 99b5da1d..d3d0e129 100644 --- a/slp_tf/tests/integration/test_tf_calculate_modules.py +++ b/slp_tf/tests/integration/test_tf_calculate_modules.py @@ -1,4 +1,4 @@ -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_tf.tests.resources import test_resource_paths from slp_tf import TerraformProcessor from slp_base.tests.util.otm import validate_and_compare @@ -12,10 +12,10 @@ class TestTerraformCalculateModules: def test_mapping_modules(self): # GIVEN a valid TF file with some TF modules - terraform_file = get_data(test_resource_paths.terraform_modules) + terraform_file = get_byte_data(test_resource_paths.terraform_modules) # AND a valid TF mapping file - mapping_file = get_data(test_resource_paths.terraform_mapping_modules) + mapping_file = get_byte_data(test_resource_paths.terraform_mapping_modules) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -26,10 +26,10 @@ def test_mapping_modules(self): def test_extra_modules(self): # GIVEN a valid TF file with some special TF modules - terraform_file = get_data(test_resource_paths.terraform_extra_modules_sample) + terraform_file = get_byte_data(test_resource_paths.terraform_extra_modules_sample) # AND a valid TF mapping file - mapping_file = get_data(test_resource_paths.terraform_mapping_extra_modules) + mapping_file = get_byte_data(test_resource_paths.terraform_mapping_extra_modules) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() diff --git a/slp_tf/tests/integration/test_tf_calculate_parents.py b/slp_tf/tests/integration/test_tf_calculate_parents.py index 894ce989..f8f3a2a1 100644 --- a/slp_tf/tests/integration/test_tf_calculate_parents.py +++ b/slp_tf/tests/integration/test_tf_calculate_parents.py @@ -1,6 +1,6 @@ import pytest -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base import OTMBuildingError from slp_base.tests.util.otm import validate_and_compare from slp_tf import TerraformProcessor @@ -20,10 +20,10 @@ class TestTerraformCalculateParents: @pytest.mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_orphan_component_is_not_mapped(self, mapping_file): # GIVEN a valid TF file with a resource (VPCssm) whose parents do (private VPCs) not exist in the file - terraform_file = get_data(test_resource_paths.terraform_orphan_component) + terraform_file = get_byte_data(test_resource_paths.terraform_orphan_component) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -35,10 +35,10 @@ def test_orphan_component_is_not_mapped(self, mapping_file): def test_mapping_component_without_parent(self): # GIVEN a valid TF file - terraform_file = get_data(test_resource_paths.terraform_component_without_parent) + terraform_file = get_byte_data(test_resource_paths.terraform_component_without_parent) # AND an invalid TF mapping file with a mapping without parent - mapping_file = get_data(test_resource_paths.terraform_mapping_aws_component_without_parent) + mapping_file = get_byte_data(test_resource_paths.terraform_mapping_aws_component_without_parent) # WHEN the TF file is processed # THEN an OTMBuildingError is raised @@ -51,10 +51,10 @@ def test_mapping_component_without_parent(self): def test_mapping_skipped_component_without_parent(self): # GIVEN a valid TF file - terraform_file = get_data(test_resource_paths.terraform_skipped_component_without_parent) + terraform_file = get_byte_data(test_resource_paths.terraform_skipped_component_without_parent) # AND a TF mapping file that skips the component without parent - mapping_file = get_data(test_resource_paths.terraform_mapping_aws_component_without_parent) + mapping_file = get_byte_data(test_resource_paths.terraform_mapping_aws_component_without_parent) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -65,16 +65,16 @@ def test_mapping_skipped_component_without_parent(self): assert result == expected @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(tf_mapping_parent_by_type_name), id="by {type}.{name}"), - pytest.param(get_data(tf_mapping_parent_by_full_path_attribute), id="by full path attribute"), - pytest.param(get_data(tf_mapping_parent_by_name), id="by {name}")]) + pytest.param(get_byte_data(tf_mapping_parent_by_type_name), id="by {type}.{name}"), + pytest.param(get_byte_data(tf_mapping_parent_by_full_path_attribute), id="by full path attribute"), + pytest.param(get_byte_data(tf_mapping_parent_by_name), id="by {name}")]) def test_define_parent_relationship(self, mapping_file): """ Generate an OTM for TF file with parent definition """ # GIVEN a TF file with two resources # AND a mapping file with parent definition - tf_file = get_data(test_resource_paths.terraform_define_parent_relationship) + tf_file = get_byte_data(test_resource_paths.terraform_define_parent_relationship) # WHEN processing otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() diff --git a/slp_tf/tests/integration/test_tf_calculate_security_groups.py b/slp_tf/tests/integration/test_tf_calculate_security_groups.py index d4b63921..90f9180b 100644 --- a/slp_tf/tests/integration/test_tf_calculate_security_groups.py +++ b/slp_tf/tests/integration/test_tf_calculate_security_groups.py @@ -1,5 +1,5 @@ import pytest -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_tf.tests.resources import test_resource_paths from slp_tf import TerraformProcessor from slp_base.tests.util.otm import validate_and_compare @@ -13,10 +13,10 @@ class TestTerraformCalculateSecurityGroups: def test_security_group_components_from_same_resource(self): # GIVEN a valid TF file with a security group containing both an inbound and an outbound rule - tf_file = get_data(test_resource_paths.terraform_components_from_same_resource) + tf_file = get_byte_data(test_resource_paths.terraform_components_from_same_resource) # AND a valid CFT mapping file - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN the CFT file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -35,8 +35,8 @@ def test_security_group_components_from_same_resource(self): assert '0_0_0_0_0' in egress_id @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping), id="with actual mapping file"), - pytest.param(get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping_v180), + pytest.param(get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping), id="with actual mapping file"), + pytest.param(get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping_v180), id="with backwards mapping_file")]) def test_aws_security_groups_components_full_example(self, mapping_file): """ @@ -45,7 +45,7 @@ def test_aws_security_groups_components_full_example(self, mapping_file): """ # GIVEN the TF file of aws security groups # AND a valid mapping file - terraform_file = get_data(test_resource_paths.terraform_aws_security_groups_components) + terraform_file = get_byte_data(test_resource_paths.terraform_aws_security_groups_components) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() diff --git a/slp_tf/tests/integration/test_tf_calculate_trustzones.py b/slp_tf/tests/integration/test_tf_calculate_trustzones.py index 8195843c..48cd7a81 100644 --- a/slp_tf/tests/integration/test_tf_calculate_trustzones.py +++ b/slp_tf/tests/integration/test_tf_calculate_trustzones.py @@ -1,4 +1,4 @@ -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_tf.tests.resources import test_resource_paths from slp_tf import TerraformProcessor from slp_base.tests.util.otm import validate_and_compare @@ -11,10 +11,10 @@ class TestTerraformCalculateTrustzones: def test_trustzone_types(self): # GIVEN a valid TF file - terraform_file = get_data(test_resource_paths.terraform_minimal_content) + terraform_file = get_byte_data(test_resource_paths.terraform_minimal_content) # AND a valid TF mapping file that defines two TZs, one with type and the one without type - mapping_file = get_data(test_resource_paths.terraform_trustzone_types_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_trustzone_types_mapping) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -25,10 +25,10 @@ def test_trustzone_types(self): def test_components_with_trustzones_of_same_type(self): # GIVEN a valid TF file WITH some components mapped to different TZs of the same type - terraform_file = get_data(test_resource_paths.terraform_components_with_trustzones_of_same_type) + terraform_file = get_byte_data(test_resource_paths.terraform_components_with_trustzones_of_same_type) # AND a valid TF mapping file that defines two different TZs of the same type - mapping_file = get_data(test_resource_paths.terraform_multiple_trustzones_same_type_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_multiple_trustzones_same_type_mapping) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() diff --git a/slp_tf/tests/integration/test_tf_mapping_functions.py b/slp_tf/tests/integration/test_tf_mapping_functions.py index 1efd1b7c..6cab0bdb 100644 --- a/slp_tf/tests/integration/test_tf_mapping_functions.py +++ b/slp_tf/tests/integration/test_tf_mapping_functions.py @@ -1,6 +1,6 @@ from pytest import mark, param -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base.tests.util.otm import validate_and_compare from slp_tf import TerraformProcessor from slp_tf.tests.resources import test_resource_paths @@ -28,10 +28,10 @@ class TestTerraformMappingFunctions: @mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_aws_singleton_components(self, mapping_file): # GIVEN a valid TF file with some resources - terraform_file = get_data(test_resource_paths.terraform_aws_singleton_components_unix_line_breaks) + terraform_file = get_byte_data(test_resource_paths.terraform_aws_singleton_components_unix_line_breaks) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -47,8 +47,8 @@ def test_aws_ip_unified_components(self): # GIVEN a TF file with two resources # AND a mapping file maps those resources by $ip # AND the $ip value is assigned to the same value - tf_file = get_data(test_resource_paths.terraform_multiple_aws_security_group) - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + tf_file = get_byte_data(test_resource_paths.terraform_multiple_aws_security_group) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN processing otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -66,8 +66,8 @@ def test_aws_ip_unique_resource_multiple_mappings(self): # GIVEN a TF file with one resource # AND a mapping file map multiple times resources by $ip # AND the $ip value is assigned to a distinct value - tf_file = get_data(test_resource_paths.terraform_aws_security_group_in_and_eg_gress) - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + tf_file = get_byte_data(test_resource_paths.terraform_aws_security_group_in_and_eg_gress) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN processing otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -84,10 +84,10 @@ def test_aws_ip_unique_resource_multiple_mappings(self): @mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_aws_altsource_components(self, mapping_file): # GIVEN a valid TF file with some resources - terraform_file = get_data(test_resource_paths.terraform_aws_altsource_components) + terraform_file = get_byte_data(test_resource_paths.terraform_aws_altsource_components) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -109,10 +109,10 @@ def test_aws_altsource_components(self, mapping_file): id='singleton_and_catchall')]) def test_aws_catchall_components(self, mapping_file, expected_otm): # GIVEN a valid TF file with some resources - terraform_file = get_data(TERRAFORM_FOR_CATCHALL_TESTS) + terraform_file = get_byte_data(TERRAFORM_FOR_CATCHALL_TESTS) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() diff --git a/slp_tf/tests/integration/test_tf_processor.py b/slp_tf/tests/integration/test_tf_processor.py index 05a5b6b2..442ea9fd 100644 --- a/slp_tf/tests/integration/test_tf_processor.py +++ b/slp_tf/tests/integration/test_tf_processor.py @@ -1,6 +1,9 @@ +from typing import List + import pytest +from pytest import mark, param -from sl_util.sl_util.file_utils import get_data, get_byte_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base.slp_base.errors import MappingFileNotValidError, IacFileNotValidError, \ LoadingIacFileError from slp_base.tests.util.otm import validate_and_compare @@ -21,16 +24,23 @@ SAMPLE_NAME = 'name' SAMPLE_VALID_TF_FILE = terraform_for_mappings_tests_json +MAX_TF_FILE_SIZE = 1024 * 1024 +MIN_TF_FILE_SIZE = 20 + + +def create_artificial_file(size: int) -> bytes: + return bytes('A' * size, 'utf-8') + class TestTerraformProcessor: @pytest.mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_run_valid_mappings(self, mapping_file): # GIVEN a valid TF file with some resources - terraform_file = get_data(test_resource_paths.terraform_for_mappings_tests_json) + terraform_file = get_byte_data(test_resource_paths.terraform_for_mappings_tests_json) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -42,10 +52,10 @@ def test_run_valid_mappings(self, mapping_file): @pytest.mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_no_resources(self, mapping_file): # GIVEN a valid TF file with some resources - terraform_file = get_data(test_resource_paths.terraform_no_resources) + terraform_file = get_byte_data(test_resource_paths.terraform_no_resources) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -57,10 +67,10 @@ def test_no_resources(self, mapping_file): @pytest.mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_elb_example(self, mapping_file): # GIVEN a valid TF file with some special TF modules - terraform_file = get_data(test_resource_paths.terraform_elb) + terraform_file = get_byte_data(test_resource_paths.terraform_elb) # AND a valid TF mapping file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -72,19 +82,19 @@ def test_elb_example(self, mapping_file): @pytest.mark.parametrize('mapping_file', [None, [None]]) def test_mapping_files_not_provided(self, mapping_file): # GIVEN a sample valid IaC file (and none mapping file) - terraform_file = [get_data(SAMPLE_VALID_TF_FILE)] + terraform_file = [get_byte_data(SAMPLE_VALID_TF_FILE)] # WHEN creating OTM project from IaC file # THEN raises TypeError with pytest.raises(TypeError): - TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [get_data(mapping_file)]).process() + TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [get_byte_data(mapping_file)]).process() def test_invalid_mapping_files(self): # GIVEN a sample valid IaC file - terraform_file = get_data(SAMPLE_VALID_TF_FILE) + terraform_file = get_byte_data(SAMPLE_VALID_TF_FILE) # AND an invalid iac mappings file - mapping_file = [get_data(test_resource_paths.invalid_yaml)] + mapping_file = [get_byte_data(test_resource_paths.invalid_yaml)] # WHEN creating OTM project from IaC file # THEN raises MappingFileNotValidError @@ -93,10 +103,10 @@ def test_invalid_mapping_files(self): def test_invalid_terraform_file(self): # Given a sample invalid TF file - terraform_file = [get_data(test_resource_paths.invalid_tf)] + terraform_file = [get_byte_data(test_resource_paths.invalid_tf)] # And a valid iac mappings file - mapping_file = [get_data(terraform_iriusrisk_tf_aws_mapping)] + mapping_file = [get_byte_data(terraform_iriusrisk_tf_aws_mapping)] # When creating OTM project from IaC file # Then raises OTMBuildingError @@ -106,14 +116,14 @@ def test_invalid_terraform_file(self): @pytest.mark.parametrize('mapping_file', [terraform_iriusrisk_tf_aws_mapping]) def test_expected_separated_networks_components(self, mapping_file): # GIVEN the single tf file with all the resources - single_file = get_data(test_resource_paths.terraform_single_tf) + single_file = get_byte_data(test_resource_paths.terraform_single_tf) # AND the same resources separated in two files - networks = get_data(test_resource_paths.terraform_networks) - resources = get_data(test_resource_paths.terraform_resources) + networks = get_byte_data(test_resource_paths.terraform_networks) + resources = get_byte_data(test_resource_paths.terraform_resources) # AND the iriusrisk-tf-aws-mapping.yaml file - mapping_file = get_data(mapping_file) + mapping_file = get_byte_data(mapping_file) # WHEN the method TerraformProcessor::process is invoked for the single file otm_single = TerraformProcessor( @@ -138,7 +148,7 @@ def test_process_empty_source_file_array(self): terraform_empty_iac_array = [] # AND the iriusrisk-tf-aws-mapping.yaml file - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN the method TerraformProcessor::process is invoked # THEN an LoadingIacFileError is returned @@ -147,20 +157,20 @@ def test_process_empty_source_file_array(self): @pytest.mark.parametrize('source', [ # GIVEN a request with one iac_file keys with no value - [get_data(test_resource_paths.terraform_invalid_size)], + [get_byte_data(test_resource_paths.terraform_invalid_size)], # GIVEN a request with all iac_file keys with no value - [get_data(test_resource_paths.terraform_invalid_size), - get_data(test_resource_paths.terraform_invalid_size)], + [get_byte_data(test_resource_paths.terraform_invalid_size), + get_byte_data(test_resource_paths.terraform_invalid_size)], # GIVEN a request with some iac_file keys with no value - [get_data(test_resource_paths.terraform_single_tf), - get_data(test_resource_paths.terraform_invalid_size)], + [get_byte_data(test_resource_paths.terraform_single_tf), + get_byte_data(test_resource_paths.terraform_invalid_size)], # GIVEN a request with some iac_file keys with invalid format - [get_data(test_resource_paths.terraform_single_tf), + [get_byte_data(test_resource_paths.terraform_single_tf), get_byte_data(test_resource_paths.terraform_gz)] ]) def test_iac_file_is_invalid(self, source): # AND the iriusrisk-tf-aws-mapping.yaml file - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN creating OTM project from IaC file # THEN an LoadingIacFileError is returned @@ -169,10 +179,10 @@ def test_iac_file_is_invalid(self, source): def test_minimal_tf_file(self): # Given a minimal valid TF file - terraform_minimal_file = get_data(test_resource_paths.terraform_minimal_content) + terraform_minimal_file = get_byte_data(test_resource_paths.terraform_minimal_content) # and the default mapping file for TF - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # When parsing the file with Startleft and the default mapping file otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_minimal_file], [mapping_file]).process() @@ -184,10 +194,10 @@ def test_minimal_tf_file(self): def test_generate_empty_otm_with_empty_mapping_file(self): # Given an empty mapping file - mapping_file = get_data(test_resource_paths.empty_terraform_mapping) + mapping_file = get_byte_data(test_resource_paths.empty_terraform_mapping) # and a valid TF file with content - terraform_file = get_data(test_resource_paths.terraform_aws_simple_components) + terraform_file = get_byte_data(test_resource_paths.terraform_aws_simple_components) # When parsing the file with Startleft and the empty mapping file otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [terraform_file], [mapping_file]).process() @@ -198,12 +208,12 @@ def test_generate_empty_otm_with_empty_mapping_file(self): def test_variable_references_in_tfvars_file_processed_ok(self): # GIVEN the multiples tf file and tfvars file - terraform_main = get_data(test_resource_paths.terraform_main_referenced_variables) - terraform_vars = get_data(test_resource_paths.terraform_variables_file_referenced_variables) - terraform_referenced_vars = get_data(test_resource_paths.terraform_vars_referenced_variables) + terraform_main = get_byte_data(test_resource_paths.terraform_main_referenced_variables) + terraform_vars = get_byte_data(test_resource_paths.terraform_variables_file_referenced_variables) + terraform_referenced_vars = get_byte_data(test_resource_paths.terraform_vars_referenced_variables) # AND the iriusrisk-tf-aws-mapping.yaml file - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN the method TerraformProcessor::process is invoked otm = TerraformProcessor( @@ -222,8 +232,8 @@ def test_resources_with_same_name(self): # GIVEN a TF file with two resources of different types and the same name id # AND the default mapping file - tf_file = get_data(test_resource_paths.terraform_resources_with_same_name) - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + tf_file = get_byte_data(test_resource_paths.terraform_resources_with_same_name) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) # WHEN processing otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -233,14 +243,21 @@ def test_resources_with_same_name(self): assert len(otm.components) == 2 assert otm.components[0].name == otm.components[1].name - def test_valid_terraform_size_over_1mb(self): + @mark.parametrize('sources', [ + param([create_artificial_file(MIN_TF_FILE_SIZE - 1)], id='too small'), + param([create_artificial_file(MAX_TF_FILE_SIZE + 1)], id='too big') + ]) + def test_invalid_size(self, sources: List[bytes]): + # GIVEN a terraform file with an invalid size - # GIVEN a terraform file file under 2MB - tf_file = get_data(test_resource_paths.terraform_invalid_size_over_1mb) # AND the default terraform mapping file - mapping_file = get_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) + mapping_file = get_byte_data(test_resource_paths.terraform_iriusrisk_tf_aws_mapping) - # WHEN processing - # THEN a 400 error is returned - with pytest.raises(IacFileNotValidError): - TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, tf_file, [mapping_file]).process() + # WHEN TFPlanProcessor::process is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [mapping_file]).process() + + # AND whose information is right + assert error.value.title == 'Terraform file is not valid' + assert error.value.message == 'Provided iac_file is not valid. Invalid size' diff --git a/slp_tf/tests/integration/test_tfplan.py b/slp_tf/tests/integration/test_tfplan.py deleted file mode 100644 index c2ad5185..00000000 --- a/slp_tf/tests/integration/test_tfplan.py +++ /dev/null @@ -1,81 +0,0 @@ -import pytest -from pytest import mark, param - -from slp_base import LoadingIacFileError -from slp_tf.tests.utility import excluded_regex -from sl_util.sl_util.file_utils import get_byte_data -from slp_tf import TerraformProcessor -from slp_tf.tests.resources.test_resource_paths import terraform_iriusrisk_tf_aws_mapping, \ - tfplan_elb_expected, tfplan_elb, terraform_elb, tfplan_graph_elb, tfplan_sgs, \ - tfplan_graph_sgs, tfplan_graph_sgs_expected, tfplan_graph_elb_expected, tfplan_graph_official_expected, \ - tfplan_official, tfplan_graph_official -from slp_base.tests.util.otm import validate_and_compare - -DEFAULT_MAPPING_FILE = terraform_iriusrisk_tf_aws_mapping -SAMPLE_VALID_TFPLAN = get_byte_data(tfplan_elb) -SAMPLE_VALID_TF = get_byte_data(terraform_elb) -SAMPLE_ID = 'id' -SAMPLE_NAME = 'name' - - -class TestTfplan: - - @mark.parametrize('tfplan,expected', - [param(get_byte_data(tfplan_elb), tfplan_elb_expected, id='elb-example')]) - def test_only_tfplan_examples(self, tfplan: bytes, expected: str): - # GIVEN a valid TFPLAN file - # AND a valid TF mapping file - mapping_file = get_byte_data(DEFAULT_MAPPING_FILE) - - # WHEN the TFPLAN file is processed - otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tfplan], [mapping_file]).process() - - # THEN the resulting OTM match the expected one - left, right = validate_and_compare(otm, expected, excluded_regex) - assert left == right - - @mark.parametrize('tfplan,tfgraph,expected', - [param(get_byte_data(tfplan_elb), get_byte_data(tfplan_graph_elb), tfplan_graph_elb_expected, - id='elb-example'), - param(get_byte_data(tfplan_sgs), get_byte_data(tfplan_graph_sgs), tfplan_graph_sgs_expected, - id='sgs-example'), - param(get_byte_data(tfplan_official), get_byte_data(tfplan_graph_official), - tfplan_graph_official_expected, - id='official-example')]) - def test_tfplan_tfgraph_examples(self, tfplan: bytes, tfgraph: bytes, expected: str): - # GIVEN a valid TFPLAN file - # AND a valid TF mapping file - mapping_file = get_byte_data(DEFAULT_MAPPING_FILE) - - # WHEN the TFPLAN file is processed - otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tfplan, tfgraph], [mapping_file]).process() - - # THEN the resulting OTM match the expected one - left, right = validate_and_compare(otm, expected, excluded_regex) - assert left == right - - def test_multiple_tfplan(self): - # GIVEN two valid TFPLANs - sources = [SAMPLE_VALID_TFPLAN, SAMPLE_VALID_TFPLAN] - - # WHEN the TFPLAN file is processed - # THEN a LoadingIacFileError exception is raised - with pytest.raises(LoadingIacFileError) as error: - TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [DEFAULT_MAPPING_FILE]).process() - - # AND the message says that no multiple tfplan files can be processed at the same time - assert str(error.value.title) == 'Multiple Terraform plan files' - assert str(error.value.message) == 'Only one Terraform plan and an optional Terraform graph supported' - - def test_mixed_tfplan_tfconfig(self): - # GIVEN a valid TFPLAN and a valid TF FILE - sources = [SAMPLE_VALID_TFPLAN, SAMPLE_VALID_TF] - - # WHEN the TFPLAN file is processed - # THEN a LoadingIacFileError exception is raised - with pytest.raises(LoadingIacFileError) as error: - TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [DEFAULT_MAPPING_FILE]).process() - - # AND the message says that no multiple tfplan files can be processed at the same time - assert str(error.value.title) == 'Mixed Terraform sources' - assert str(error.value.message) == 'Terraform config files mixed with Terraform plan or graph are not supported' diff --git a/slp_tf/tests/resources/otm/expected_elb_tfplan.otm b/slp_tf/tests/resources/otm/expected_elb_tfplan.otm deleted file mode 100644 index 5d2d88a5..00000000 --- a/slp_tf/tests/resources/otm/expected_elb_tfplan.otm +++ /dev/null @@ -1,53 +0,0 @@ -{ - "otmVersion": "0.1.0", - "project": { - "name": "name", - "id": "id" - }, - "representations": [{ - "name": "Terraform", - "id": "Terraform", - "type": "code" - }], - "trustZones": [{ - "id": "b61d6911-338d-46a8-9f39-8dcd24abfe91", - "name": "Public Cloud", - "risk": { - "trustRating": 10 - } - }], - "components": [{ - "id": "b61d6911-338d-46a8-9f39-8dcd24abfe91.aws_vpc-foo", - "name": "foo", - "type": "vpc", - "parent": { - "trustZone": "b61d6911-338d-46a8-9f39-8dcd24abfe91" - }, - "tags": ["aws_vpc"] - }, { - "id": "b61d6911-338d-46a8-9f39-8dcd24abfe91.aws_subnet-bar", - "name": "bar", - "type": "empty-component", - "parent": { - "trustZone": "b61d6911-338d-46a8-9f39-8dcd24abfe91" - }, - "tags": ["aws_subnet"] - }, { - "id": "b61d6911-338d-46a8-9f39-8dcd24abfe91.aws_subnet-baz", - "name": "baz", - "type": "empty-component", - "parent": { - "trustZone": "b61d6911-338d-46a8-9f39-8dcd24abfe91" - }, - "tags": ["aws_subnet"] - }, { - "id": "b61d6911-338d-46a8-9f39-8dcd24abfe91.aws_alb-qux", - "name": "qux", - "parent": { - "trustZone": "b61d6911-338d-46a8-9f39-8dcd24abfe91" - }, - "tags": ["aws_alb"], - "type": "load-balancer" - }], - "dataflows": [] -} \ No newline at end of file diff --git a/slp_tf/tests/resources/test_resource_paths.py b/slp_tf/tests/resources/test_resource_paths.py index a9bb065d..22328a3b 100644 --- a/slp_tf/tests/resources/test_resource_paths.py +++ b/slp_tf/tests/resources/test_resource_paths.py @@ -70,16 +70,6 @@ terraform_security_groups_type2_inbound = path + '/tf/dataflows/security_groups/terraform_sg_type2_inbound.tf' terraform_security_groups_type1_and_type2_mixed = path + '/tf/dataflows/security_groups/' \ 'terraform_sg_type1_and_type2_mixed.tf' -terraform_invalid_size_over_1mb = path + '/tf/terraform_invalid_size_over_1mb.tf' - - -# tfplan -tfplan_elb = path + '/tfplan/elb-tfplan.json' -tfplan_graph_elb = path + '/tfplan/elb-tfgraph.gv' -tfplan_sgs = path + '/tfplan/sgs-tfplan.json' -tfplan_graph_sgs = path + '/tfplan/sgs-tfgraph.gv' -tfplan_official = path + '/tfplan/official-tfplan.json' -tfplan_graph_official = path + '/tfplan/official-tfgraph.gv' # mapping terraform_mapping_aws_component_without_parent = path + '/mapping/terraform_mapping_component_without_parent.yaml' @@ -129,7 +119,6 @@ expected_no_resources = path + '/otm/expected_no_resources.otm' expected_run_valid_mappings = path + '/otm/expected_run_valid_mappings.otm' tf_file_referenced_vars_expected_result = path + '/otm/tf-file-referenced-vars-expected-result.otm' -expected_elb_tfplan = path + '/otm/expected_elb_tfplan.otm' tf_expected_only_catchall = path + '/otm/catchall/tf_only_catchall_expected.otm' tf_expected_explicit_mapping_and_catchall = path + '/otm/catchall/tf_explicit_mapping_and_catchall_expected.otm' tf_expected_skip_and_catchall = path + '/otm/catchall/tf_skip_and_catchall_expected.otm' @@ -137,8 +126,4 @@ terraform_minimal_content_otm = f'{path}/otm/terraform_minimal_content.otm' tf_components_with_trustzones_of_same_type_otm = f'{path}/otm/calculate_trustzones/' \ f'tf_components_with_trustzones_of_same_type.otm' -tfplan_elb_expected = f'{path}/otm/expected_elb_tfplan.otm' -tfplan_graph_elb_expected = f'{path}/otm/expected_tfplan_tfgraph_elb.otm' -tfplan_graph_sgs_expected = f'{path}/otm/expected_tfplan_tfgraph_sgs.otm' -tfplan_graph_official_expected = f'{path}/otm/expected_tfplan_tfgraph_official.otm' diff --git a/slp_tf/tests/resources/tf/terraform_invalid_size_over_1mb.tf b/slp_tf/tests/resources/tf/terraform_invalid_size_over_1mb.tf deleted file mode 100644 index 1853d59b..00000000 --- a/slp_tf/tests/resources/tf/terraform_invalid_size_over_1mb.tf +++ /dev/null @@ -1,50213 +0,0 @@ -resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} - -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} - -not_map_resource "aws_wafregional_web_acl" "foo" { - name = "foo" - metric_name = "foo" - - default_action { - type = "ALLOW" - } - - rule { - action { - type = "BLOCK" - } - - priority = 1 - rule_id = aws_wafregional_rule.foo.id - } -} - -not_map_resource "aws_vpc" "foo" { - cidr_block = "10.1.0.0/16" -} - -data "aws_availability_zones" "available" {} - -not_map_resource "aws_subnet" "foo" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.1.0/24" - availability_zone = data.aws_availability_zones.available.names[0] -} - -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} -not_map_resource "aws_subnet" "bar" { - vpc_id = aws_vpc.foo.id - cidr_block = "10.1.2.0/24" - availability_zone = data.aws_availability_zones.available.names[1] -} - -not_map_resource "aws_alb_2" "foo" { - internal = true - subnets = [aws_subnet.foo.id, aws_subnet.bar.id] -} -not_map_resource "aws_wafregional_ipset" "ipset" { - name = "tfIPSet" - - ip_set_descriptor { - type = "IPV4" - value = "192.0.7.0/24" - } -} - -not_map_resource "aws_wafregional_rule" "foo" { - name = "tfWAFRule" - metric_name = "tfWAFRule" - - predicate { - data_id = aws_wafregional_ipset.ipset.id - negated = false - type = "IPMatch" - } -} diff --git a/slp_tf/tests/unit/parse/mapping/test_tf_dataflows.py b/slp_tf/tests/unit/parse/mapping/test_tf_dataflows.py index 2fb95f3c..6fcbde00 100644 --- a/slp_tf/tests/unit/parse/mapping/test_tf_dataflows.py +++ b/slp_tf/tests/unit/parse/mapping/test_tf_dataflows.py @@ -1,7 +1,7 @@ import pytest from slp_tf import TerraformProcessor from slp_tf.tests.resources import test_resource_paths -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data TF_MAPPING_FILE = test_resource_paths.terraform_iriusrisk_tf_aws_mapping TF_MAPPING_FILE_V180 = test_resource_paths.terraform_iriusrisk_tf_aws_mapping_v180 @@ -12,12 +12,12 @@ class TestTerraformDataflows: @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_to_lambda_function(self, mapping_file): # GIVEN a valid TF file with an aws_lambda_function resource # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_lambda_dataflow) + tf_file = get_byte_data(test_resource_paths.terraform_lambda_dataflow) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -39,12 +39,12 @@ def test_tf_dataflow_to_lambda_function(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_to_lambda_function_on_failure(self, mapping_file): # GIVEN a valid TF file with an aws_lambda_function on failure resource # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_lambda_on_failure_dataflow) + tf_file = get_byte_data(test_resource_paths.terraform_lambda_on_failure_dataflow) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -66,12 +66,12 @@ def test_tf_dataflow_to_lambda_function_on_failure(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_s3(self, mapping_file): # GIVEN a valid TF file with an aws_s3_bucket resource # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_s3_dataflow) + tf_file = get_byte_data(test_resource_paths.terraform_s3_dataflow) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -93,12 +93,12 @@ def test_tf_dataflow_s3(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_s3_bucket_logging(self, mapping_file): # GIVEN a valid TF file with an aws_s3_bucket_logging resource # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_s3_bucket_logging_dataflow) + tf_file = get_byte_data(test_resource_paths.terraform_s3_bucket_logging_dataflow) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -120,13 +120,13 @@ def test_tf_dataflow_s3_bucket_logging(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_api_gateway_one_source(self, mapping_file): # GIVEN a valid TF file with an aws_api_gateway_authorizer resource # AND a single api resource # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_api_gateway_authorizer_one_source_dataflow) + tf_file = get_byte_data(test_resource_paths.terraform_api_gateway_authorizer_one_source_dataflow) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -148,13 +148,13 @@ def test_tf_dataflow_api_gateway_one_source(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_api_gateway_multiple_sources(self, mapping_file): # GIVEN a valid TF file with an aws_api_gateway_authorizer resource # AND multiple api resource # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_api_gateway_authorizer_multiple_sources_dataflow) + tf_file = get_byte_data(test_resource_paths.terraform_api_gateway_authorizer_multiple_sources_dataflow) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -176,12 +176,12 @@ def test_tf_dataflow_api_gateway_multiple_sources(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type1_outbound(self, mapping_file): # GIVEN a valid TF file with security groups type 1: A -> SG -> B # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type1_outbound) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type1_outbound) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -203,13 +203,13 @@ def test_tf_dataflow_security_group_type1_outbound(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type1_outbound_two_subnets(self, mapping_file): # GIVEN a valid TF file with security groups type 1: A -> SG -> B # AND 2 subnets # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type1_outbound_two_subnets) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type1_outbound_two_subnets) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -227,13 +227,13 @@ def test_tf_dataflow_security_group_type1_outbound_two_subnets(self, mapping_fil assert otm.dataflows[0].destination_node == otm.dataflows[1].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type1_inbound(self, mapping_file): # GIVEN a valid TF file with security groups type 1: A -> SG -> B # AND a CustomVPC # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type1_inbound) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type1_inbound) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -255,13 +255,13 @@ def test_tf_dataflow_security_group_type1_inbound(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type1_inbound_two_subnets(self, mapping_file): # GIVEN a valid TF file with security groups type 1: A -> SG -> B # AND 2 subnets # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type1_inbound_two_subnets) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type1_inbound_two_subnets) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -279,13 +279,13 @@ def test_tf_dataflow_security_group_type1_inbound_two_subnets(self, mapping_file assert otm.dataflows[0].source_node == otm.dataflows[1].source_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type1_inbound_with_generic_component(self, mapping_file): # GIVEN a valid TF file with security groups type 1: A -> SG -> B # AND without a CustomVPC # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type1_inbound_with_generic_client) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type1_inbound_with_generic_client) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -307,12 +307,12 @@ def test_tf_dataflow_security_group_type1_inbound_with_generic_component(self, m assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type2_outbound(self, mapping_file): # GIVEN a valid TF file with security groups type 2: A -> SGA -> SGB -> B # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type2_outbound) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type2_outbound) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -334,13 +334,13 @@ def test_tf_dataflow_security_group_type2_outbound(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type2_outbound_two_subnets(self, mapping_file): # GIVEN a valid TF file with security groups type 2: A -> SGA -> SGB -> B and two subnets both in Service # AND in ServiceLB # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type2_outbound_two_subnets) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type2_outbound_two_subnets) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -372,12 +372,12 @@ def test_tf_dataflow_security_group_type2_outbound_two_subnets(self, mapping_fil assert private_subnet_2_dataflows[0].destination_node != private_subnet_2_dataflows[1].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type2_inbound(self, mapping_file): # GIVEN a valid TF file with security groups type 2: A -> SGA -> SGB -> B # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type2_inbound) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type2_inbound) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() @@ -399,12 +399,12 @@ def test_tf_dataflow_security_group_type2_inbound(self, mapping_file): assert destination_component[0].id == otm.dataflows[0].destination_node @pytest.mark.parametrize('mapping_file', [ - pytest.param(get_data(TF_MAPPING_FILE), id="with actual mapping file"), - pytest.param(get_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) + pytest.param(get_byte_data(TF_MAPPING_FILE), id="with actual mapping file"), + pytest.param(get_byte_data(TF_MAPPING_FILE_V180), id="with backwards mapping_file")]) def test_tf_dataflow_security_group_type1_and_type2_mixed(self, mapping_file): # GIVEN a valid TF file with security groups type 1: A -> SGA -> B and type 2: A -> SGA -> SGB -> B # AND a valid TF mapping file - tf_file = get_data(test_resource_paths.terraform_security_groups_type1_and_type2_mixed) + tf_file = get_byte_data(test_resource_paths.terraform_security_groups_type1_and_type2_mixed) # WHEN the TF file is processed otm = TerraformProcessor(SAMPLE_ID, SAMPLE_NAME, [tf_file], [mapping_file]).process() diff --git a/slp_tf/tests/unit/tfplan/otm_graph_util.py b/slp_tf/tests/unit/tfplan/otm_graph_util.py deleted file mode 100644 index f192bf93..00000000 --- a/slp_tf/tests/unit/tfplan/otm_graph_util.py +++ /dev/null @@ -1,106 +0,0 @@ -from typing import List - -from networkx import DiGraph - -from otm.otm.entity.dataflow import Dataflow -from otm.otm.entity.parent_type import ParentType -from otm.otm.entity.trustzone import Trustzone -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent, TfplanOTM, TfplanSecurityGroup, TfplanLaunchTemplate - -DEFAULT_TRUSTZONE = Trustzone( - trustzone_id='default-trustzone-id', - name='default-trustzone-name', - type='default-trustzone-type') - - -def build_base_otm(default_trustzone: Trustzone = None): - otm = TfplanOTM( - project_id='project_id', - project_name='project_name', - components=[], - security_groups=[], - launch_templates=[], - dataflows=[], - ) - if default_trustzone: - otm.default_trustzone = default_trustzone - - return otm - - -def build_component_node(component_id: str) -> str: - return f'[root] {component_id} (expand)' - - -def build_component_id(base_name: str, component_type: str) -> str: - return f'{component_type}.{base_name}' - - -def build_otm_type(component_type: str) -> str: - return f'{component_type}-otm-type' - - -def build_mocked_otm(components: List[TfplanComponent], - dataflows: List[Dataflow] = None, - security_groups: List[TfplanSecurityGroup] = None, - launch_templates: List[TfplanLaunchTemplate] = None) -> {}: - otm = build_base_otm(DEFAULT_TRUSTZONE) - otm.components = components or [] - otm.security_groups = security_groups or [] - otm.launch_templates = launch_templates or [] - otm.dataflows = dataflows or [] - return otm - - -def build_mocked_tfplan_component(component: {}) -> TfplanComponent: - component_name = component['component_name'] - tf_type = component['tf_type'] - component_id = build_component_id(component_name, tf_type) - return TfplanComponent( - component_id=component_id, - name=component_name, - component_type=component.get('component_type', build_otm_type(tf_type)), - parent=component.get('parent_id', DEFAULT_TRUSTZONE.id), - parent_type=component.get('parent_type', ParentType.TRUST_ZONE), - tags=component.get('tags', [tf_type]), - tf_resource_id=component_id, - tf_type=tf_type, - configuration=component.get('configuration', {})) - - -def build_mocked_dataflow( - component_a: TfplanComponent, component_b: TfplanComponent, - bidirectional: bool = False, attributes=None, tags=None): - return Dataflow( - f"{component_a.id} -> {component_b.id}", - f"{component_a.name} to {component_b.name}", - component_a.id, component_b.id, - bidirectional=bidirectional, attributes=attributes, tags=tags) - - -def build_graph(relationships: [()]): - graph = DiGraph() - - for relationship in relationships: - resource_id = relationship[0] - graph.add_node(build_component_node(resource_id), label=resource_id) - - for resource_id, parent_id in relationships: - if parent_id != DEFAULT_TRUSTZONE.id: - graph.add_edge(build_component_node(resource_id), build_component_node(parent_id)) - - return graph - - -def assert_parents(components: [TfplanComponent], relationships: dict = None): - for component in components: - assert_parent(component=component, parent_id=relationships.get(component.id)) - - -def assert_parent(component: TfplanComponent, parent_id: str = None): - if parent_id: - assert component.parent_type == ParentType.COMPONENT - assert component.parent == parent_id - else: - assert component.parent_type == ParentType.TRUST_ZONE - assert component.parent == DEFAULT_TRUSTZONE.id diff --git a/slp_tfplan/__init__.py b/slp_tfplan/__init__.py new file mode 100644 index 00000000..fb3a2bc9 --- /dev/null +++ b/slp_tfplan/__init__.py @@ -0,0 +1,13 @@ +###################################################################### +# This folder is not actually intended to be a regular package # +# HOWEVER, we need to keep this __init.py__ file in order to # +# make it visible by other modules. # +# In future versions, this package should be moved to a lib so # +# that it will be an independent module instead of a "false" package # +###################################################################### + +# DON'T REMOVE: Module importer overwritten to prevent bidirectional dependencies +from _sl_build.secure_importer import override_module_importer +override_module_importer() + +from .slp_tfplan import * diff --git a/slp_tfplan/resources/schemas/iac_tfplan_mapping_schema.json b/slp_tfplan/resources/schemas/iac_tfplan_mapping_schema.json new file mode 100644 index 00000000..7d5e8e5b --- /dev/null +++ b/slp_tfplan/resources/schemas/iac_tfplan_mapping_schema.json @@ -0,0 +1,308 @@ +{ + "$schema": "http://json-schema.org/draft-07/schema#", + "title": "Mapping File", + "type": "object", + "required": ["trustzones", "components", "dataflows"], + "properties": { + "lookup": { + "type": "object" + }, + "trustzones": { + "type": "array", + "items": { + "type": "object", + "required": ["id", "name"], + "properties": { + "id": {"$ref": "#/definitions/query"}, + "name": {"$ref": "#/definitions/query"}, + "$source": {"$ref": "#/definitions/query"}, + "$default": {"type": "boolean"} + } + } + }, + "components": { + "type": "array", + "items": { + "type": "object", + "required": ["type"], + "properties": { + "id": {"$ref": "#/definitions/query"}, + "name": {"$ref": "#/definitions/query"}, + "type": {"$ref": "#/definitions/query"}, + "$source": {"$ref": "#/definitions/query"}, + "parent": {"$ref": "#/definitions/query"} + } + } + }, + "dataflows": { + "type": "array", + "items": { + "type": "object", + "required": ["source", "destination"], + "properties": { + "id": {"$ref": "#/definitions/query"}, + "name": {"$ref": "#/definitions/query"}, + "$source": {"$ref": "#/definitions/query"}, + "source": {"$ref": "#/definitions/query"}, + "destination": {"$ref": "#/definitions/query"} + } + } + } + }, + "definitions": { + "regex": { + "type": "object", + "required": ["$regex"], + "properties": { + "$props": { + "anyOf": [ + {"type": "string"} + ] + } + } + }, + "query": { + "anyOf": [ + { + "type": "string" + }, + { + "anyOf": [ + { + "type": "object", + "required": ["$lookup"], + "properties": { + "$lookup": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$skip"], + "properties": { + "$skip": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$singleton"], + "properties": { + "$singleton": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$root"], + "properties": { + "$root": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$type"], + "properties": { + "$type": { + "anyOf": [ + {"type": "string"}, + {"type": "array", "items": {"type": "string"}}, + {"$ref": "#/definitions/regex"} + ] + } + } + }, + { + "type": "object", + "required": ["$name"], + "properties": { + "$name": { + "anyOf": [ + {"type": "string"}, + {"type": "array", "items": {"type": "string"}}, + {"$ref": "#/definitions/regex"} + ] + } + } + }, + { + "type": "object", + "required": ["$props"], + "properties": { + "$props": { + "anyOf": [ + {"type": "string"}, + {"type": "array", "items": {"type": "string"}}, + {"$ref": "#/definitions/regex"} + ] + } + } + }, + { + "type": "object", + "required": ["$path"], + "properties": { + "$path": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$format"], + "properties": { + "$format": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$catchall"], + "properties": { + "$catchall": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$children"], + "properties": { + "$children": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$parent"], + "properties": { + "$parent": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$findFirst"], + "properties": { + "$findFirst": { + "anyOf": [ + {"type": "array"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$ip"], + "properties": { + "$ip": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + } + ] + }, + { + "type": "object", + "required": ["$searchParams"], + "properties": { + "searchPath": { + "anyOf": [ + { + "type": "string" + },{ + "type": "array" + } + ] + }, + "defaultValue": { + "type": "string" + } + } + + }, + { + "type": "object", + "required": ["$numberOfSources"], + "properties": { + "oneSource": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + }, + "multipleSource": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + + }, + { + "type": "object", + "required": ["$hub"], + "properties": { + "$hub": { + "anyOf": [ + {"type": "string"}, + {"$ref": "#/definitions/query"} + ] + } + } + }, + { + "type": "object", + "required": ["$module"], + "properties": { + "$hub": { + "anyOf": [ + {"type": "string"} + ] + } + } + } + ] + } + } +} \ No newline at end of file diff --git a/slp_tfplan/resources/schemas/tfplan_schema.json b/slp_tfplan/resources/schemas/tfplan_schema.json new file mode 100644 index 00000000..85f4f349 --- /dev/null +++ b/slp_tfplan/resources/schemas/tfplan_schema.json @@ -0,0 +1,75 @@ +{ + "$schema": "http://json-schema.org/draft-04/schema#", + "type": "object", + "properties": { + "planned_values": { + "type": "object", + "properties": { + "root_module": { + "type": "object", + "properties": { + "resources": { + "type": "array", + "items": {"$ref": "#/definitions/resource_data"} + }, + "child_modules": {"$ref": "#/definitions/child_modules"} + }, + "anyOf": [ + {"required": ["resources"]}, + {"required": ["child_modules"]} + ] + } + }, + "required": ["root_module"] + }, + "configuration": { + "type": "object", + "properties": { + "root_module": { + "type": "object", + "properties": { + "resources": { + "type": "array", + "items": {"$ref": "#/definitions/resource_data"} + } + } + } + } + } + }, + "required": [ + "planned_values", + "configuration" + ], + "definitions": { + "resource_data": { + "type": "object", + "required": ["address", "type", "name"], + "properties": { + "address": {"type": "string"}, + "type": {"type": "string"}, + "name": {"type": "string"} + } + }, + "child_modules": { + "type": "array", + "items": [ + { + "type": "object", + "properties": { + "resources": { + "type": "array", + "items": {"$ref": "#/definitions/resource_data"} + }, + "address": {"type": "string"}, + "child_modules": {"$ref": "#/definitions/child_modules"} + }, + "anyOf": [ + {"required": ["resources","address"]}, + {"required": ["child_modules","address"]} + ] + } + ] + } + } +} \ No newline at end of file diff --git a/slp_tfplan/slp_tfplan/__init__.py b/slp_tfplan/slp_tfplan/__init__.py new file mode 100644 index 00000000..c8bffbea --- /dev/null +++ b/slp_tfplan/slp_tfplan/__init__.py @@ -0,0 +1,3 @@ +from .tfplan_processor import TFPlanProcessor +from .validate.tfplan_mapping_file_validator import TFPlanMappingFileValidator + diff --git a/slp_tf/slp_tf/tfplan/__init__.py b/slp_tfplan/slp_tfplan/graph/__init__.py similarity index 100% rename from slp_tf/slp_tf/tfplan/__init__.py rename to slp_tfplan/slp_tfplan/graph/__init__.py diff --git a/slp_tf/slp_tf/tfplan/graph/relationships_extractor.py b/slp_tfplan/slp_tfplan/graph/relationships_extractor.py similarity index 89% rename from slp_tf/slp_tf/tfplan/graph/relationships_extractor.py rename to slp_tfplan/slp_tfplan/graph/relationships_extractor.py index 1eea2c29..42be2b98 100644 --- a/slp_tf/slp_tf/tfplan/graph/relationships_extractor.py +++ b/slp_tfplan/slp_tfplan/graph/relationships_extractor.py @@ -3,8 +3,8 @@ import networkx as nx from networkx import DiGraph -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent -from slp_tf.slp_tf.tfplan.load.tfplan_to_resource_dict import remove_name_prefix +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent +from slp_tfplan.slp_tfplan.load.tfplan_to_resource_dict import remove_name_prefix class RelationshipsExtractor: @@ -16,7 +16,7 @@ def __init__(self, graph: DiGraph, mapped_resources_ids: [str]): self.nodes_labels: dict = dict(self.graph.nodes(data='label')) self.labels_nodes: dict = {v: k for k, v in self.nodes_labels.items()} - def get_closest_resources(self, source_component: TfplanComponent, target_candidates: [TfplanComponent]) -> [str]: + def get_closest_resources(self, source_component: TFPlanComponent, target_candidates: [TFPlanComponent]) -> [str]: linked_resources = [] min_size = 0 diff --git a/slp_tf/slp_tf/tfplan/load/tfplan_launch_templates_loader.py b/slp_tfplan/slp_tfplan/load/launch_templates_loader.py similarity index 55% rename from slp_tf/slp_tf/tfplan/load/tfplan_launch_templates_loader.py rename to slp_tfplan/slp_tfplan/load/launch_templates_loader.py index c8bf2013..6c7ddc51 100644 --- a/slp_tf/slp_tf/tfplan/load/tfplan_launch_templates_loader.py +++ b/slp_tfplan/slp_tfplan/load/launch_templates_loader.py @@ -1,19 +1,19 @@ -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanOTM, TfplanLaunchTemplate -from slp_tf.slp_tf.tfplan.load.resource_data_extractors import security_groups_ids_from_network_interfaces +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanOTM, LaunchTemplate +from slp_tfplan.slp_tfplan.load.resource_data_extractors import security_groups_ids_from_network_interfaces LAUNCH_TEMPLATE_TYPES = ['aws_launch_template'] -def build_launch_template(resource: {}) -> TfplanLaunchTemplate: - return TfplanLaunchTemplate( +def build_launch_template(resource: {}) -> LaunchTemplate: + return LaunchTemplate( launch_template_id=resource['resource_id'], security_groups_ids=security_groups_ids_from_network_interfaces(resource) ) -class TfplanLaunchTemplateLoader: +class LaunchTemplatesLoader: - def __init__(self, otm: TfplanOTM, tfplan: {}): + def __init__(self, otm: TFPlanOTM, tfplan: {}): self.otm = otm self.resources = tfplan['resource'] diff --git a/slp_tf/slp_tf/tfplan/load/resource_data_extractors.py b/slp_tfplan/slp_tfplan/load/resource_data_extractors.py similarity index 100% rename from slp_tf/slp_tf/tfplan/load/resource_data_extractors.py rename to slp_tfplan/slp_tfplan/load/resource_data_extractors.py diff --git a/slp_tf/slp_tf/tfplan/load/tfplan_security_groups_loader.py b/slp_tfplan/slp_tfplan/load/security_groups_loader.py similarity index 85% rename from slp_tf/slp_tf/tfplan/load/tfplan_security_groups_loader.py rename to slp_tfplan/slp_tfplan/load/security_groups_loader.py index 23ed7490..8b0cb92f 100644 --- a/slp_tf/slp_tf/tfplan/load/tfplan_security_groups_loader.py +++ b/slp_tfplan/slp_tfplan/load/security_groups_loader.py @@ -1,7 +1,7 @@ from typing import List, Dict, Literal -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanSecurityGroup, TfplanOTM -from slp_tf.slp_tf.tfplan.load.resource_data_extractors import security_groups_ids_from_ingress_property, \ +from slp_tfplan.slp_tfplan.objects.tfplan_objects import SecurityGroup, TFPlanOTM +from slp_tfplan.slp_tfplan.load.resource_data_extractors import security_groups_ids_from_ingress_property, \ security_groups_ids_from_egress_property, security_group_id_from_rule, \ source_security_group_id_from_rule, security_group_rule_type @@ -39,9 +39,9 @@ def security_groups_ids_from_egress_rule(security_group: Dict, sg_rules: List[Di return _security_group_ids_from_rule(security_group, sg_rules, 'egress') -class TfplanSecurityGroupsLoader: +class SecurityGroupsLoader: - def __init__(self, otm: TfplanOTM, tfplan: {}): + def __init__(self, otm: TFPlanOTM, tfplan: {}): self.otm = otm self.resources = tfplan['resource'] @@ -54,8 +54,8 @@ def load(self): if resource['resource_type'] in SECURITY_GROUPS_TYPES: self.otm.security_groups.append(self.__build_security_group(resource)) - def __build_security_group(self, resource: {}) -> TfplanSecurityGroup: - return TfplanSecurityGroup( + def __build_security_group(self, resource: {}) -> SecurityGroup: + return SecurityGroup( security_group_id=resource['resource_id'], ingress_sgs=security_groups_ids_from_ingress_property(resource) or security_groups_ids_from_ingress_rule(resource, self.sg_rules), egress_sgs=security_groups_ids_from_egress_property(resource) or security_groups_ids_from_egress_rule(resource, self.sg_rules), diff --git a/slp_tfplan/slp_tfplan/load/tfplan_loader.py b/slp_tfplan/slp_tfplan/load/tfplan_loader.py new file mode 100644 index 00000000..287e82f1 --- /dev/null +++ b/slp_tfplan/slp_tfplan/load/tfplan_loader.py @@ -0,0 +1,93 @@ +from typing import List, Dict, Union + +import pygraphviz +from networkx import nx_agraph, DiGraph + +from sl_util.sl_util.json_utils import yaml_reader +from sl_util.sl_util.file_utils import read_byte_data + +from slp_base import ProviderLoader, LoadingIacFileError +from slp_tfplan.slp_tfplan.load.tfplan_to_resource_dict import TfplanToResourceDict + + +def load_tfplan(source: bytes) -> Dict: + try: + return yaml_reader(source) + except Exception: + pass + + +def load_tfgraph(source: bytes) -> DiGraph: + try: + return nx_agraph.from_agraph(pygraphviz.AGraph(read_byte_data(source))) + except Exception: + pass + + +def generate_invalid_iac_files_error() -> LoadingIacFileError: + return LoadingIacFileError( + title='IaC files are not valid', + message='The provided IaC files could not be processed' + ) + + +def generate_wrong_number_of_sources_error() -> LoadingIacFileError: + return LoadingIacFileError( + title='Wrong number of files', + message='Required one tfplan and one tfgraph files' + ) + + +class TFPlanLoader(ProviderLoader): + + def __init__(self, sources: List[bytes]): + self.sources = sources + + self.tfplan: Union[Dict, None] = None + self.tfgraph: Union[Dict, None] = None + + self.terraform: dict = {} + + def load(self): + self.__load_sources() + if self.tfplan: + self.__map_tfplan_to_resources() + + def get_terraform(self): + return self.terraform + + def get_tfgraph(self): + return self.tfgraph + + def __load_sources(self): + if len(self.sources) != 2: + raise generate_wrong_number_of_sources_error() + + for source in self.sources: + if self.tfplan is None: + self.tfplan = load_tfplan(source) + if self.tfplan is not None: + continue + + if self.tfgraph is not None: + raise generate_invalid_iac_files_error() + + self.tfgraph = load_tfgraph(source) + + if self.tfgraph is None: + raise generate_invalid_iac_files_error() + + def __map_tfplan_to_resources(self): + resources = TfplanToResourceDict(self.__get_tfplan_resources()).map_modules(self.__get_tfplan_root_module()) + + if resources: + self.terraform = {'resource': resources} + + def __get_tfplan_resources(self) -> Dict: + return self.tfplan \ + .get('configuration', {}) \ + .get('root_module', {}) \ + .get('resources', {}) + + def __get_tfplan_root_module(self) -> List[Dict]: + return [self.tfplan['planned_values']['root_module']] diff --git a/slp_tf/slp_tf/tfplan/load/tfplan_to_resource_dict.py b/slp_tfplan/slp_tfplan/load/tfplan_to_resource_dict.py similarity index 54% rename from slp_tf/slp_tf/tfplan/load/tfplan_to_resource_dict.py rename to slp_tfplan/slp_tfplan/load/tfplan_to_resource_dict.py index a649ca34..a9adf642 100644 --- a/slp_tf/slp_tf/tfplan/load/tfplan_to_resource_dict.py +++ b/slp_tfplan/slp_tfplan/load/tfplan_to_resource_dict.py @@ -1,17 +1,8 @@ import re -from typing import Dict +from typing import Dict, List -def apply_resource_retro_compatibility(resource: {}): - resource['_key'] = resource['resource_name'] - resource['Type'] = resource['resource_type'] - resource['Properties'] = resource['resource_properties'] - resource[resource['resource_type']] = {resource['resource_name']: resource['resource_properties']} - # The order of the resource items matter for further processes - return dict(reversed(resource.items())) - - -def map_resource_properties(resource: {}) -> {}: +def map_resource_properties(resource: Dict) -> {}: return { 'resource_mode': resource['mode'], 'resource_provider_name': resource['provider_name'], @@ -23,21 +14,21 @@ def map_resource_properties(resource: {}) -> {}: } -def is_resource_duplicated(resource: {}) -> bool: - return 'index' in resource and not (resource['index'] == '0' or resource['index'] == 'zero') +def is_not_cloned_resource(resource: Dict) -> bool: + return 'index' not in resource or resource['index'] == '0' or resource['index'] == 'zero' -def get_resource_id(resource: {}) -> str: +def get_resource_id(resource: Dict) -> str: return parse_address(resource['address']) \ if 'index' in resource \ else resource['address'] -def get_resource_name(resource: {}, parent: str) -> str: +def get_resource_name(resource: Dict, parent: str) -> str: return resource['name'] if not parent else f'{parent}.{resource["name"]}' -def get_module_address(module: {}, parent: str) -> str: +def get_module_address(module: Dict, parent: str) -> str: if 'address' in module: module_address = parse_address(module['address']) return f'{parent}.{module_address}' if parent else module_address @@ -59,7 +50,7 @@ class TfplanToResourceDict: def __init__(self, resources_configuration: Dict): self.resources_configuration = resources_configuration - def map_modules(self, modules: [{}], parent: str = None) -> [{}]: + def map_modules(self, modules: List[Dict], parent: str = None) -> List[Dict]: mapped_modules = [] resources = [] @@ -78,25 +69,17 @@ def map_modules(self, modules: [{}], parent: str = None) -> [{}]: return resources - def __map_resources(self, resources: [{}], parent: str = None) -> [{}]: - mapped_resources = [] - for resource in resources: - if is_resource_duplicated(resource): - continue - - mapped_resource = { - 'resource_id': get_resource_id(resource), - 'resource_name': get_resource_name(resource, parent), - 'resource_type': resource['type'], - 'resource_properties': - self.__get_resource_configuration(resource['address']) or map_resource_properties(resource) - } - - mapped_resource = apply_resource_retro_compatibility(mapped_resource) - - mapped_resources.append(mapped_resource) - - return mapped_resources + def __map_resources(self, resources: List[Dict], parent: str = None) -> List[Dict]: + return list(map(lambda r: self.__map_resource(r, parent), filter(is_not_cloned_resource, resources))) + + def __map_resource(self, resource: Dict, parent: str = None) -> Dict: + return { + 'resource_id': get_resource_id(resource), + 'resource_name': get_resource_name(resource, parent), + 'resource_type': resource['type'], + 'resource_properties': + self.__get_resource_configuration(resource['address']) or map_resource_properties(resource) + } def __get_resource_configuration(self, resource_address: str) -> Dict: return next(filter(lambda r: r['address'] == resource_address, self.resources_configuration), None) diff --git a/slp_tf/slp_tf/tfplan/graph/__init__.py b/slp_tfplan/slp_tfplan/map/__init__.py similarity index 100% rename from slp_tf/slp_tf/tfplan/graph/__init__.py rename to slp_tfplan/slp_tfplan/map/__init__.py diff --git a/slp_tf/slp_tf/tfplan/mapping/tfplan_mapper.py b/slp_tfplan/slp_tfplan/map/tfplan_mapper.py similarity index 91% rename from slp_tf/slp_tf/tfplan/mapping/tfplan_mapper.py rename to slp_tfplan/slp_tfplan/map/tfplan_mapper.py index 2d3dff88..6570e0c5 100644 --- a/slp_tf/slp_tf/tfplan/mapping/tfplan_mapper.py +++ b/slp_tfplan/slp_tfplan/map/tfplan_mapper.py @@ -3,7 +3,7 @@ from otm.otm.entity.parent_type import ParentType from otm.otm.entity.trustzone import Trustzone -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent, TfplanOTM +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent, TFPlanOTM def trustzone_to_otm(trustzone: {}) -> Trustzone: @@ -45,9 +45,9 @@ def _is_special_mapping(mapping: {}) -> bool: return _is_catchall(mapping) or _is_skip(mapping) -class TfplanMapper: +class TFPlanMapper: - def __init__(self, otm: TfplanOTM, tfplan: {}, mappings: {}): + def __init__(self, otm: TFPlanOTM, tfplan: {}, mappings: {}): self.otm = otm self.resources = tfplan['resource'] self.mappings = mappings @@ -79,13 +79,13 @@ def __tfplan_resources_to_otm_components(self) -> []: return components - def __map_resource_by_type(self, resource: {}) -> TfplanComponent: + def __map_resource_by_type(self, resource: {}) -> TFPlanComponent: resource_type = resource['resource_type'] if resource_type in self.mappings_by_type: mapper = self.mappings_by_type[resource_type] return self.__build_otm_component(resource, mapper[0], mapper[1]) - def __map_resource_by_regex(self, resource: {}) -> TfplanComponent: + def __map_resource_by_regex(self, resource: {}) -> TFPlanComponent: mapper = self.__get_otm_type_by_regex(resource) if mapper: return self.__build_otm_component(resource, mapper[0], mapper[1]) @@ -95,7 +95,7 @@ def __get_otm_type_by_regex(self, resource: {}) -> Tuple[str, str]: if re.match(regex[0], resource['resource_type']): return otm_type, regex[1] - def __map_resource_by_catchall(self, resource: {}) -> TfplanComponent: + def __map_resource_by_catchall(self, resource: {}) -> TFPlanComponent: mapper = self.__get_otm_type_by_catchall(resource) if mapper: return self.__build_otm_component(resource, mapper[0], mapper[1]) @@ -111,8 +111,8 @@ def __exist_resource_as_skip(self, resource: {}) -> bool: return True return False - def __build_otm_component(self, resource: {}, otm_type: str, configuration: {}) -> TfplanComponent: - return TfplanComponent( + def __build_otm_component(self, resource: {}, otm_type: str, configuration: {}) -> TFPlanComponent: + return TFPlanComponent( component_id=resource['resource_id'], name=resource['resource_name'], component_type=otm_type, diff --git a/slp_tf/slp_tf/tfplan/mapping/tfplan_mapping_file_loader.py b/slp_tfplan/slp_tfplan/map/tfplan_mapping_file_loader.py similarity index 98% rename from slp_tf/slp_tf/tfplan/mapping/tfplan_mapping_file_loader.py rename to slp_tfplan/slp_tfplan/map/tfplan_mapping_file_loader.py index 1703b162..49766cb4 100644 --- a/slp_tf/slp_tf/tfplan/mapping/tfplan_mapping_file_loader.py +++ b/slp_tfplan/slp_tfplan/map/tfplan_mapping_file_loader.py @@ -84,7 +84,7 @@ def get_source_structure(source: {}, structure: list) -> []: } -class TfplanMappingFileLoader(MappingFileLoader): +class TFPlanMappingFileLoader(MappingFileLoader): def __init__(self, mapping_files_data: [bytes]): super().__init__(mapping_files_data) diff --git a/slp_tf/slp_tf/tfplan/mapping/__init__.py b/slp_tfplan/slp_tfplan/objects/__init__.py similarity index 100% rename from slp_tf/slp_tf/tfplan/mapping/__init__.py rename to slp_tfplan/slp_tfplan/objects/__init__.py diff --git a/slp_tf/slp_tf/tfplan/tfplan_objects.py b/slp_tfplan/slp_tfplan/objects/tfplan_objects.py similarity index 90% rename from slp_tf/slp_tf/tfplan/tfplan_objects.py rename to slp_tfplan/slp_tfplan/objects/tfplan_objects.py index e178536f..38e26991 100644 --- a/slp_tf/slp_tf/tfplan/tfplan_objects.py +++ b/slp_tfplan/slp_tfplan/objects/tfplan_objects.py @@ -10,7 +10,7 @@ @auto_repr -class TfplanComponent(Component): +class TFPlanComponent(Component): def __init__(self, component_id: str, @@ -40,7 +40,7 @@ def is_singleton(self) -> bool: def __eq__(self, other): """Overrides the default implementation""" - if isinstance(other, TfplanComponent): + if isinstance(other, TFPlanComponent): return self.id == other.id \ and self.name == other.name \ and self.type == other.type \ @@ -57,7 +57,7 @@ def __eq__(self, other): @auto_repr -class TfplanSecurityGroup: +class SecurityGroup: def __init__(self, security_group_id: str, ingress_sgs: List[str] = None, egress_sgs: List[str] = None): self.id = security_group_id self.ingress_sgs = ingress_sgs @@ -65,21 +65,21 @@ def __init__(self, security_group_id: str, ingress_sgs: List[str] = None, egress @auto_repr -class TfplanLaunchTemplate: +class LaunchTemplate: def __init__(self, launch_template_id: str, security_groups_ids: List[str]): self.id = launch_template_id self.security_groups_ids = security_groups_ids @auto_repr -class TfplanOTM(OTM): +class TFPlanOTM(OTM): def __init__(self, project_id: str, project_name: str, - components: List[TfplanComponent], - security_groups: List[TfplanSecurityGroup], - launch_templates: List[TfplanLaunchTemplate], + components: List[TFPlanComponent], + security_groups: List[SecurityGroup], + launch_templates: List[LaunchTemplate], dataflows: List[Dataflow], default_trustzone: Trustzone = None): super().__init__(project_name, project_id, IacType.TERRAFORM) diff --git a/slp_tf/slp_tf/tfplan/transformers/__init__.py b/slp_tfplan/slp_tfplan/parse/__init__.py similarity index 100% rename from slp_tf/slp_tf/tfplan/transformers/__init__.py rename to slp_tfplan/slp_tfplan/parse/__init__.py diff --git a/slp_tf/slp_tf/tfplan/tfplan_parser.py b/slp_tfplan/slp_tfplan/parse/tfplan_parser.py similarity index 53% rename from slp_tf/slp_tf/tfplan/tfplan_parser.py rename to slp_tfplan/slp_tfplan/parse/tfplan_parser.py index 6215e0c4..7400fa7e 100644 --- a/slp_tf/slp_tf/tfplan/tfplan_parser.py +++ b/slp_tfplan/slp_tfplan/parse/tfplan_parser.py @@ -3,19 +3,19 @@ from networkx import DiGraph from slp_base import ProviderParser, OTMBuildingError -from slp_tf.slp_tf.tfplan.load.tfplan_launch_templates_loader import TfplanLaunchTemplateLoader -from slp_tf.slp_tf.tfplan.load.tfplan_security_groups_loader import TfplanSecurityGroupsLoader -from slp_tf.slp_tf.tfplan.mapping.tfplan_mapper import TfplanMapper -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanOTM -from slp_tf.slp_tf.tfplan.transformers.tfplan_children_calculator import TfplanChildrenCalculator -from slp_tf.slp_tf.tfplan.transformers.tfplan_dataflow_creator import TfplanDataflowCreator -from slp_tf.slp_tf.tfplan.transformers.tfplan_parent_calculator import TfplanParentCalculator -from slp_tf.slp_tf.tfplan.transformers.tfplan_singleton_transformer import TfplanSingletonTransformer +from slp_tfplan.slp_tfplan.load.launch_templates_loader import LaunchTemplatesLoader +from slp_tfplan.slp_tfplan.load.security_groups_loader import SecurityGroupsLoader +from slp_tfplan.slp_tfplan.map.tfplan_mapper import TFPlanMapper +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanOTM +from slp_tfplan.slp_tfplan.transformers.children_calculator import ChildrenCalculator +from slp_tfplan.slp_tfplan.transformers.dataflow_creator import DataflowCreator +from slp_tfplan.slp_tfplan.transformers.parent_calculator import ParentCalculator +from slp_tfplan.slp_tfplan.transformers.singleton_transformer import SingletonTransformer logger = logging.getLogger(__name__) -class TfplanParser(ProviderParser): +class TFPlanParser(ProviderParser): def __init__(self, project_id: str, project_name: str, tfplan: {}, tfgraph: DiGraph, mapping: [{}]): self.tfplan = tfplan @@ -24,7 +24,7 @@ def __init__(self, project_id: str, project_name: str, tfplan: {}, tfgraph: DiGr self.project_id = project_id self.project_name = project_name - self.otm = TfplanOTM( + self.otm = TFPlanOTM( project_id, project_name, components=[], @@ -51,20 +51,20 @@ def build_otm(self): return self.otm def __map_tfplan_resources(self): - TfplanMapper(self.otm, self.tfplan, self.mapping).map() + TFPlanMapper(self.otm, self.tfplan, self.mapping).map() def __load_auxiliary_resources(self): - TfplanSecurityGroupsLoader(self.otm, self.tfplan).load() - TfplanLaunchTemplateLoader(self.otm, self.tfplan).load() + SecurityGroupsLoader(self.otm, self.tfplan).load() + LaunchTemplatesLoader(self.otm, self.tfplan).load() def __calculate_parents(self): - TfplanParentCalculator(self.otm, self.tfgraph).transform() + ParentCalculator(self.otm, self.tfgraph).transform() def __calculate_children(self): - TfplanChildrenCalculator(self.otm, self.tfgraph).transform() + ChildrenCalculator(self.otm, self.tfgraph).transform() def __calculate_dataflows(self): - TfplanDataflowCreator(self.otm, self.tfgraph).transform() + DataflowCreator(self.otm, self.tfgraph).transform() def __calculate_singletons(self): - TfplanSingletonTransformer(self.otm).transform() + SingletonTransformer(self.otm).transform() diff --git a/slp_tfplan/slp_tfplan/tfplan_processor.py b/slp_tfplan/slp_tfplan/tfplan_processor.py new file mode 100644 index 00000000..607f4889 --- /dev/null +++ b/slp_tfplan/slp_tfplan/tfplan_processor.py @@ -0,0 +1,47 @@ +from slp_tfplan.slp_tfplan.parse.tfplan_parser import TFPlanParser +from slp_tfplan.slp_tfplan.validate.tfplan_mapping_file_validator import TFPlanMappingFileValidator +from slp_tfplan.slp_tfplan.load.tfplan_loader import TFPlanLoader +from slp_tfplan.slp_tfplan.map.tfplan_mapping_file_loader import TFPlanMappingFileLoader +from slp_tfplan.slp_tfplan.validate.tfplan_validator import TFPlanValidator +from slp_base.slp_base import MappingLoader, MappingValidator +from slp_base.slp_base import OTMProcessor +from slp_base.slp_base import ProviderValidator +from slp_base.slp_base.provider_loader import ProviderLoader +from slp_base.slp_base.provider_parser import ProviderParser + + +class TFPlanProcessor(OTMProcessor): + """ + Terraform implementation of OTMProcessor + """ + + def __init__(self, project_id: str, project_name: str, sources: [bytes], mappings: [bytes]): + self.project_id = project_id + self.project_name = project_name + self.mappings = mappings + self.sources = sources + + self.terraform_loader = None + self.mapping_loader = None + + def get_provider_validator(self) -> ProviderValidator: + return TFPlanValidator(self.sources) + + def get_provider_loader(self) -> ProviderLoader: + self.terraform_loader = TFPlanLoader(self.sources) + return self.terraform_loader + + def get_mapping_validator(self) -> MappingValidator: + return TFPlanMappingFileValidator(self.mappings) + + def get_mapping_loader(self) -> MappingLoader: + self.mapping_loader = TFPlanMappingFileLoader(self.mappings) + return self.mapping_loader + + def get_provider_parser(self) -> ProviderParser: + return TFPlanParser( + self.project_id, + self.project_name, + self.terraform_loader.get_terraform(), + self.terraform_loader.get_tfgraph(), + self.mapping_loader.get_mappings()) diff --git a/slp_tf/tests/unit/tfplan/__init__.py b/slp_tfplan/slp_tfplan/transformers/__init__.py similarity index 100% rename from slp_tf/tests/unit/tfplan/__init__.py rename to slp_tfplan/slp_tfplan/transformers/__init__.py diff --git a/slp_tf/slp_tf/tfplan/transformers/tfplan_children_calculator.py b/slp_tfplan/slp_tfplan/transformers/children_calculator.py similarity index 59% rename from slp_tf/slp_tf/tfplan/transformers/tfplan_children_calculator.py rename to slp_tfplan/slp_tfplan/transformers/children_calculator.py index cbadc480..0bbce146 100644 --- a/slp_tf/slp_tf/tfplan/transformers/tfplan_children_calculator.py +++ b/slp_tfplan/slp_tfplan/transformers/children_calculator.py @@ -1,18 +1,18 @@ from networkx import DiGraph -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent, TfplanOTM -from slp_tf.slp_tf.tfplan.transformers.hierarchy_calculator import HierarchyCalculator +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent, TFPlanOTM +from slp_tfplan.slp_tfplan.transformers.hierarchy_calculator import HierarchyCalculator # CHILD_TYPE: [PARENT_TYPE_1, PARENT_TYPE_2...] PARENTS_TYPES_BY_CHILDREN_TYPE = {'aws_ecs_task_definition': ['aws_ecs_service']} -class TfplanChildrenCalculator(HierarchyCalculator): +class ChildrenCalculator(HierarchyCalculator): - def __init__(self, otm: TfplanOTM, graph: DiGraph): + def __init__(self, otm: TFPlanOTM, graph: DiGraph): super().__init__(otm, graph.reverse(copy=True)) - def _calculate_component_parents(self, component: TfplanComponent) -> [str]: + def _calculate_component_parents(self, component: TFPlanComponent) -> [str]: if component.tf_type not in PARENTS_TYPES_BY_CHILDREN_TYPE: return [] diff --git a/slp_tf/slp_tf/tfplan/transformers/tfplan_dataflow_creator.py b/slp_tfplan/slp_tfplan/transformers/dataflow_creator.py similarity index 76% rename from slp_tf/slp_tf/tfplan/transformers/tfplan_dataflow_creator.py rename to slp_tfplan/slp_tfplan/transformers/dataflow_creator.py index fba10b61..ae2c5447 100644 --- a/slp_tf/slp_tf/tfplan/transformers/tfplan_dataflow_creator.py +++ b/slp_tfplan/slp_tfplan/transformers/dataflow_creator.py @@ -5,16 +5,16 @@ from otm.otm.entity.parent_type import ParentType from otm.otm.entity.dataflow import Dataflow -from slp_tf.slp_tf.tfplan.graph.relationships_extractor import RelationshipsExtractor -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanOTM, TfplanComponent, TfplanSecurityGroup -from slp_tf.slp_tf.tfplan.transformers.tfplan_transformer import TfplanTransformer +from slp_tfplan.slp_tfplan.graph.relationships_extractor import RelationshipsExtractor +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanOTM, TFPlanComponent, SecurityGroup +from slp_tfplan.slp_tfplan.transformers.transformer import Transformer -def find_component_by_id(component_id: str, components: List[TfplanComponent]): +def find_component_by_id(component_id: str, components: List[TFPlanComponent]): return next(filter(lambda c: c.id == component_id, components)) -def create_dataflow(source_component: TfplanComponent, target_component: TfplanComponent, bidirectional: bool = False): +def create_dataflow(source_component: TFPlanComponent, target_component: TFPlanComponent, bidirectional: bool = False): return Dataflow( # FIXME Generate deterministic ID dataflow_id=str(uuid.uuid4()), @@ -25,13 +25,13 @@ def create_dataflow(source_component: TfplanComponent, target_component: TfplanC ) -class TfplanDataflowCreator(TfplanTransformer): +class DataflowCreator(Transformer): - def __init__(self, otm: TfplanOTM, graph: DiGraph): + def __init__(self, otm: TFPlanOTM, graph: DiGraph): super().__init__(otm, graph) - self.components: [TfplanComponent] = otm.components - self.security_groups: [TfplanSecurityGroup] = otm.security_groups + self.components: [TFPlanComponent] = otm.components + self.security_groups: [SecurityGroup] = otm.security_groups self.dataflows: [Dataflow] = otm.dataflows self.relationships_extractor = RelationshipsExtractor( @@ -75,8 +75,8 @@ def __create_dataflows_from_sgs(self): return dataflows - def __match_components_and_sgs(self) -> Dict[str, List[TfplanComponent]]: - components_in_sgs: Dict[str, List[TfplanComponent]] = {} + def __match_components_and_sgs(self) -> Dict[str, List[TFPlanComponent]]: + components_in_sgs: Dict[str, List[TFPlanComponent]] = {} for security_group in self.security_groups: components_in_sg = [] @@ -90,12 +90,12 @@ def __match_components_and_sgs(self) -> Dict[str, List[TfplanComponent]]: return components_in_sgs - def __are_components_related_by_graph(self, component: TfplanComponent, - security_group: TfplanSecurityGroup) -> bool: + def __are_components_related_by_graph(self, component: TFPlanComponent, + security_group: SecurityGroup) -> bool: return self.relationships_extractor.exist_valid_path(component.tf_resource_id, security_group.id) or \ self.relationships_extractor.exist_valid_path(security_group.id, component.tf_resource_id) - def __are_related_by_launch_template(self, component: TfplanComponent, security_group: TfplanSecurityGroup) -> bool: + def __are_related_by_launch_template(self, component: TFPlanComponent, security_group: SecurityGroup) -> bool: for launch_template in self.otm.launch_templates: if not self.relationships_extractor.exist_valid_path(component.tf_resource_id, launch_template.id): continue @@ -121,16 +121,16 @@ def __find_sgs_relationships(self) -> Dict[str, List[str]]: return sgs_relationships - def __are_sgs_related_by_configuration(self, source_sg: TfplanSecurityGroup, - target_sg: TfplanSecurityGroup) -> bool: + def __are_sgs_related_by_configuration(self, source_sg: SecurityGroup, + target_sg: SecurityGroup) -> bool: return source_sg.id in target_sg.ingress_sgs or target_sg.id in source_sg.egress_sgs - def __are_sgs_related_by_graph(self, source_sg: TfplanSecurityGroup, target_sg: TfplanSecurityGroup) -> bool: + def __are_sgs_related_by_graph(self, source_sg: SecurityGroup, target_sg: SecurityGroup) -> bool: return self.relationships_extractor.exist_valid_path(target_sg.id, source_sg.id) def __create_dataflows_among_components(self, - source_components: List[TfplanComponent], - target_components: List[TfplanComponent]): + source_components: List[TFPlanComponent], + target_components: List[TFPlanComponent]): dataflows = [] for source_component in source_components: @@ -140,17 +140,17 @@ def __create_dataflows_among_components(self, return dataflows - def __are_hierarchically_related(self, first: TfplanComponent, second: TfplanComponent) -> bool: + def __are_hierarchically_related(self, first: TFPlanComponent, second: TFPlanComponent) -> bool: return first.id == second.id or \ self.__is_ancestor(first, second) or self.__is_ancestor_of_any_clon(first, second)\ or self.__is_ancestor(second, first) or self.__is_ancestor_of_any_clon(second, first) - def __is_ancestor(self, component: TfplanComponent, ancestor: TfplanComponent) -> bool: + def __is_ancestor(self, component: TFPlanComponent, ancestor: TFPlanComponent) -> bool: return component.parent_type == ParentType.COMPONENT and \ (component.parent == ancestor.id or self.__is_ancestor(find_component_by_id(component.parent, self.components), ancestor)) - def __is_ancestor_of_any_clon(self, component: TfplanComponent, ancestor: TfplanComponent) -> bool: + def __is_ancestor_of_any_clon(self, component: TFPlanComponent, ancestor: TFPlanComponent) -> bool: if not component.clones_ids: return False diff --git a/slp_tf/slp_tf/tfplan/transformers/hierarchy_calculator.py b/slp_tfplan/slp_tfplan/transformers/hierarchy_calculator.py similarity index 73% rename from slp_tf/slp_tf/tfplan/transformers/hierarchy_calculator.py rename to slp_tfplan/slp_tfplan/transformers/hierarchy_calculator.py index 1723a64f..c4586f3f 100644 --- a/slp_tf/slp_tf/tfplan/transformers/hierarchy_calculator.py +++ b/slp_tfplan/slp_tfplan/transformers/hierarchy_calculator.py @@ -4,12 +4,12 @@ from networkx import DiGraph from otm.otm.entity.parent_type import ParentType -from slp_tf.slp_tf.tfplan.graph.relationships_extractor import RelationshipsExtractor -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent, TfplanOTM -from slp_tf.slp_tf.tfplan.transformers.tfplan_transformer import TfplanTransformer +from slp_tfplan.slp_tfplan.graph.relationships_extractor import RelationshipsExtractor +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent, TFPlanOTM +from slp_tfplan.slp_tfplan.transformers.transformer import Transformer -def clone_component_by_parents(component: TfplanComponent, parent_ids: [str]) -> [{}]: +def clone_component_by_parents(component: TFPlanComponent, parent_ids: [str]) -> [{}]: clones = [] for index, parent_id in enumerate(parent_ids): @@ -22,16 +22,16 @@ def clone_component_by_parents(component: TfplanComponent, parent_ids: [str]) -> return clones -def set_component_clones_ids(components: [TfplanComponent]): +def set_component_clones_ids(components: [TFPlanComponent]): for component in components: component.clones_ids = [s.id for s in components if s.id != component.id] -def set_component_index(component: TfplanComponent, index: int): +def set_component_index(component: TFPlanComponent, index: int): component.id = f'{component.id}_{index}' -def set_component_parent(component: TfplanComponent, parent_id: str): +def set_component_parent(component: TFPlanComponent, parent_id: str): component.parent_type = ParentType.COMPONENT component.parent = parent_id @@ -45,8 +45,8 @@ def __extract_type(component_address: str) -> str: return component_address.split('.')[-2] -class HierarchyCalculator(TfplanTransformer): - def __init__(self, otm: TfplanOTM, graph: DiGraph): +class HierarchyCalculator(Transformer): + def __init__(self, otm: TFPlanOTM, graph: DiGraph): super().__init__(otm, graph) self.relationships_extractor = RelationshipsExtractor( @@ -73,10 +73,10 @@ def transform(self): self.otm.components.extend(clones) @abc.abstractmethod - def _calculate_component_parents(self, component: TfplanComponent) -> [str]: + def _calculate_component_parents(self, component: TFPlanComponent) -> [str]: raise NotImplementedError - def _find_parent_by_closest_relationship(self, component: TfplanComponent, parent_candidates: []): + def _find_parent_by_closest_relationship(self, component: TFPlanComponent, parent_candidates: []): return self.relationships_extractor.get_closest_resources(component, parent_candidates) def _get_parent_candidates(self, parent_types: []): diff --git a/slp_tf/slp_tf/tfplan/transformers/tfplan_parent_calculator.py b/slp_tfplan/slp_tfplan/transformers/parent_calculator.py similarity index 50% rename from slp_tf/slp_tf/tfplan/transformers/tfplan_parent_calculator.py rename to slp_tfplan/slp_tfplan/transformers/parent_calculator.py index 271fda2f..53aef573 100644 --- a/slp_tf/slp_tf/tfplan/transformers/tfplan_parent_calculator.py +++ b/slp_tfplan/slp_tfplan/transformers/parent_calculator.py @@ -1,18 +1,18 @@ from networkx import DiGraph -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent, TfplanOTM -from slp_tf.slp_tf.tfplan.transformers.hierarchy_calculator import HierarchyCalculator +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent, TFPlanOTM +from slp_tfplan.slp_tfplan.transformers.hierarchy_calculator import HierarchyCalculator PARENT_TYPES = ['aws_subnet', 'aws_vpc', 'azurerm_subnet', 'azurerm_virtual_network'] -class TfplanParentCalculator(HierarchyCalculator): +class ParentCalculator(HierarchyCalculator): - def __init__(self, otm: TfplanOTM, graph: DiGraph): + def __init__(self, otm: TFPlanOTM, graph: DiGraph): super().__init__(otm, graph) self.parent_candidates = self._get_parent_candidates(PARENT_TYPES) - def _calculate_component_parents(self, component: TfplanComponent) -> [str]: + def _calculate_component_parents(self, component: TFPlanComponent) -> [str]: return self._find_parent_by_closest_relationship(component, self.parent_candidates) diff --git a/slp_tf/slp_tf/tfplan/transformers/tfplan_singleton_transformer.py b/slp_tfplan/slp_tfplan/transformers/singleton_transformer.py similarity index 91% rename from slp_tf/slp_tf/tfplan/transformers/tfplan_singleton_transformer.py rename to slp_tfplan/slp_tfplan/transformers/singleton_transformer.py index 0c2a4f3d..530a5d84 100644 --- a/slp_tf/slp_tf/tfplan/transformers/tfplan_singleton_transformer.py +++ b/slp_tfplan/slp_tfplan/transformers/singleton_transformer.py @@ -3,12 +3,12 @@ from otm.otm.entity.dataflow import Dataflow from sl_util.sl_util.iterations_utils import remove_from_list -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent -from slp_tf.slp_tf.tfplan.transformers.tfplan_transformer import TfplanTransformer -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanOTM +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent +from slp_tfplan.slp_tfplan.transformers.transformer import Transformer +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanOTM -def _merge_component_configurations(otm_components: List[TfplanComponent]) -> Dict: +def _merge_component_configurations(otm_components: List[TFPlanComponent]) -> Dict: merge_configuration = {} for component in otm_components: merge_configuration = { @@ -60,11 +60,11 @@ def _merge_dataflows(origin_dataflow: Dataflow, dataflows: List[Dataflow]) -> Da return origin_dataflow -def _build_singleton_component(otm_components: List[TfplanComponent]) -> TfplanComponent: +def _build_singleton_component(otm_components: List[TFPlanComponent]) -> TFPlanComponent: tags = list(set(itertools.chain.from_iterable([c.tags or [] for c in otm_components]))) configuration = _merge_component_configurations(otm_components) component_id = otm_components[0].id - return TfplanComponent( + return TFPlanComponent( component_id=component_id, name=f"{otm_components[0].type} (grouped)", component_type=otm_components[0].type, @@ -75,14 +75,14 @@ def _build_singleton_component(otm_components: List[TfplanComponent]) -> TfplanC ) -class TfplanSingletonTransformer(TfplanTransformer): +class SingletonTransformer(Transformer): - def __init__(self, otm: TfplanOTM): + def __init__(self, otm: TFPlanOTM): super().__init__(otm) self.otm_components = self.otm.components self.otm_dataflows = self.otm.dataflows - self.singleton_component_relations: Dict[str, TfplanComponent] = {} + self.singleton_component_relations: Dict[str, TFPlanComponent] = {} def transform(self): self.__populate_singleton_component_relations() @@ -98,7 +98,7 @@ def __populate_singleton_component_relations(self): self.singleton_component_relations.get(sibling_components[0].id) \ or _build_singleton_component(sibling_components) - def __is_not_parent(self, component: TfplanComponent): + def __is_not_parent(self, component: TFPlanComponent): return not any(c.parent == component.id for c in self.otm_components) def __find_siblings_components(self, component_type: str, parent_id: str): diff --git a/slp_tf/slp_tf/tfplan/transformers/tfplan_transformer.py b/slp_tfplan/slp_tfplan/transformers/transformer.py similarity index 62% rename from slp_tf/slp_tf/tfplan/transformers/tfplan_transformer.py rename to slp_tfplan/slp_tfplan/transformers/transformer.py index b5950629..e2fdda9e 100644 --- a/slp_tf/slp_tf/tfplan/transformers/tfplan_transformer.py +++ b/slp_tfplan/slp_tfplan/transformers/transformer.py @@ -2,17 +2,16 @@ from networkx import DiGraph -from otm.otm.entity.otm import OTM -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanOTM +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanOTM -class TfplanTransformer(metaclass=abc.ABCMeta): +class Transformer(metaclass=abc.ABCMeta): @classmethod def __subclasshook__(cls, subclass): return (hasattr(subclass, 'transform') and callable(subclass.transform)) or NotImplemented - def __init__(self, otm: TfplanOTM, graph: DiGraph = None): - self.otm: TfplanOTM = otm + def __init__(self, otm: TFPlanOTM, graph: DiGraph = None): + self.otm: TFPlanOTM = otm self.graph: DiGraph = graph @abc.abstractmethod diff --git a/slp_tf/tests/unit/tfplan/load/__init__.py b/slp_tfplan/slp_tfplan/validate/__init__.py similarity index 100% rename from slp_tf/tests/unit/tfplan/load/__init__.py rename to slp_tfplan/slp_tfplan/validate/__init__.py diff --git a/slp_tfplan/slp_tfplan/validate/tfplan_mapping_file_validator.py b/slp_tfplan/slp_tfplan/validate/tfplan_mapping_file_validator.py new file mode 100644 index 00000000..5faabc92 --- /dev/null +++ b/slp_tfplan/slp_tfplan/validate/tfplan_mapping_file_validator.py @@ -0,0 +1,10 @@ +from slp_base.slp_base import MultipleMappingFileValidator +from slp_base.slp_base.schema import Schema + + +class TFPlanMappingFileValidator(MultipleMappingFileValidator): + schema_filename = 'iac_tfplan_mapping_schema.json' + + def __init__(self, mapping_files: [bytes]): + super(TFPlanMappingFileValidator, self).__init__( + Schema.from_package('slp_tfplan', self.schema_filename), mapping_files) diff --git a/slp_tfplan/slp_tfplan/validate/tfplan_validator.py b/slp_tfplan/slp_tfplan/validate/tfplan_validator.py new file mode 100644 index 00000000..6b17f5aa --- /dev/null +++ b/slp_tfplan/slp_tfplan/validate/tfplan_validator.py @@ -0,0 +1,101 @@ +import json +import logging +import re +from json import JSONDecodeError +from typing import List, Dict + +from sl_util.sl_util.file_utils import get_file_type_by_content, read_byte_data +from slp_base import IacFileNotValidError, IacType +from slp_base.slp_base import ProviderValidator +from slp_base.slp_base.provider_validator import generate_size_error, generate_content_type_error +from slp_base.slp_base.schema import Schema + +logger = logging.getLogger(__name__) + +MIN_FILE_SIZE = 20 +MAX_TFPLAN_FILE_SIZE = 5 * 1024 * 1024 # 5MB +MAX_TFGRAPH_FILE_SIZE = 2 * 1024 * 1024 # 2MB + +TFPLAN_MIME_TYPE = 'application/json' +TFGRAPH_MIME_TYPE = 'text/plain' + +TFPLAN_SCHEMA_FILENAME = 'tfplan_schema.json' +VALID_TFGRAPH_REGEX = r"\bdigraph[\s\S]*\bsubgraph[\s\S]*" + + +def is_valid_tfplan(tfplan: bytes) -> bool: + schema = Schema.from_package('slp_tfplan', TFPLAN_SCHEMA_FILENAME) + try: + schema.validate(json.loads(tfplan)) + except JSONDecodeError: + return False + + return schema.valid + + +def is_valid_tfgraph(tfgraph: bytes) -> bool: + return bool(re.match(VALID_TFGRAPH_REGEX, read_byte_data(tfgraph))) + + +class TFPlanValidator(ProviderValidator): + + def __init__(self, sources: List[bytes]): + super(TFPlanValidator, self).__init__() + self.sources = sources + + self.param_sources: Dict[str, bytes] = {} + + def validate(self): + logger.info('Validating Terraform Plan file') + self.__validate_number_of_sources() + self.__validate_request_size() + self.__validate_file_types() + + self.__match_params_and_sources() + self.__validate_file_sizes() + self.__validate_tfgraph() + + def __validate_number_of_sources(self): + if len(self.sources) != 2: + raise IacFileNotValidError( + title='Wrong number of files', + message='Required one tfplan and one tfgraph files') + + def __validate_request_size(self): + max_supported_file_size = max(MAX_TFPLAN_FILE_SIZE, MAX_TFGRAPH_FILE_SIZE) + if len(self.sources[0]) > max_supported_file_size or len(self.sources[0]) < MIN_FILE_SIZE \ + or len(self.sources[1]) > max_supported_file_size or len(self.sources[1]) < MIN_FILE_SIZE: + raise generate_size_error(IacType.TFPLAN, 'iac_file', IacFileNotValidError) + + def __validate_file_types(self): + source_types = {get_file_type_by_content((self.sources[0])), get_file_type_by_content((self.sources[1]))} + + if source_types.intersection(IacType.TFPLAN.valid_mime) != source_types: + raise generate_content_type_error(IacType.TFPLAN, 'iac_file', IacFileNotValidError) + + def __match_params_and_sources(self): + is_first_source_tfplan = is_valid_tfplan(self.sources[0]) + is_second_source_tfplan = is_valid_tfplan(self.sources[1]) + + if is_first_source_tfplan and is_second_source_tfplan: + raise IacFileNotValidError( + title='Two tfplan files', + message='Required one tfplan and one tfgraph files' + ) + + if is_first_source_tfplan == is_second_source_tfplan: + raise generate_content_type_error(IacType.TFPLAN, 'iac_file', IacFileNotValidError) + + self.param_sources = { + 'tfplan': self.sources[0] if is_first_source_tfplan else self.sources[1], + 'tfgraph': self.sources[0] if is_second_source_tfplan else self.sources[1] + } + + def __validate_file_sizes(self): + if len(self.param_sources['tfplan']) > MAX_TFPLAN_FILE_SIZE or \ + len(self.param_sources['tfgraph']) > MAX_TFGRAPH_FILE_SIZE: + raise generate_size_error(IacType.TFPLAN, 'iac_file', IacFileNotValidError) + + def __validate_tfgraph(self): + if not is_valid_tfgraph(self.param_sources['tfgraph']): + raise generate_content_type_error(IacType.TFPLAN, 'iac_file', IacFileNotValidError) diff --git a/slp_tfplan/tests/__init__.py b/slp_tfplan/tests/__init__.py new file mode 100644 index 00000000..ae43e584 --- /dev/null +++ b/slp_tfplan/tests/__init__.py @@ -0,0 +1,4 @@ +import pytest + +pytest.register_assert_rewrite('slp_tfplan.tests.util.asserts') + diff --git a/slp_tf/tests/unit/tfplan/mapping/__init__.py b/slp_tfplan/tests/integration/__init__.py similarity index 100% rename from slp_tf/tests/unit/tfplan/mapping/__init__.py rename to slp_tfplan/tests/integration/__init__.py diff --git a/slp_tfplan/tests/integration/test_tfplan.py b/slp_tfplan/tests/integration/test_tfplan.py new file mode 100644 index 00000000..62fe1368 --- /dev/null +++ b/slp_tfplan/tests/integration/test_tfplan.py @@ -0,0 +1,115 @@ +import random +from typing import List + +import pytest +from pytest import mark, param + +from slp_base import IacFileNotValidError +from sl_util.sl_util.file_utils import get_byte_data +from slp_tfplan import TFPlanProcessor +from slp_tfplan.tests.resources.test_resource_paths import terraform_iriusrisk_tfplan_aws_mapping, \ + tfplan_elb, tfgraph_elb, tfplan_sgs, tfgraph_sgs, otm_expected_sgs, otm_expected_elb, \ + otm_expected_official, tfplan_official, tfgraph_official, invalid_yaml +from slp_base.tests.util.otm import validate_and_compare +from slp_tfplan.tests.util.builders import create_artificial_file, MIN_FILE_SIZE, MAX_TFPLAN_FILE_SIZE, \ + MAX_TFGRAPH_FILE_SIZE + +DEFAULT_MAPPING_FILE = get_byte_data(terraform_iriusrisk_tfplan_aws_mapping) + +SAMPLE_VALID_TFPLAN = get_byte_data(tfplan_elb) +SAMPLE_VALID_TFGRAPH = get_byte_data(tfgraph_elb) + +SAMPLE_INVALID_TFPLAN = get_byte_data(invalid_yaml) +SAMPLE_INVALID_TFGRAPH = get_byte_data(invalid_yaml) + +SAMPLE_ID = 'id' +SAMPLE_NAME = 'name' +EXCLUDED_REGEX = r"root\[\'dataflows'\]\[.+?\]\['id'\]" + + +class TestTFPlan: + + @mark.parametrize('tfplan,tfgraph,expected', + [param(get_byte_data(tfplan_elb), get_byte_data(tfgraph_elb), otm_expected_elb, + id='elb-example'), + param(get_byte_data(tfplan_sgs), get_byte_data(tfgraph_sgs), otm_expected_sgs, + id='sgs-example'), + param(get_byte_data(tfplan_official), get_byte_data(tfgraph_official), + otm_expected_official, + id='official-example')]) + def test_tfplan_tfgraph_examples(self, tfplan: bytes, tfgraph: bytes, expected: str): + # GIVEN a valid TFPLAN file and a valid tfgraph + # AND a valid TF mapping file + mapping_file = DEFAULT_MAPPING_FILE + + # WHEN TFPlanProcessor::process is invoked + otm = TFPlanProcessor(SAMPLE_ID, SAMPLE_NAME, [tfplan, tfgraph], [mapping_file]).process() + + # THEN the resulting OTM match the expected one + left, right = validate_and_compare(otm, expected, EXCLUDED_REGEX) + assert left == right + + @mark.parametrize('sources', [ + param([], id='no sources'), + param([SAMPLE_VALID_TFPLAN], id='one source'), + param([SAMPLE_VALID_TFPLAN] * random.randint(3, 10), id='more than two sources') + ]) + def test_wrong_number_of_parameters(self, sources: List[bytes]): + # GIVEN a wrong number of sources + + # WHEN TFPlanProcessor::process is invoked + # THEN a LoadingIacFileError exception is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [DEFAULT_MAPPING_FILE]).process() + + # AND the message says that the number of parameters is wrong + assert str(error.value.title) == 'Wrong number of files' + assert str(error.value.message) == 'Required one tfplan and one tfgraph files' + + @mark.parametrize('sources', [ + param([create_artificial_file(MIN_FILE_SIZE - 1), SAMPLE_VALID_TFGRAPH], id='tfplan too small'), + param([create_artificial_file(MAX_TFPLAN_FILE_SIZE + 1), SAMPLE_VALID_TFGRAPH], id='tfplan too big'), + param([SAMPLE_VALID_TFPLAN, create_artificial_file(MIN_FILE_SIZE - 1)], id='tfgraph too small'), + param([SAMPLE_VALID_TFPLAN, create_artificial_file(MAX_TFGRAPH_FILE_SIZE + 1)], id='tfgraph too big') + ]) + def test_invalid_size(self, sources: List[bytes]): + # GIVEN a tfplan or tfgraph with an invalid size + + # WHEN TFPlanProcessor::process is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [DEFAULT_MAPPING_FILE]).process() + + # AND whose information is right + assert error.value.title == 'Terraform Plan file is not valid' + assert error.value.message == 'Provided iac_file is not valid. Invalid size' + + def test_two_tfplan(self): + # GIVEN two valid TFPLANs + sources = [SAMPLE_VALID_TFPLAN, SAMPLE_VALID_TFPLAN] + + # WHEN TFPlanProcessor::process is invoked + # THEN a LoadingIacFileError exception is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [DEFAULT_MAPPING_FILE]).process() + + # AND the message says that no multiple tfplan files can be processed at the same time + assert str(error.value.title) == 'Two tfplan files' + assert str(error.value.message) == 'Required one tfplan and one tfgraph files' + + @mark.parametrize('sources', [ + param([SAMPLE_INVALID_TFPLAN, SAMPLE_VALID_TFGRAPH], id='invalid tfplan'), + param([SAMPLE_VALID_TFPLAN, SAMPLE_INVALID_TFGRAPH], id='invalid tfgraph'), + param([SAMPLE_INVALID_TFPLAN, SAMPLE_INVALID_TFGRAPH], id='both invalid') + ]) + def test_invalid_sources(self, sources: List[bytes]): + # GIVEN some invalid tfplan + + # WHEN TFPlanProcessor::process is invoked + # THEN a LoadingIacFileError exception is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanProcessor(SAMPLE_ID, SAMPLE_NAME, sources, [DEFAULT_MAPPING_FILE]).process() + + # AND the message says that no multiple tfplan files can be processed at the same time + assert str(error.value.title) == 'Terraform Plan file is not valid' + assert str(error.value.message) == 'Invalid content type for iac_file' diff --git a/slp_tf/tests/unit/tfplan/transformers/__init__.py b/slp_tfplan/tests/resources/__init__.py similarity index 100% rename from slp_tf/tests/unit/tfplan/transformers/__init__.py rename to slp_tfplan/tests/resources/__init__.py diff --git a/slp_tfplan/tests/resources/generic/invalid-yaml.yaml b/slp_tfplan/tests/resources/generic/invalid-yaml.yaml new file mode 100755 index 00000000..ef5bfa37 --- /dev/null +++ b/slp_tfplan/tests/resources/generic/invalid-yaml.yaml @@ -0,0 +1 @@ +INVALID YAML FILE WITH THE MINIMUM LENGTH \ No newline at end of file diff --git a/slp_tfplan/tests/resources/mapping/iriusrisk-tfplan-aws-mapping.yaml b/slp_tfplan/tests/resources/mapping/iriusrisk-tfplan-aws-mapping.yaml new file mode 100644 index 00000000..9d18d905 --- /dev/null +++ b/slp_tfplan/tests/resources/mapping/iriusrisk-tfplan-aws-mapping.yaml @@ -0,0 +1,297 @@ +trustzones: + - id: b61d6911-338d-46a8-9f39-8dcd24abfe91 + name: Public Cloud + type: b61d6911-338d-46a8-9f39-8dcd24abfe91 + $default: true + + # SG MAPPING (AUXILIARY SG) + # type 4 + - id: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + name: Internet + type: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + $source: {$singleton: {$type: "aws_security_group", $props: ["egress[0].cidr_blocks", "ingress[0].cidr_blocks"]}} + +# The order of the components is important because parent components must be defined before child components +components: + + - type: CD-ACM + $source: {$singleton: {$type: "aws_acm_certificate"}} + + - type: cloudwatch + $source: {$singleton: {$type: "aws_cloudwatch_metric_alarm"}} + + - type: dynamodb + $source: {$type: "aws_dynamodb_table"} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)dynamodb$ + name: DynamoDB from VPCEndpoint + + - type: vpc + $source: {$type: "aws_vpc"} + + - type: ec2 + $source: {$type: "aws_instance"} + parent: {$path: "resource_properties.subnet_id"} + + - type: empty-component + $source: {$type: "aws_subnet"} + parent: {$path: "resource_properties.vpc_id"} + + - type: empty-component + $source: {$type: "aws_vpc_endpoint"} + parent: {$path: "resource_properties.subnet_ids"} +# (Previous) parent: {$findFirst: ["*.subnet_ids[]", "*.vpc_id | [0] | re_sub('[\\$\\{\\}]', '', @) | re_sub('aws_[\\w-]+\\.', '', @) | re_sub('\\.id', '', @)"]} +# This findFirst never executes the second condition as *.subnet_ids[] always will return an array (maybe empty) and findFirst only works with None + + + - type: empty-component + $source: {$type: "aws_internet_gateway"} + + - type: elastic-container-service + $source: {$type: "aws_ecs_service"} + parent: {$path: "resource_properties.network_configuration[0].subnets"} + $children: {$path: "resource_properties.task_definition"} + + - type: docker-container + $source: {$type: "aws_ecs_task_definition"} + + - type: load-balancer + $source: {$type: ["aws_lb", "aws_elb", "aws_alb"]} + parent: {$path: "resource_properties.subnets"} + + - type: kms + $source: {$singleton: {$type: "aws_kms_key"}} + + - type: aws-lambda-function + $source: {$type: "aws_lambda_function"} + + - type: cloudwatch + $source: {$singleton: {$type: "aws_cloudwatch_log_group"}} + + - type: rds + $source: {$type: ["aws_db_instance", "aws_rds_cluster"]} + + - type: route-53 + $source: {$type: "aws_route53_zone"} + + - type: CD-EC2-AUTO-SCALING + $source: { $type: "aws_autoscaling_group" } + + - type: empty-component + $source: { $type: "cloudflare_record" } + + - type: s3 + $source: {$type: "aws_s3_bucket"} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)s3$ + name: S3 from VPCEndpoint + + - type: CD-SECRETS-MANAGER + $source: {$singleton: {$type: "aws_secretsmanager_secret"}} + + - type: sqs-simple-queue-service + $source: {$type: "aws_sqs_queue"} + + - type: CD-SYSTEMS-MANAGER + $source: {$singleton: {$type: {$regex: ^aws_ssm_\w*$}}} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)ssm$ + name: {$numberOfSources: {oneSource: {$path: "Type"}, multipleSource: {$format: "Systems Manager from VPCEndpoint (grouped)"}}} + - regex: ^(.*)ssmmessages$ + name: {$numberOfSources: {oneSource: {$path: "Type"}, multipleSource: {$format: "Systems Manager from VPCEndpoint (grouped)"}}} + + - type: empty-component + $source: {$type: "aws_synthetics_canary"} + parent: {$path: "resource_properties.vpc_config[0].subnet_ids"} + + - type: api-gateway + $source: {$singleton: {$type: {$regex: ^aws_api_gateway_\w*$}}} + + + - type: athena + $source: {$singleton: {$type: {$regex: ^aws_athena_\w*$}}} + + - type: CD-MQ + $source: {$singleton: {$type: {$regex: ^aws_mq_\w*$}}} + + - type: cf-cloudfront + $source: {$singleton: {$type: {$regex: ^aws_cloudfront_\w*$}}} + + - type: cloudtrail + $source: {$type: "aws_cloudtrail"} + + - type: cognito + $source: {$type: ["aws_cognito_user_pool", "aws_cognito_identity_pool"]} + + - type: CD-CONFIG + $source: {$singleton: {$type: {$regex: ^aws_config_\w*$}}} + + - type: elastic-container-registry + $source: {$singleton: {$type: {$regex: ^aws_ecr_\w*$}}} + $altsource: + - $mappingType: {$type: "aws_vpc_endpoint"} + $mappingPath: {$path: "*.service_name | [0]"} + $mappingLookups: + - regex: ^(.*)ecr.dkr$ + name: ECR from VPCEndpoint + + - type: elastic-container-kubernetes + $source: {$type: "aws_eks_cluster"} + + - type: elasticache + $source: {$singleton: {$type: {$regex: ^aws_elasticache_\w*$}}} + + - type: CD-GUARDDUTY + $source: {$singleton: {$type: {$regex: ^aws_guardduty_\w*$}}} + + - type: CD-INSPECTOR + $source: {$singleton: {$type: {$regex: ^aws_inspector_\w*$}}} + + - type: CD-MACIE + $source: {$singleton: {$type: {$regex: ^aws_macie2_\w*$}}} + + - type: CD-AWS-NETWORK-FIREWALL + $source: {$type: "aws_networkfirewall_firewall"} + parent: {$path: "resource_properties.vpc_id"} + + - type: redshift + $source: {$type: "aws_redshift_cluster"} + + - type: CD-SES + $source: {$singleton: {$type: {$regex: ^aws_ses_\w*$}}} + + - type: sns + $source: {$singleton: {$type: {$regex: ^aws_sns_\w*$}}} + + - type: step-functions + $source: {$type: {$regex: ^aws_sfn_\w*$}} + + - type: CD-WAF + $source: {$singleton: {$type: {$regex: ^aws_waf_\w*$}}} + + - type: kinesis-data-analytics + $source: {$singleton: {$type: {$regex: ^aws_kinesis_analytics_\w*$}}} + + - type: kinesis-data-analytics + $source: {$singleton: {$type: {$regex: ^aws_kinesis_stream\w*$}}} + + - type: kinesis-data-firehose + $source: {$singleton: {$type: {$regex: ^aws_kinesis_firehose_\w*$}}} + + - type: generic-client + name: {$ip: {$path: "resource_properties.egress[0].cidr_blocks"}} + $source: {$type: "aws_security_group", $props: "egress[0].cidr_blocks"} + parent: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + tags: + - Outbound connection destination IP + + - type: generic-client + name: {$ip: {$path: "resource_properties.ingress[0].cidr_blocks"}} + $source: {$type: "aws_security_group", $props: "ingress[0].cidr_blocks"} + parent: f0ba7722-39b6-4c81-8290-a30a248bb8d9 + tags: + - Inbound connection source IP + + - type: rds + $source: {$module: "terraform-aws-modules/rds/aws"} + + - type: vpc + $source: {$module: "terraform-aws-modules/vpc/aws"} + + - type: load-balancer + $source: {$module: "terraform-aws-modules/alb/aws"} + +dataflows: + #### Security Groups #### + #### Type 1 #### - Resource to Security Group + - $source: {$props: "security_group_ids"} + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.security_group_ids"}} + + - $source: {$props: "security_groups"} + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.security_groups"}} + + - $source: {$props: "network_configuration | [0].security_groups"} + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.network_configuration[0].security_groups"}} + + - $source: {$props: "vpc_config" } + source: {$path: "resource_id"} + destination: {$hub: {$path: "resource_properties.vpc_config[0].security_group_ids"}} + + #### Type 2 #### Security Group to Security Group + - $source: {$type: "aws_security_group_rule", $props: "type=='ingress'"} + source: {$hub: {$path: "resource_properties.source_security_group_id"}} + destination: {$hub: {$path: "resource_properties.security_group_id"}} + tags: + - $path: "resource_properties.description" + - $path: "resource_properties.protocol" + - $path: "resource_properties.from_port|to_string(@)" + - $path: "resource_properties.to_port|to_string(@)" + + - $source: {$type: "aws_security_group_rule", $props: "type=='egress'"} + source: {$hub: {$path: "resource_properties.security_group_id"}} + destination: {$hub: {$path: "resource_properties.source_security_group_id"}} + tags: + - $path: "resource_properties.description" + - $path: "resource_properties.protocol" + - $path: "resource_properties.from_port|to_string(@)" + - $path: "resource_properties.to_port|to_string(@)" + + #### Type 3 #### - Security Group to Resource + - $source: {$type: "aws_security_group"} + source: {$path: "resource_properties.ingress[0].cidr_blocks"} + destination: {$hub: {$path: "resource_id"}} + tags: + - $path: "resource_properties.ingress[0].description" + - $path: "resource_properties.ingress[0].protocol" + - $path: "resource_properties.ingress[0].from_port|to_string(@)" + - $path: "resource_properties.ingress[0].to_port|to_string(@)" + + - $source: {$type: "aws_security_group"} + source: {$hub: {$path: "resource_id"}} + destination: {$path: "resource_properties.egress[0].cidr_blocks"} + tags: + - $path: "resource_properties.egress[0].description" + - $path: "resource_properties.egress[0].protocol" + - $path: "resource_properties.egress[0].cidr_blocks|join(',', @)" + + #### Security Groups #### + - name: {$format: "dataflow to Lambda function in {resource_name}"} + $source: {$type: "aws_lambda_event_source_mapping"} + source: {$path: "resource_properties.event_source_arn"} + destination: {$path: "resource_properties.function_name"} + + - name: {$format: "dataflow from Lambda function on Failure {resource_name}"} + $source: {$type: "aws_lambda_event_source_mapping"} + source: {$path: "resource_properties.function_name"} + destination: {$path: "resource_properties.destination_config[0].on_failure[0].destination_arn"} + + # The parameter "logging" is deprecated. Use the resource "aws_s3_bucket_logging" instead + - name: {$format: "S3 dataflow from {resource_name}"} + $source: {$type: "aws_s3_bucket"} + source: {$path: "resource_id"} + destination: {$path: "resource_properties.logging[0].target_bucket"} + + - name: {$format: "S3 dataflow from {resource_type}"} + $source: {$type: "aws_s3_bucket_logging"} + source: {$path: "resource_properties.bucket" } + destination: {$path: "resource_properties.target_bucket"} + # The parameter "logging" is deprecated. Use the resource "aws_s3_bucket_logging" instead + + - name: {$format: "API gateway data flow from {resource_type}"} + $source: {$type: "aws_api_gateway_authorizer"} + source: {$numberOfSources: {oneSource: {$path: "resource_id"}, multipleSource: {$format: "api-gateway (grouped)"}}} + destination: {$path: "resource_properties.provider_arns[0]"} + tags: + - API gateway dataflow diff --git a/slp_tf/tests/resources/otm/expected_tfplan_tfgraph_elb.otm b/slp_tfplan/tests/resources/otm/expected-elb.otm similarity index 100% rename from slp_tf/tests/resources/otm/expected_tfplan_tfgraph_elb.otm rename to slp_tfplan/tests/resources/otm/expected-elb.otm diff --git a/slp_tf/tests/resources/otm/expected_tfplan_tfgraph_official.otm b/slp_tfplan/tests/resources/otm/expected-official.otm similarity index 100% rename from slp_tf/tests/resources/otm/expected_tfplan_tfgraph_official.otm rename to slp_tfplan/tests/resources/otm/expected-official.otm diff --git a/slp_tf/tests/resources/otm/expected_tfplan_tfgraph_sgs.otm b/slp_tfplan/tests/resources/otm/expected-sgs.otm similarity index 100% rename from slp_tf/tests/resources/otm/expected_tfplan_tfgraph_sgs.otm rename to slp_tfplan/tests/resources/otm/expected-sgs.otm diff --git a/slp_tfplan/tests/resources/test_resource_paths.py b/slp_tfplan/tests/resources/test_resource_paths.py new file mode 100644 index 00000000..2e332ced --- /dev/null +++ b/slp_tfplan/tests/resources/test_resource_paths.py @@ -0,0 +1,23 @@ +import os + +path = os.path.dirname(__file__) + +# generic +invalid_yaml = path + '/generic/invalid-yaml.yaml' + +# tfplan/tfgraph +tfplan_elb = path + '/tfplan/elb-tfplan.json' +tfgraph_elb = path + '/tfplan/elb-tfgraph.gv' +tfplan_sgs = path + '/tfplan/sgs-tfplan.json' +tfgraph_sgs = path + '/tfplan/sgs-tfgraph.gv' +tfplan_official = path + '/tfplan/official-tfplan.json' +tfgraph_official = path + '/tfplan/official-tfgraph.gv' + +# mapping +terraform_iriusrisk_tfplan_aws_mapping = path + '/mapping/iriusrisk-tfplan-aws-mapping.yaml' + +# otm +otm_expected_elb = f'{path}/otm/expected-elb.otm' +otm_expected_sgs = f'{path}/otm/expected-sgs.otm' +otm_expected_official = f'{path}/otm/expected-official.otm' + diff --git a/slp_tf/tests/resources/tfplan/elb-tfgraph.gv b/slp_tfplan/tests/resources/tfplan/elb-tfgraph.gv similarity index 100% rename from slp_tf/tests/resources/tfplan/elb-tfgraph.gv rename to slp_tfplan/tests/resources/tfplan/elb-tfgraph.gv diff --git a/slp_tf/tests/resources/tfplan/elb-tfplan.json b/slp_tfplan/tests/resources/tfplan/elb-tfplan.json similarity index 100% rename from slp_tf/tests/resources/tfplan/elb-tfplan.json rename to slp_tfplan/tests/resources/tfplan/elb-tfplan.json diff --git a/slp_tfplan/tests/resources/tfplan/official-tfgraph.gv b/slp_tfplan/tests/resources/tfplan/official-tfgraph.gv new file mode 100644 index 00000000..947f8a4a --- /dev/null +++ b/slp_tfplan/tests/resources/tfplan/official-tfgraph.gv @@ -0,0 +1,140 @@ +digraph { + compound = "true" + newrank = "true" + subgraph "root" { + "[root] aws_api_gateway_account.click_logger_api_gateway_account (expand)" [label = "aws_api_gateway_account.click_logger_api_gateway_account", shape = "box"] + "[root] aws_api_gateway_authorizer.clicklogger-authorizer (expand)" [label = "aws_api_gateway_authorizer.clicklogger-authorizer", shape = "box"] + "[root] aws_api_gateway_deployment.clicklogger_deployment (expand)" [label = "aws_api_gateway_deployment.clicklogger_deployment", shape = "box"] + "[root] aws_api_gateway_integration.integration (expand)" [label = "aws_api_gateway_integration.integration", shape = "box"] + "[root] aws_api_gateway_integration_response.MyDemoIntegrationResponse (expand)" [label = "aws_api_gateway_integration_response.MyDemoIntegrationResponse", shape = "box"] + "[root] aws_api_gateway_method.method (expand)" [label = "aws_api_gateway_method.method", shape = "box"] + "[root] aws_api_gateway_method_response.response_200 (expand)" [label = "aws_api_gateway_method_response.response_200", shape = "box"] + "[root] aws_api_gateway_method_settings.general_settings (expand)" [label = "aws_api_gateway_method_settings.general_settings", shape = "box"] + "[root] aws_api_gateway_model.clicklogger_model (expand)" [label = "aws_api_gateway_model.clicklogger_model", shape = "box"] + "[root] aws_api_gateway_request_validator.clicklogger_validator (expand)" [label = "aws_api_gateway_request_validator.clicklogger_validator", shape = "box"] + "[root] aws_api_gateway_resource.resource (expand)" [label = "aws_api_gateway_resource.resource", shape = "box"] + "[root] aws_api_gateway_rest_api.click_logger_api (expand)" [label = "aws_api_gateway_rest_api.click_logger_api", shape = "box"] + "[root] aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group (expand)" [label = "aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group", shape = "box"] + "[root] aws_cloudwatch_log_group.clicklogger-api-log-group (expand)" [label = "aws_cloudwatch_log_group.clicklogger-api-log-group", shape = "box"] + "[root] aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group (expand)" [label = "aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group", shape = "box"] + "[root] aws_cloudwatch_log_group.lambda_click_logger_log_group (expand)" [label = "aws_cloudwatch_log_group.lambda_click_logger_log_group", shape = "box"] + "[root] aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream (expand)" [label = "aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream", shape = "box"] + "[root] aws_dynamodb_table.click-logger-table (expand)" [label = "aws_dynamodb_table.click-logger-table", shape = "box"] + "[root] aws_glue_catalog_database.aws_glue_click_logger_database (expand)" [label = "aws_glue_catalog_database.aws_glue_click_logger_database", shape = "box"] + "[root] aws_glue_catalog_table.aws_glue_click_logger_catalog_table (expand)" [label = "aws_glue_catalog_table.aws_glue_click_logger_catalog_table", shape = "box"] + "[root] aws_iam_policy.click_loggerlambda_logging_policy (expand)" [label = "aws_iam_policy.click_loggerlambda_logging_policy", shape = "box"] + "[root] aws_iam_role.click_logger_api_gateway_cloudwatch_role (expand)" [label = "aws_iam_role.click_logger_api_gateway_cloudwatch_role", shape = "box"] + "[root] aws_iam_role.click_logger_invocation_role (expand)" [label = "aws_iam_role.click_logger_invocation_role", shape = "box"] + "[root] aws_iam_role.click_logger_lambda_role (expand)" [label = "aws_iam_role.click_logger_lambda_role", shape = "box"] + "[root] aws_iam_role.click_logger_stream_consumer_firehose_role (expand)" [label = "aws_iam_role.click_logger_stream_consumer_firehose_role", shape = "box"] + "[root] aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy (expand)" [label = "aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy", shape = "box"] + "[root] aws_iam_role_policy.click_logger_invocation_policy (expand)" [label = "aws_iam_role_policy.click_logger_invocation_policy", shape = "box"] + "[root] aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy (expand)" [label = "aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy", shape = "box"] + "[root] aws_iam_role_policy_attachment.click_loggerlambda_policy (expand)" [label = "aws_iam_role_policy_attachment.click_loggerlambda_policy", shape = "box"] + "[root] aws_iam_role_policy_attachment.lambda_logs (expand)" [label = "aws_iam_role_policy_attachment.lambda_logs", shape = "box"] + "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" [label = "aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream", shape = "box"] + "[root] aws_lambda_function.lambda_clicklogger (expand)" [label = "aws_lambda_function.lambda_clicklogger", shape = "box"] + "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" [label = "aws_lambda_function.lambda_clicklogger_authorizer", shape = "box"] + "[root] aws_lambda_function.lambda_clicklogger_stream_consumer (expand)" [label = "aws_lambda_function.lambda_clicklogger_stream_consumer", shape = "box"] + "[root] aws_lambda_permission.apigw_lambda (expand)" [label = "aws_lambda_permission.apigw_lambda", shape = "box"] + "[root] aws_s3_bucket.click_logger_firehose_delivery_s3_bucket (expand)" [label = "aws_s3_bucket.click_logger_firehose_delivery_s3_bucket", shape = "box"] + "[root] data.aws_caller_identity.current (expand)" [label = "data.aws_caller_identity.current", shape = "box"] + "[root] data.aws_iam_policy_document.AWSLambdaTrustPolicy (expand)" [label = "data.aws_iam_policy_document.AWSLambdaTrustPolicy", shape = "box"] + "[root] data.aws_region.current (expand)" [label = "data.aws_region.current", shape = "box"] + "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" [label = "provider[\"registry.terraform.io/hashicorp/aws\"]", shape = "diamond"] + "[root] var.app_prefix" [label = "var.app_prefix", shape = "note"] + "[root] var.lambda_source_zip_path" [label = "var.lambda_source_zip_path", shape = "note"] + "[root] var.stage_name" [label = "var.stage_name", shape = "note"] + "[root] aws_api_gateway_account.click_logger_api_gateway_account (expand)" -> "[root] aws_iam_role.click_logger_api_gateway_cloudwatch_role (expand)" + "[root] aws_api_gateway_authorizer.clicklogger-authorizer (expand)" -> "[root] aws_api_gateway_rest_api.click_logger_api (expand)" + "[root] aws_api_gateway_authorizer.clicklogger-authorizer (expand)" -> "[root] aws_iam_role.click_logger_invocation_role (expand)" + "[root] aws_api_gateway_authorizer.clicklogger-authorizer (expand)" -> "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" + "[root] aws_api_gateway_deployment.clicklogger_deployment (expand)" -> "[root] aws_api_gateway_integration.integration (expand)" + "[root] aws_api_gateway_integration.integration (expand)" -> "[root] aws_api_gateway_method.method (expand)" + "[root] aws_api_gateway_integration.integration (expand)" -> "[root] aws_lambda_function.lambda_clicklogger (expand)" + "[root] aws_api_gateway_integration_response.MyDemoIntegrationResponse (expand)" -> "[root] aws_api_gateway_integration.integration (expand)" + "[root] aws_api_gateway_integration_response.MyDemoIntegrationResponse (expand)" -> "[root] aws_api_gateway_method_response.response_200 (expand)" + "[root] aws_api_gateway_method.method (expand)" -> "[root] aws_api_gateway_authorizer.clicklogger-authorizer (expand)" + "[root] aws_api_gateway_method.method (expand)" -> "[root] aws_api_gateway_model.clicklogger_model (expand)" + "[root] aws_api_gateway_method.method (expand)" -> "[root] aws_api_gateway_request_validator.clicklogger_validator (expand)" + "[root] aws_api_gateway_method.method (expand)" -> "[root] aws_api_gateway_resource.resource (expand)" + "[root] aws_api_gateway_method_response.response_200 (expand)" -> "[root] aws_api_gateway_method.method (expand)" + "[root] aws_api_gateway_method_settings.general_settings (expand)" -> "[root] aws_api_gateway_deployment.clicklogger_deployment (expand)" + "[root] aws_api_gateway_model.clicklogger_model (expand)" -> "[root] aws_api_gateway_rest_api.click_logger_api (expand)" + "[root] aws_api_gateway_request_validator.clicklogger_validator (expand)" -> "[root] aws_api_gateway_rest_api.click_logger_api (expand)" + "[root] aws_api_gateway_resource.resource (expand)" -> "[root] aws_api_gateway_rest_api.click_logger_api (expand)" + "[root] aws_api_gateway_rest_api.click_logger_api (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_api_gateway_rest_api.click_logger_api (expand)" -> "[root] var.app_prefix" + "[root] aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group (expand)" -> "[root] var.app_prefix" + "[root] aws_cloudwatch_log_group.clicklogger-api-log-group (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_cloudwatch_log_group.clicklogger-api-log-group (expand)" -> "[root] var.app_prefix" + "[root] aws_cloudwatch_log_group.clicklogger-api-log-group (expand)" -> "[root] var.stage_name" + "[root] aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group (expand)" -> "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" + "[root] aws_cloudwatch_log_group.lambda_click_logger_log_group (expand)" -> "[root] aws_lambda_function.lambda_clicklogger (expand)" + "[root] aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream (expand)" -> "[root] aws_cloudwatch_log_group.click_logger_firehose_delivery_stream_log_group (expand)" + "[root] aws_dynamodb_table.click-logger-table (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_dynamodb_table.click-logger-table (expand)" -> "[root] var.app_prefix" + "[root] aws_dynamodb_table.click-logger-table (expand)" -> "[root] var.stage_name" + "[root] aws_glue_catalog_database.aws_glue_click_logger_database (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_glue_catalog_database.aws_glue_click_logger_database (expand)" -> "[root] var.app_prefix" + "[root] aws_glue_catalog_table.aws_glue_click_logger_catalog_table (expand)" -> "[root] aws_glue_catalog_database.aws_glue_click_logger_database (expand)" + "[root] aws_glue_catalog_table.aws_glue_click_logger_catalog_table (expand)" -> "[root] aws_s3_bucket.click_logger_firehose_delivery_s3_bucket (expand)" + "[root] aws_iam_policy.click_loggerlambda_logging_policy (expand)" -> "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" + "[root] aws_iam_role.click_logger_api_gateway_cloudwatch_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_iam_role.click_logger_api_gateway_cloudwatch_role (expand)" -> "[root] var.app_prefix" + "[root] aws_iam_role.click_logger_invocation_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_iam_role.click_logger_invocation_role (expand)" -> "[root] var.app_prefix" + "[root] aws_iam_role.click_logger_lambda_role (expand)" -> "[root] data.aws_iam_policy_document.AWSLambdaTrustPolicy (expand)" + "[root] aws_iam_role.click_logger_lambda_role (expand)" -> "[root] var.app_prefix" + "[root] aws_iam_role.click_logger_stream_consumer_firehose_role (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] aws_iam_role.click_logger_stream_consumer_firehose_role (expand)" -> "[root] var.app_prefix" + "[root] aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy (expand)" -> "[root] aws_iam_role.click_logger_api_gateway_cloudwatch_role (expand)" + "[root] aws_iam_role_policy.click_logger_invocation_policy (expand)" -> "[root] aws_iam_role.click_logger_invocation_role (expand)" + "[root] aws_iam_role_policy.click_logger_invocation_policy (expand)" -> "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" + "[root] aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy (expand)" -> "[root] aws_iam_role.click_logger_stream_consumer_firehose_role (expand)" + "[root] aws_iam_role_policy_attachment.click_loggerlambda_policy (expand)" -> "[root] aws_iam_role.click_logger_lambda_role (expand)" + "[root] aws_iam_role_policy_attachment.lambda_logs (expand)" -> "[root] aws_iam_policy.click_loggerlambda_logging_policy (expand)" + "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" -> "[root] aws_glue_catalog_table.aws_glue_click_logger_catalog_table (expand)" + "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" -> "[root] aws_iam_role.click_logger_stream_consumer_firehose_role (expand)" + "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" -> "[root] aws_lambda_function.lambda_clicklogger_stream_consumer (expand)" + "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" -> "[root] data.aws_region.current (expand)" + "[root] aws_lambda_function.lambda_clicklogger (expand)" -> "[root] aws_kinesis_firehose_delivery_stream.click_logger_firehose_delivery_stream (expand)" + "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" -> "[root] aws_iam_role.click_logger_lambda_role (expand)" + "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" -> "[root] var.lambda_source_zip_path" + "[root] aws_lambda_function.lambda_clicklogger_stream_consumer (expand)" -> "[root] aws_dynamodb_table.click-logger-table (expand)" + "[root] aws_lambda_function.lambda_clicklogger_stream_consumer (expand)" -> "[root] aws_iam_role.click_logger_lambda_role (expand)" + "[root] aws_lambda_function.lambda_clicklogger_stream_consumer (expand)" -> "[root] var.lambda_source_zip_path" + "[root] aws_lambda_permission.apigw_lambda (expand)" -> "[root] aws_api_gateway_rest_api.click_logger_api (expand)" + "[root] aws_lambda_permission.apigw_lambda (expand)" -> "[root] aws_lambda_function.lambda_clicklogger (expand)" + "[root] aws_s3_bucket.click_logger_firehose_delivery_s3_bucket (expand)" -> "[root] data.aws_caller_identity.current (expand)" + "[root] aws_s3_bucket.click_logger_firehose_delivery_s3_bucket (expand)" -> "[root] var.app_prefix" + "[root] aws_s3_bucket.click_logger_firehose_delivery_s3_bucket (expand)" -> "[root] var.stage_name" + "[root] data.aws_caller_identity.current (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] data.aws_iam_policy_document.AWSLambdaTrustPolicy (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] data.aws_region.current (expand)" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"]" + "[root] output.S3 (expand)" -> "[root] aws_s3_bucket.click_logger_firehose_delivery_s3_bucket (expand)" + "[root] output.deployment-url (expand)" -> "[root] aws_api_gateway_deployment.clicklogger_deployment (expand)" + "[root] output.lambda-clicklogger (expand)" -> "[root] aws_lambda_function.lambda_clicklogger (expand)" + "[root] output.lambda-clicklogger-authorzer (expand)" -> "[root] aws_lambda_function.lambda_clicklogger_authorizer (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_api_gateway_account.click_logger_api_gateway_account (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_api_gateway_integration_response.MyDemoIntegrationResponse (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_api_gateway_method_settings.general_settings (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_cloudwatch_log_group.clicklogger-api-log-group (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_cloudwatch_log_group.lambda_click_logger_authorizer_log_group (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_cloudwatch_log_group.lambda_click_logger_log_group (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_cloudwatch_log_stream.click_logger_firehose_delivery_stream (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_role_policy.click_logger_api_gateway_cloudwatch_policy (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_role_policy.click_logger_invocation_policy (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_role_policy.click_logger_stream_consumer_firehose_inline_policy (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_role_policy_attachment.click_loggerlambda_policy (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_iam_role_policy_attachment.lambda_logs (expand)" + "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" -> "[root] aws_lambda_permission.apigw_lambda (expand)" + "[root] root" -> "[root] output.S3 (expand)" + "[root] root" -> "[root] output.deployment-url (expand)" + "[root] root" -> "[root] output.lambda-clicklogger (expand)" + "[root] root" -> "[root] output.lambda-clicklogger-authorzer (expand)" + "[root] root" -> "[root] provider[\"registry.terraform.io/hashicorp/aws\"] (close)" + } +} + diff --git a/slp_tf/tests/resources/tfplan/official-tfplan.json b/slp_tfplan/tests/resources/tfplan/official-tfplan.json similarity index 99% rename from slp_tf/tests/resources/tfplan/official-tfplan.json rename to slp_tfplan/tests/resources/tfplan/official-tfplan.json index d1addffe..ac3dcc73 100644 --- a/slp_tf/tests/resources/tfplan/official-tfplan.json +++ b/slp_tfplan/tests/resources/tfplan/official-tfplan.json @@ -2573,8 +2573,8 @@ "values": { "account_id": "154977180039", "arn": "arn:aws:iam::656177851052:user/someuser", - "id": "154977180039", - "user_id": "AIDASIFK4DGDYNIERI5P6" + "id": "194477180039", + "user_id": "ANYUSERID" }, "sensitive_values": {}}, { "address": "data.aws_iam_policy_document.AWSLambdaTrustPolicy", diff --git a/slp_tf/tests/resources/tfplan/sgs-tfgraph.gv b/slp_tfplan/tests/resources/tfplan/sgs-tfgraph.gv similarity index 100% rename from slp_tf/tests/resources/tfplan/sgs-tfgraph.gv rename to slp_tfplan/tests/resources/tfplan/sgs-tfgraph.gv diff --git a/slp_tf/tests/resources/tfplan/sgs-tfplan.json b/slp_tfplan/tests/resources/tfplan/sgs-tfplan.json similarity index 100% rename from slp_tf/tests/resources/tfplan/sgs-tfplan.json rename to slp_tfplan/tests/resources/tfplan/sgs-tfplan.json diff --git a/slp_tfplan/tests/unit/__init__.py b/slp_tfplan/tests/unit/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/slp_tfplan/tests/unit/load/__init__.py b/slp_tfplan/tests/unit/load/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/slp_tf/tests/unit/tfplan/load/test_tfplan_loader.py b/slp_tfplan/tests/unit/load/test_tfplan_loader.py similarity index 64% rename from slp_tf/tests/unit/tfplan/load/test_tfplan_loader.py rename to slp_tfplan/tests/unit/load/test_tfplan_loader.py index f89a6e94..70819746 100644 --- a/slp_tf/tests/unit/tfplan/load/test_tfplan_loader.py +++ b/slp_tfplan/tests/unit/load/test_tfplan_loader.py @@ -1,101 +1,41 @@ +import random from copy import deepcopy from json import JSONDecodeError -from unittest.mock import patch +from typing import List +from unittest.mock import patch, Mock from networkx import DiGraph -from pytest import raises +from pytest import raises, mark, param, fixture -from slp_tf.slp_tf.tfplan.load.tfplan_loader import TfplanLoader -from sl_util.sl_util.file_utils import get_byte_data -from slp_tf.tests.resources import test_resource_paths +from slp_tfplan.slp_tfplan.load.tfplan_loader import TFPlanLoader +from slp_tfplan.tests.resources import test_resource_paths from slp_base import LoadingIacFileError +from slp_tfplan.tests.util.builders import build_tfplan, generate_resources, generate_child_modules +from slp_tfplan.tests.util.asserts import assert_common_properties +from sl_util.sl_util.str_utils import get_bytes INVALID_YAML = test_resource_paths.invalid_yaml -TFPLAN_MINIMUM_STRUCTURE = {'planned_values': {'root_module': {}}} TF_FILE_YAML_EXCEPTION = JSONDecodeError('HLC2 cannot be processed as JSON', doc='sample-doc', pos=0) -def build_tfplan(resources: [{}] = None, child_modules: [{}] = None) -> {}: - tfplan = deepcopy(TFPLAN_MINIMUM_STRUCTURE) +@fixture +def mock_load_tfplan(mocker, mocked_tfplan): + mocker.patch('yaml.load', side_effect=mocked_tfplan) - if resources: - tfplan['planned_values']['root_module']['resources'] = resources - if child_modules: - tfplan['planned_values']['root_module']['child_modules'] = child_modules +@fixture(autouse=True) +def mocked_graph(): + yield Mock() - return tfplan +@fixture(autouse=True) +def mock_load_graph(mocker, mocked_graph): + mocker.patch('slp_tfplan.slp_tfplan.load.tfplan_loader.load_tfgraph', side_effect=mocked_graph) -def generate_resources(resource_count: int, module_child: bool = False) -> [{}]: - resources = [] - for i in range(1, resource_count + 1): - resource = { - 'address': f'r{i}-addr', - 'mode': 'managed', - 'type': f'r{i}-type', - 'name': f'r{i}-name', - 'provider_name': 'registry.terraform.io/hashicorp/aws', - 'schema_version': 0, - 'values': { - 'val1': 'value1', - 'val2': 'value2', - }, - 'sensitive_values': { - 'senval1': 'value1', - 'senval2': 'value2', - } - } - if module_child: - resource['index'] = '0' +class TestTFPlanLoader: - resources.append(resource) - - return resources - - -def generate_child_modules(module_count: int, child_modules: [{}] = None, resource_count: int = None) -> [{}]: - modules = [] - for i in range(1, module_count + 1): - module = { - 'address': f'cm{i}-addr', - } - - if child_modules: - module['child_modules'] = child_modules - - if resource_count: - module['resources'] = generate_resources(resource_count, True) - - modules.append(module) - - return modules - - -def assert_common_properties(properties: {}): - assert properties['resource_mode'] == 'managed' - assert properties['resource_provider_name'] == 'registry.terraform.io/hashicorp/aws' - assert properties['resource_schema_version'] == 0 - assert properties['val1'] == 'value1' - assert properties['senval1'] == 'value1' - - -def assert_resource_id(resource: {}): - assert resource['resource_id'] == resource['properties']['resource_address'] - - -def assert_retro_compatibility_fields(resource: {}): - assert list(resource.keys())[0] == resource['resource_type'] - assert resource['Type'] == resource['resource_type'] - assert resource['_key'] == resource['resource_name'] - assert resource['Properties'] == resource['resource_properties'] - assert resource[resource['resource_type']][resource['resource_name']] == resource['resource_properties'] - - -class TestTfplanLoader: - - @patch('slp_tf.slp_tf.tfplan.load.tfplan_loader.load_tfgraph') + @patch('slp_tfplan.slp_tfplan.load.tfplan_loader.load_tfgraph') @patch('yaml.load') def test_load_tfplan_and_graph(self, yaml_mock, from_agraph_mock): # GIVEN a valid plain Terraform Plan file with no modules @@ -105,8 +45,8 @@ def test_load_tfplan_and_graph(self, yaml_mock, from_agraph_mock): graph_label = 'Mocked Graph' from_agraph_mock.side_effect = [DiGraph(label=graph_label)] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED', tfgraph_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN the TFPLAN is loaded @@ -120,8 +60,8 @@ def test_load_no_modules(self, yaml_mock): # GIVEN a valid plain Terraform Plan file with no modules yaml_mock.side_effect = [build_tfplan(resources=generate_resources(2))] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TF contents are loaded in TfplanLoader.terraform @@ -139,7 +79,6 @@ def test_load_no_modules(self, yaml_mock): properties = resource['resource_properties'] assert_common_properties(properties) - assert_retro_compatibility_fields(resource) assert properties['resource_address'] == f'r{i}-addr' @patch('yaml.load') @@ -148,8 +87,8 @@ def test_load_only_modules(self, yaml_mock): yaml_mock.side_effect = [build_tfplan( child_modules=generate_child_modules(module_count=2, resource_count=2))] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TF contents are loaded in TfplanLoader.terraform @@ -172,7 +111,6 @@ def test_load_only_modules(self, yaml_mock): properties = resource['resource_properties'] assert properties['resource_address'] == f'r{child_index}-addr' assert_common_properties(properties) - assert_retro_compatibility_fields(resource) resource_index += 1 @@ -184,8 +122,8 @@ def test_load_nested_modules(self, yaml_mock): module_count=1, child_modules=generate_child_modules(module_count=1, resource_count=1)))] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TF contents are loaded in TfplanLoader.terraform @@ -203,7 +141,6 @@ def test_load_nested_modules(self, yaml_mock): properties = resource['resource_properties'] assert properties['resource_address'] == 'r1-addr' assert_common_properties(properties) - assert_retro_compatibility_fields(resource) @patch('yaml.load') def test_load_complex_structure(self, yaml_mock): @@ -212,8 +149,8 @@ def test_load_complex_structure(self, yaml_mock): resources=generate_resources(1), child_modules=generate_child_modules(module_count=1, resource_count=1))] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TF contents are loaded in TfplanLoader.terraform @@ -231,7 +168,6 @@ def test_load_complex_structure(self, yaml_mock): properties = resource['resource_properties'] assert properties['resource_address'] == 'r1-addr' assert_common_properties(properties) - assert_retro_compatibility_fields(resource) # AND resource_type, resource_name and resource_properties from child modules are right resource = resources[1] @@ -242,7 +178,6 @@ def test_load_complex_structure(self, yaml_mock): properties = resource['resource_properties'] assert properties['resource_address'] == 'r1-addr' assert_common_properties(properties) - assert_retro_compatibility_fields(resource) @patch('yaml.load') def test_load_resources_same_name(self, yaml_mock): @@ -258,8 +193,8 @@ def test_load_resources_same_name(self, yaml_mock): yaml_mock.side_effect = [tfplan] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TF contents are loaded in TfplanLoader.terraform @@ -284,17 +219,19 @@ def test_load_modules_same_name(self, yaml_mock): duplicated_module = deepcopy(tfplan_modules[0]) original_module['address'] = f'{original_module["address"]}["zero"]' - original_module['resources'][0]['address'] = f'{original_module["address"]}.{original_module["resources"][0]["address"]}' + original_module['resources'][0][ + 'address'] = f'{original_module["address"]}.{original_module["resources"][0]["address"]}' duplicated_module['address'] = f'{duplicated_module["address"]}["one"]' - duplicated_module['resources'][0]['address'] = f'{duplicated_module["address"]}.{duplicated_module["resources"][0]["address"]}' + duplicated_module['resources'][0][ + 'address'] = f'{duplicated_module["address"]}.{duplicated_module["resources"][0]["address"]}' tfplan_modules.append(duplicated_module) yaml_mock.side_effect = [tfplan] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TF contents are loaded in TfplanLoader.terraform @@ -302,7 +239,7 @@ def test_load_modules_same_name(self, yaml_mock): resources = tfplan_loader.terraform['resource'] assert len(resources) == 1 - # AND The duplicated resource is unified and the index is no present in name or id + # AND The duplicated resource is unified and the index is not present in name or id assert resources[0]['resource_id'] == 'cm1-addr.r1-addr' assert resources[0]['resource_name'] == 'cm1-addr.r1-name' @@ -311,8 +248,8 @@ def test_load_no_resources(self, yaml_mock): # GIVEN a valid Terraform Plan file with no resources yaml_mock.side_effect = [{'planned_values': {'root_module': {}}}] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TfplanLoader.terraform is an empty dictionary @@ -323,22 +260,44 @@ def test_load_empty_tfplan(self, yaml_mock): # GIVEN an empty TFPLAN yaml_mock.side_effect = [{}] - # WHEN TfplanLoader::load is invoked - tfplan_loader = TfplanLoader(tfplan_source=b'MOCKED') + # WHEN TFPlanLoader::load is invoked + tfplan_loader = TFPlanLoader(sources=[b'MOCKED', b'MOCKED']) tfplan_loader.load() # THEN TfplanLoader.terraform is an empty dictionary assert tfplan_loader.terraform == {} - def test_load_invalid_wrong_json(self): - # GIVEN an invalid Terraform source file (TF or TFPLAN) - sources = get_byte_data(INVALID_YAML) + @mark.parametrize('sources', [ + param([], id='no sources'), + param([b'MOCKED'], id='one source'), + param([b'MOCKED'] * random.randint(3, 10), id='more than two sources') + ]) + def test_load_invalid_number_of_sources(self, sources: List[bytes]): + # GIVEN an invalid number of sources - # WHEN TfplanLoader::load is invoked + # WHEN TFPlanLoader::load is invoked + # THEN a LoadingIacFileError is raised + with raises(LoadingIacFileError) as error: + TFPlanLoader(sources=sources).load() + + # AND an empty IaC file message is on the exception + assert error.value.title == 'Wrong number of files' + assert error.value.message == 'Required one tfplan and one tfgraph files' + + @mark.usefixtures('mock_load_tfplan') + @mark.parametrize('mocked_tfplan,mocked_graph', [ + param([None], [None], id='no valid sources'), + param([None, None], [Mock()], id='no tfplan'), + param([Mock()], [None], id='no tfgraph') + ]) + def test_load_invalid_sources(self, mocked_tfplan, mocked_graph): + # GIVEN mocked invalid results for loading tfplan and tfgraph + + # WHEN TFPlanLoader::load is invoked # THEN a LoadingIacFileError is raised - with raises(LoadingIacFileError) as loading_error: - TfplanLoader(sources).load() + with raises(LoadingIacFileError) as error: + TFPlanLoader(sources=[get_bytes('MOCKED')] * 2).load() # AND an empty IaC file message is on the exception - assert str(loading_error.value.title) == 'IaC file is not valid' - assert str(loading_error.value.message) == 'The provided IaC file could not be processed' + assert str(error.value.title) == 'IaC files are not valid' + assert str(error.value.message) == 'The provided IaC files could not be processed' diff --git a/slp_tfplan/tests/unit/map/__init__.py b/slp_tfplan/tests/unit/map/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/slp_tf/tests/unit/tfplan/mapping/test_tfplan_mapper.py b/slp_tfplan/tests/unit/map/test_tfplan_mapper.py similarity index 90% rename from slp_tf/tests/unit/tfplan/mapping/test_tfplan_mapper.py rename to slp_tfplan/tests/unit/map/test_tfplan_mapper.py index 5c9e4277..67ea440d 100644 --- a/slp_tf/tests/unit/tfplan/mapping/test_tfplan_mapper.py +++ b/slp_tfplan/tests/unit/map/test_tfplan_mapper.py @@ -2,8 +2,8 @@ from typing import List, Dict from otm.otm.entity.parent_type import ParentType -from slp_tf.slp_tf.tfplan.mapping.tfplan_mapper import TfplanMapper -from slp_tf.tests.unit.tfplan.otm_graph_util import build_base_otm +from slp_tfplan.slp_tfplan.map.tfplan_mapper import TFPlanMapper +from slp_tfplan.tests.util.builders import build_base_otm BASE_OTM = build_base_otm() @@ -57,7 +57,7 @@ def build_multiple_mappings(components: List[Dict]) -> {}: return result -class TestTfplanMapper: +class TestTFPlanMapper: def test_mapping_by_type(self): # GIVEN a resource of some TF type @@ -71,8 +71,8 @@ def test_mapping_by_type(self): # AND a base otm dictionary otm = deepcopy(BASE_OTM) - # WHEN TfplanMapper::map is invoked - TfplanMapper(otm, resource, mapping).map() + # WHEN TFPlanMapper::map is invoked + TFPlanMapper(otm, resource, mapping).map() # THEN the component is added to the OTM assert len(otm.components) == 1 @@ -101,8 +101,8 @@ def test_mapping_by_regex(self): # AND a base otm dictionary otm = deepcopy(BASE_OTM) - # WHEN TfplanMapper::map is invoked - TfplanMapper(otm, resource, mapping).map() + # WHEN TFPlanMapper::map is invoked + TFPlanMapper(otm, resource, mapping).map() # THEN the component is added to the OTM assert len(otm.components) == 1 @@ -132,8 +132,8 @@ def test_mapping_by_skip(self): # AND a base otm dictionary otm = deepcopy(BASE_OTM) - # WHEN TfplanMapper::map is invoked - TfplanMapper(otm, resource, mapping).map() + # WHEN TFPlanMapper::map is invoked + TFPlanMapper(otm, resource, mapping).map() # THEN the component is skipped assert len(otm.components) == 0 @@ -153,8 +153,8 @@ def test_mapping_by_catchall(self): # AND a base otm dictionary otm = deepcopy(BASE_OTM) - # WHEN TfplanMapper::map is invoked - TfplanMapper(otm, resource, mapping).map() + # WHEN TFPlanMapper::map is invoked + TFPlanMapper(otm, resource, mapping).map() # THEN two components are added to the OTM assert len(otm.components) == 2 @@ -176,8 +176,8 @@ def test_mapping_by_singleton_catchall(self): # AND a base otm dictionary otm = deepcopy(BASE_OTM) - # WHEN TfplanMapper::map is invoked - TfplanMapper(otm, resource, mapping).map() + # WHEN TFPlanMapper::map is invoked + TFPlanMapper(otm, resource, mapping).map() # THEN three components are added to the OTM assert len(otm.components) == 3 @@ -208,8 +208,8 @@ def test_mapping_by_type_skip_and_catchall(self): # AND a base otm dictionary otm = deepcopy(BASE_OTM) - # WHEN TfplanMapper::map is invoked - TfplanMapper(otm, resource, mapping).map() + # WHEN TFPlanMapper::map is invoked + TFPlanMapper(otm, resource, mapping).map() # THEN two components are added to the OTM assert len(otm.components) == 2 diff --git a/slp_tfplan/tests/unit/transformers/__init__.py b/slp_tfplan/tests/unit/transformers/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_children_calculator.py b/slp_tfplan/tests/unit/transformers/test_children_calculator.py similarity index 78% rename from slp_tf/tests/unit/tfplan/transformers/test_tfplan_children_calculator.py rename to slp_tfplan/tests/unit/transformers/test_children_calculator.py index 1e453a7f..40d5214c 100644 --- a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_children_calculator.py +++ b/slp_tfplan/tests/unit/transformers/test_children_calculator.py @@ -1,12 +1,13 @@ -from slp_tf.slp_tf.tfplan.transformers.tfplan_children_calculator import TfplanChildrenCalculator -from slp_tf.tests.unit.tfplan.otm_graph_util import build_graph, \ - assert_parents, build_mocked_tfplan_component, build_mocked_otm +from slp_tfplan.slp_tfplan.transformers.children_calculator import ChildrenCalculator +from slp_tfplan.tests.util.asserts import assert_parents +from slp_tfplan.tests.util.builders import build_tfgraph, \ + build_mocked_tfplan_component, build_mocked_otm CHILD_TYPE = 'aws_ecs_task_definition' PARENT_TYPE = 'aws_ecs_service' -class TestTfplanChildrenCalculator: +class TestChildrenCalculator: def test_default_trustzone(self): # GIVEN an OTM dict with one component and a default trustZone @@ -18,10 +19,10 @@ def test_default_trustzone(self): otm = build_mocked_otm([component_a]) # AND a graph with no relationships for the component - graph = build_graph([(component_id, None)]) + graph = build_tfgraph([(component_id, None)]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanChildrenCalculator(otm=otm, graph=graph).transform() + # WHEN ChildrenCalculator::calculate_parents is invoked + ChildrenCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 1 @@ -46,13 +47,13 @@ def test_one_straight_path(self): otm = build_mocked_otm([child_component, parent_component]) # AND a graph with a straight relationship from the parent to the child - graph = build_graph([ + graph = build_tfgraph([ (parent_component_id, child_component_id), (child_component_id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanChildrenCalculator(otm=otm, graph=graph).transform() + # WHEN ChildrenCalculator::calculate_parents is invoked + ChildrenCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 2 @@ -77,14 +78,14 @@ def test_one_path_no_mapped_resources(self): otm = build_mocked_otm([child_component, parent_component]) # AND a graph with an indirect relationship from the parent to the child - graph = build_graph([ + graph = build_tfgraph([ (parent_component_id, 'non_mapped_component_id'), ('non_mapped_component_id', child_component_id), (child_component_id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanChildrenCalculator(otm=otm, graph=graph).transform() + # WHEN ChildrenCalculator::calculate_parents is invoked + ChildrenCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 2 diff --git a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_dataflow_creator.py b/slp_tfplan/tests/unit/transformers/test_dataflow_creator.py similarity index 69% rename from slp_tf/tests/unit/tfplan/transformers/test_tfplan_dataflow_creator.py rename to slp_tfplan/tests/unit/transformers/test_dataflow_creator.py index e811f757..7085803d 100644 --- a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_dataflow_creator.py +++ b/slp_tfplan/tests/unit/transformers/test_dataflow_creator.py @@ -3,35 +3,35 @@ from pytest import mark, param -from slp_tf.slp_tf.tfplan.transformers.tfplan_dataflow_creator import TfplanDataflowCreator -from slp_tf.tests.unit.tfplan.otm_graph_util import build_mocked_otm, build_graph, build_mocked_tfplan_component -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanSecurityGroup, TfplanLaunchTemplate, TfplanComponent +from slp_tfplan.slp_tfplan.transformers.dataflow_creator import DataflowCreator +from slp_tfplan.tests.util.builders import build_mocked_otm, build_tfgraph, build_mocked_tfplan_component +from slp_tfplan.slp_tfplan.objects.tfplan_objects import SecurityGroup, LaunchTemplate, TFPlanComponent -class TestTfplanDataflowCreator: +class TestDataflowCreator: @mark.parametrize('components,security_groups', [ param([Mock(id='mocked_component')], [], id='no_security_groups'), param([], [Mock(id='mocked_sg')], id='no_components'), param([Mock(id='mocked_component')], [Mock(id='mocked_sg')], id='unrelated_components_sgs'), ]) - def test_no_dataflows(self, components: List[TfplanComponent], security_groups: List[TfplanSecurityGroup]): + def test_no_dataflows(self, components: List[TFPlanComponent], security_groups: List[SecurityGroup]): # GIVEN an OTM with no SGs otm = build_mocked_otm(components=components, security_groups=security_groups) # AND a mock for the graph - graph = build_graph([]) + graph = build_tfgraph([]) - # WHEN TfplanDataflowCreator::transform is invoked - TfplanDataflowCreator(otm, graph).transform() + # WHEN DataflowCreator::transform is invoked + DataflowCreator(otm, graph).transform() # THEN no DFs are created in the OTM assert not otm.dataflows def test_sgs_and_components_loaded_and_related_by_graph(self): # GIVEN two SGs unrelated by configuration - sg1 = TfplanSecurityGroup(security_group_id='sg1', ingress_sgs=[], egress_sgs=[]) - sg2 = TfplanSecurityGroup(security_group_id='sg2', ingress_sgs=[], egress_sgs=[]) + sg1 = SecurityGroup(security_group_id='sg1', ingress_sgs=[], egress_sgs=[]) + sg2 = SecurityGroup(security_group_id='sg2', ingress_sgs=[], egress_sgs=[]) # AND two components component1 = build_mocked_tfplan_component({'component_name': 'c1', 'tf_type': 'c1-type'}) @@ -45,7 +45,7 @@ def test_sgs_and_components_loaded_and_related_by_graph(self): sg1_sg2_relationship = (sg2.id, sg1.id) # AND a graph with those relationships - graph = build_graph([ + graph = build_tfgraph([ c1_sg1_relationship, c2_sg2_relationship, sg1_sg2_relationship, @@ -58,8 +58,8 @@ def test_sgs_and_components_loaded_and_related_by_graph(self): security_groups=[sg1, sg2], launch_templates=[]) - # WHEN TfplanDataflowCreator::transform is invoked - TfplanDataflowCreator(otm, graph).transform() + # WHEN DataflowCreator::transform is invoked + DataflowCreator(otm, graph).transform() # THEN a dataflow is created between the components assert len(otm.dataflows) == 1 @@ -68,21 +68,21 @@ def test_sgs_and_components_loaded_and_related_by_graph(self): def test_sgs_related_by_configuration_mixed_sg_component_association(self): # GIVEN two SGs related by configuration - sg1 = TfplanSecurityGroup(security_group_id='sg1', ingress_sgs=[], egress_sgs=[]) - sg2 = TfplanSecurityGroup(security_group_id='sg2', ingress_sgs=['sg1'], egress_sgs=[]) + sg1 = SecurityGroup(security_group_id='sg1', ingress_sgs=[], egress_sgs=[]) + sg2 = SecurityGroup(security_group_id='sg2', ingress_sgs=['sg1'], egress_sgs=[]) # AND two components component1 = build_mocked_tfplan_component({'component_name': 'c1', 'tf_type': 'c1-type'}) component2 = build_mocked_tfplan_component({'component_name': 'c2', 'tf_type': 'c2-type'}) # AND a launch template related with the first SG - launch_template = TfplanLaunchTemplate(launch_template_id='lt1', security_groups_ids=['sg1']) + launch_template = LaunchTemplate(launch_template_id='lt1', security_groups_ids=['sg1']) # AND a graph that relates the launch template with the first component and the second with the second SG c1_lt1_relationship = (component1.id, launch_template.id) c2_sg2_relationship = (component2.id, sg2.id) - graph = build_graph([ + graph = build_tfgraph([ c1_lt1_relationship, c2_sg2_relationship, (launch_template.id, None), @@ -95,8 +95,8 @@ def test_sgs_related_by_configuration_mixed_sg_component_association(self): security_groups=[sg1, sg2], launch_templates=[launch_template]) - # WHEN TfplanDataflowCreator::transform is invoked - TfplanDataflowCreator(otm, graph).transform() + # WHEN DataflowCreator::transform is invoked + DataflowCreator(otm, graph).transform() # THEN a dataflow is created between the components assert len(otm.dataflows) == 1 diff --git a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_parent_calculator.py b/slp_tfplan/tests/unit/transformers/test_parent_calculator.py similarity index 84% rename from slp_tf/tests/unit/tfplan/transformers/test_tfplan_parent_calculator.py rename to slp_tfplan/tests/unit/transformers/test_parent_calculator.py index 74f3efbd..f47f8b1e 100644 --- a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_parent_calculator.py +++ b/slp_tfplan/tests/unit/transformers/test_parent_calculator.py @@ -1,12 +1,13 @@ -from slp_tf.slp_tf.tfplan.transformers.tfplan_parent_calculator import TfplanParentCalculator -from slp_tf.tests.unit.tfplan.otm_graph_util import build_graph, \ - assert_parents, build_mocked_otm, build_mocked_tfplan_component +from slp_tfplan.slp_tfplan.transformers.parent_calculator import ParentCalculator +from slp_tfplan.tests.util.asserts import assert_parents +from slp_tfplan.tests.util.builders import build_tfgraph, \ + build_mocked_otm, build_mocked_tfplan_component CHILD_TYPE = 'aws_instance' PARENT_TYPES = ['aws_subnet', 'aws_vpc'] -class TestTfplanParentCalculator: +class TestParentCalculator: def test_default_trustzone(self): # GIVEN an OTM dict with one component and a default trustZone @@ -19,10 +20,10 @@ def test_default_trustzone(self): otm = build_mocked_otm([component_a]) # AND a graph with no relationships for the component - graph = build_graph([(component_id, None)]) + graph = build_tfgraph([(component_id, None)]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanParentCalculator(otm=otm, graph=graph).transform() + # WHEN ParentCalculator::calculate_parents is invoked + ParentCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 1 @@ -47,13 +48,13 @@ def test_one_straight_path(self): otm = build_mocked_otm([child_component, parent_component]) # AND a graph with a straight relationship between the child and the parent - graph = build_graph([ + graph = build_tfgraph([ (child_component_id, parent_component_id), (parent_component_id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanParentCalculator(otm=otm, graph=graph).transform() + # WHEN ParentCalculator::calculate_parents is invoked + ParentCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 2 @@ -78,14 +79,14 @@ def test_one_path_no_mapped_resources(self): otm = build_mocked_otm([child_component, parent_component]) # AND a graph with an indirect relationship between the child and the parent - graph = build_graph([ + graph = build_tfgraph([ (child_component_id, 'non_mapped_component_id'), ('non_mapped_component_id', parent_component_id), (parent_component_id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanParentCalculator(otm=otm, graph=graph).transform() + # WHEN ParentCalculator::calculate_parents is invoked + ParentCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 2 @@ -116,14 +117,14 @@ def test_two_paths_only_one_straight(self): otm = build_mocked_otm([child_component, parent_component, grandparent_component]) # AND a graph a two overlapped paths between a child and a parent - graph = build_graph([ + graph = build_tfgraph([ (child_component_id, parent_component_id), (parent_component_id, grandparent_component_id), (grandparent_component_id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanParentCalculator(otm=otm, graph=graph).transform() + # WHEN ParentCalculator::calculate_parents is invoked + ParentCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 3 @@ -150,15 +151,15 @@ def test_two_straight_paths_different_lengths(self): otm = build_mocked_otm([child_component, parent_component]) # AND a graph a two overlapped paths between a child and a parent - graph = build_graph([ + graph = build_tfgraph([ (child_component_id, parent_component_id), (child_component_id, 'non_mapped_component_id'), ('non_mapped_component_id', parent_component_id), (parent_component_id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanParentCalculator(otm=otm, graph=graph).transform() + # WHEN ParentCalculator::calculate_parents is invoked + ParentCalculator(otm=otm, graph=graph).transform() # THEN no extra components were added assert len(otm.components) == 2 @@ -189,15 +190,15 @@ def test_two_straight_paths_same_lengths(self): otm = build_mocked_otm([child_component, parent_component_1, parent_component_2]) # AND a graph a two paths from the same child to two parents - graph = build_graph([ + graph = build_tfgraph([ (child_component.id, parent_component_1.id), (child_component.id, parent_component_2.id), (parent_component_1.id, None), (parent_component_2.id, None) ]) - # WHEN TfplanParentCalculator::calculate_parents is invoked - TfplanParentCalculator(otm=otm, graph=graph).transform() + # WHEN ParentCalculator::calculate_parents is invoked + ParentCalculator(otm=otm, graph=graph).transform() # THEN the child component is duplicated assert len(otm.components) == 4 diff --git a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_singleton_transformer.py b/slp_tfplan/tests/unit/transformers/test_singleton_transformer.py similarity index 91% rename from slp_tf/tests/unit/tfplan/transformers/test_tfplan_singleton_transformer.py rename to slp_tfplan/tests/unit/transformers/test_singleton_transformer.py index 5ef57ee8..456a7157 100644 --- a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_singleton_transformer.py +++ b/slp_tfplan/tests/unit/transformers/test_singleton_transformer.py @@ -1,8 +1,8 @@ from random import randrange from otm.otm.entity.parent_type import ParentType -from slp_tf.slp_tf.tfplan.transformers.tfplan_singleton_transformer import TfplanSingletonTransformer -from slp_tf.tests.unit.tfplan.otm_graph_util import DEFAULT_TRUSTZONE, build_otm_type, \ +from slp_tfplan.slp_tfplan.transformers.singleton_transformer import SingletonTransformer +from slp_tfplan.tests.util.builders import DEFAULT_TRUSTZONE, build_otm_type, \ build_mocked_tfplan_component, build_mocked_otm @@ -13,7 +13,7 @@ def _merge_component_configurations(components) -> {}: return merge_configuration -class TestTfplanSingletonTransformer: +class TestSingletonTransformer: def test_none_components(self): """ @@ -21,8 +21,8 @@ def test_none_components(self): """ # GIVEN an OTM without components otm = build_mocked_otm([]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN none exception is raised assert True @@ -41,8 +41,8 @@ def test_one_components_singleton(self): otm = build_mocked_otm([first_component]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN nothing happens assert len(otm.components) == 1 @@ -85,8 +85,8 @@ def test_singleton_is_parent(self): otm = build_mocked_otm([component_a, component_b, component_c, component_d]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN Singleton logic should unify only (A,B) assert len(otm.components) == 3 @@ -124,8 +124,8 @@ def test_two_components_singleton_with_same_parents_and_none_dataflows(self): components = [first_component, second_component] otm = build_mocked_otm(components) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() expected_configuration = _merge_component_configurations(components) @@ -170,8 +170,8 @@ def test_two_components_singleton_with_different_parents_and_none_dataflows(self otm = build_mocked_otm([first_component, second_component]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN nothing happens assert len(otm.components) == 2 @@ -200,8 +200,8 @@ def test_two_components_but_only_one_singleton_with_same_parents_and_none_datafl otm = build_mocked_otm([first_component, second_component]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN nothing happens assert len(otm.components) == 2 @@ -261,8 +261,8 @@ def test_four_components_grouped_by_different_parents_and_none_dataflows(self): otm = build_mocked_otm([first_component_parent_a, second_component_parent_a, first_component_parent_b, second_component_parent_b]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() expected_configuration_parent_a \ = _merge_component_configurations([first_component_parent_a, second_component_parent_a]) @@ -326,8 +326,8 @@ def test_two_components_singleton_with_same_parents_different_tags_and_none_data components = [first_component, second_component] otm = build_mocked_otm(components) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() expected_configuration = _merge_component_configurations(components) @@ -358,7 +358,7 @@ def test_random_number_of_singleton_components_with_same_parents(self): component_configuration = {"singleton": True} components = [] - for index in range(randrange(50)): + for index in range(randrange(2, 50)): components.append(build_mocked_tfplan_component( { 'component_name': f'component_{index}', @@ -370,8 +370,8 @@ def test_random_number_of_singleton_components_with_same_parents(self): otm = build_mocked_otm(components) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() expected_configuration = _merge_component_configurations(components) diff --git a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_singleton_transformer_with_dataflows.py b/slp_tfplan/tests/unit/transformers/test_singleton_transformer_with_dataflows.py similarity index 85% rename from slp_tf/tests/unit/tfplan/transformers/test_tfplan_singleton_transformer_with_dataflows.py rename to slp_tfplan/tests/unit/transformers/test_singleton_transformer_with_dataflows.py index 8592cc53..ac163af0 100644 --- a/slp_tf/tests/unit/tfplan/transformers/test_tfplan_singleton_transformer_with_dataflows.py +++ b/slp_tfplan/tests/unit/transformers/test_singleton_transformer_with_dataflows.py @@ -2,9 +2,9 @@ from charset_normalizer.md import List from otm.otm.entity.dataflow import Dataflow -from slp_tf.slp_tf.tfplan.tfplan_objects import TfplanComponent -from slp_tf.slp_tf.tfplan.transformers.tfplan_singleton_transformer import TfplanSingletonTransformer -from slp_tf.tests.unit.tfplan.otm_graph_util import build_mocked_tfplan_component, \ +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent +from slp_tfplan.slp_tfplan.transformers.singleton_transformer import SingletonTransformer +from slp_tfplan.tests.util.builders import build_mocked_tfplan_component, \ build_mocked_dataflow, build_mocked_otm _component_a = build_mocked_tfplan_component({ @@ -38,7 +38,7 @@ _dataflow_c_b_bidirectional = build_mocked_dataflow(_component_c, _component_b, bidirectional=True) -class TestTfplanSingletonTransformerWithDataflows: +class TestSingletonTransformerWithDataflows: def test_component_to_component_dataflow(self): """ @@ -49,8 +49,8 @@ def test_component_to_component_dataflow(self): # GIVEN components with some dataflows otm = build_mocked_otm([_component_a, _component_c], [_dataflow_a_c]) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN nothing happens assert len(otm.dataflows) == 1 @@ -61,7 +61,7 @@ def test_component_to_component_dataflow(self): pytest.param([_component_a, _component_b, _component_c], [_dataflow_a_c], id="[A -> C]"), pytest.param([_component_a, _component_b, _component_c], [_dataflow_b_c], id="[B -> C]") ]) - def test_singleton_to_component_dataflow(self, components: List[TfplanComponent], dataflows: List[Dataflow]): + def test_singleton_to_component_dataflow(self, components: List[TFPlanComponent], dataflows: List[Dataflow]): """ Components singleton (A,B) has dataflows to C """ @@ -69,8 +69,8 @@ def test_singleton_to_component_dataflow(self, components: List[TfplanComponent] # GIVEN components with some dataflows otm = build_mocked_otm(components, dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN a unique dataflows exists between A -> C assert len(otm.dataflows) == 1 @@ -82,7 +82,7 @@ def test_singleton_to_component_dataflow(self, components: List[TfplanComponent] pytest.param([_component_a, _component_b, _component_c], [_dataflow_c_a], id="[C -> A]"), pytest.param([_component_a, _component_b, _component_c], [_dataflow_c_b], id="[C -> B]"), ]) - def test_component_to_singleton_dataflow(self, components: List[TfplanComponent], dataflows: List[Dataflow]): + def test_component_to_singleton_dataflow(self, components: List[TFPlanComponent], dataflows: List[Dataflow]): """ Components C has dataflows to singleton (A,B) """ @@ -90,8 +90,8 @@ def test_component_to_singleton_dataflow(self, components: List[TfplanComponent] # GIVEN components with some dataflows otm = build_mocked_otm(components, dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN a unique dataflows exist between C -> A assert len(otm.dataflows) == 1 @@ -107,7 +107,7 @@ def test_component_to_singleton_dataflow(self, components: List[TfplanComponent] [_dataflow_a_c, _dataflow_b_c_bidirectional], id="[A -> C and B <-> C]"), ]) def test_singleton_to_component_dataflow_bidirectional( - self, components: List[TfplanComponent], dataflows: List[Dataflow]): + self, components: List[TFPlanComponent], dataflows: List[Dataflow]): """ Components singleton (A,B) has some bidirectional dataflows to C """ @@ -115,8 +115,8 @@ def test_singleton_to_component_dataflow_bidirectional( # GIVEN components with some dataflows otm = build_mocked_otm(components, dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN a unique bidirectional dataflow exists between A -> C assert len(otm.dataflows) == 1 @@ -133,7 +133,7 @@ def test_singleton_to_component_dataflow_bidirectional( [_dataflow_c_a, _dataflow_c_b_bidirectional], id="[C -> A and C <-> B]"), ]) def test_component_to_singleton_dataflow_bidirectional( - self, components: List[TfplanComponent], dataflows: List[Dataflow]): + self, components: List[TFPlanComponent], dataflows: List[Dataflow]): """ Components C has some bidirectional dataflows to singleton (A,B) """ @@ -141,8 +141,8 @@ def test_component_to_singleton_dataflow_bidirectional( # GIVEN components with some dataflows otm = build_mocked_otm(components, dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN a unique bidirectional dataflow exists between C -> A assert len(otm.dataflows) == 1 @@ -161,7 +161,7 @@ def test_component_to_singleton_dataflow_bidirectional( [_dataflow_a_b, _dataflow_b_a], id="[A -> B and B -> A]") ]) def test_components_same_singleton( - self, components: List[TfplanComponent], dataflows: List[Dataflow]): + self, components: List[TFPlanComponent], dataflows: List[Dataflow]): """ Two components grouped by singleton (A,B) have dataflows between them """ @@ -169,8 +169,8 @@ def test_components_same_singleton( # GIVEN components with some dataflows otm = build_mocked_otm(components, dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN no dataflow is created assert len(otm.dataflows) == 0 @@ -189,8 +189,8 @@ def test_singleton_dataflow_with_tags(self): ] otm = build_mocked_otm([_component_a, _component_b, _component_c], dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN a unique bidirectional dataflow exists between A -> C with the following tags assert len(otm.dataflows) == 1 @@ -215,8 +215,8 @@ def test_singleton_dataflow_with_attributes(self): ] otm = build_mocked_otm([_component_a, _component_b, _component_c], dataflows) - # WHEN TfplanSingletonTransformer::transform is invoked - TfplanSingletonTransformer(otm).transform() + # WHEN SingletonTransformer::transform is invoked + SingletonTransformer(otm).transform() # THEN a unique bidirectional dataflow exists between A -> C with the following attributes assert len(otm.dataflows) == 1 diff --git a/slp_tfplan/tests/unit/validate/__init__.py b/slp_tfplan/tests/unit/validate/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/slp_tfplan/tests/unit/validate/test_tfplan_validator.py b/slp_tfplan/tests/unit/validate/test_tfplan_validator.py new file mode 100644 index 00000000..4c576c26 --- /dev/null +++ b/slp_tfplan/tests/unit/validate/test_tfplan_validator.py @@ -0,0 +1,130 @@ +import random +from typing import List + +import pytest +from pytest import mark, param, fixture + +from slp_base import IacFileNotValidError +from slp_tfplan.slp_tfplan.validate.tfplan_validator import TFPlanValidator +from sl_util.sl_util.str_utils import get_bytes +from slp_tfplan.tests.util.builders import create_artificial_file, MIN_FILE_SIZE, MAX_TFPLAN_FILE_SIZE, \ + MAX_TFGRAPH_FILE_SIZE + +MINIMUM_VALID_TFPLAN_SOURCE = get_bytes('{"planned_values":{"root_module":{"resources":[]}},"configuration":{}}', + 'utf-8') +MINIMUM_VALID_TFGRAPH_SOURCE = get_bytes('digraph {subgraph "root" {}}', 'utf-8') + +TFPLAN_VALID_MIME = 'application/json' +TFGRAPH_VALID_MIME = 'text/plain' +VALID_MIME_TYPES = [TFPLAN_VALID_MIME, TFGRAPH_VALID_MIME] + + +@fixture(autouse=True) +def mocked_mime_types(): + yield VALID_MIME_TYPES + + +@fixture +def mock_mime_checker(mocker, mocked_mime_types): + mocker.patch('magic.Magic.from_buffer', side_effect=mocked_mime_types) + + +class TestTFPlanValidator: + + def test_valid_tfplan_and_tfgraph(self): + # GIVEN a valid tfplan + tfplan = MINIMUM_VALID_TFPLAN_SOURCE + + # AND a valid tfgraph + tfgraph = MINIMUM_VALID_TFGRAPH_SOURCE + + # WHEN TFPlanValidator::validate is invoked + TFPlanValidator([tfplan, tfgraph]).validate() + + # THEN no error is raised + + @mark.parametrize('sources', [ + param([], id='no sources'), + param([MINIMUM_VALID_TFPLAN_SOURCE], id='missing one source'), + param([MINIMUM_VALID_TFPLAN_SOURCE] * random.randint(3, 10), id='more than two sources'), + ]) + def test_wrong_number_of_sources(self, sources: List[bytes]): + # GIVEN a wrong number of sources + + # WHEN TFPlanValidator::validate is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanValidator(sources).validate() + + # AND whose information is right + assert error.value.title == 'Wrong number of files' + assert error.value.message == 'Required one tfplan and one tfgraph files' + + def test_two_tfplan(self): + # GIVEN two tfplan files + sources = [MINIMUM_VALID_TFPLAN_SOURCE, MINIMUM_VALID_TFPLAN_SOURCE] + + # WHEN TFPlanValidator::validate is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanValidator(sources).validate() + + # AND whose information is right + assert error.value.title == 'Two tfplan files' + assert error.value.message == 'Required one tfplan and one tfgraph files' + + @mark.usefixtures('mock_mime_checker') + @mark.parametrize('sources', [ + param([create_artificial_file(MIN_FILE_SIZE - 1), MINIMUM_VALID_TFGRAPH_SOURCE], id='tfplan too small'), + param([create_artificial_file(MAX_TFPLAN_FILE_SIZE + 1), MINIMUM_VALID_TFGRAPH_SOURCE], id='tfplan too big'), + param([MINIMUM_VALID_TFPLAN_SOURCE, create_artificial_file(MIN_FILE_SIZE - 1)], id='tfgraph too small'), + param([MINIMUM_VALID_TFPLAN_SOURCE, create_artificial_file(MAX_TFGRAPH_FILE_SIZE + 1)], id='tfgraph too big') + ]) + def test_invalid_size(self, sources: List[bytes]): + # GIVEN a tfplan with an invalid size + + # WHEN TFPlanValidator::validate is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanValidator(sources).validate() + + # AND whose information is right + assert error.value.title == 'Terraform Plan file is not valid' + assert error.value.message == 'Provided iac_file is not valid. Invalid size' + + @mark.usefixtures('mock_mime_checker') + @mark.parametrize('mocked_mime_types', [ + param(['text/xml', 'text/plain'], id='tfplan wrong'), + param(['application/json', 'text/xml'], id='tfgraph wrong'), + param(['text/xml', 'text/xml'], id='both wrong') + ]) + def test_invalid_file_type(self, mocked_mime_types: List[str]): + # GIVEN a tfplan with an invalid size + mocked_sources = [create_artificial_file(len(MINIMUM_VALID_TFPLAN_SOURCE)), + create_artificial_file(len(MINIMUM_VALID_TFGRAPH_SOURCE))] + + # WHEN TFPlanValidator::validate is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanValidator(mocked_sources).validate() + + # AND whose information is right + assert error.value.title == 'Terraform Plan file is not valid' + assert error.value.message == 'Invalid content type for iac_file' + + @mark.parametrize('tfplan,tfgraph', [ + param(get_bytes('{"invalid": "tfplan"}'), MINIMUM_VALID_TFGRAPH_SOURCE, id='invalid tfplan'), + param(MINIMUM_VALID_TFPLAN_SOURCE, get_bytes('{"invalid": "tfgraph"}'), id='invalid tfgraph'), + param(get_bytes('{"invalid": "tfplan"}'), get_bytes('{"invalid": "tfgraph"}'), id='both invalid') + ]) + def test_wrong_sources(self, tfplan: bytes, tfgraph: bytes): + # GIVEN a valid tfgraph and wrong tfplan or vice-versa + + # WHEN TFPlanValidator::validate is invoked + # THEN a IacFileNotValidError is raised + with pytest.raises(IacFileNotValidError) as error: + TFPlanValidator([tfplan, tfgraph]).validate() + + # AND whose information is right + assert error.value.title == 'Terraform Plan file is not valid' + assert error.value.message == 'Invalid content type for iac_file' diff --git a/slp_tfplan/tests/util/__init__.py b/slp_tfplan/tests/util/__init__.py new file mode 100644 index 00000000..e69de29b diff --git a/slp_tfplan/tests/util/asserts.py b/slp_tfplan/tests/util/asserts.py new file mode 100644 index 00000000..fdc965a5 --- /dev/null +++ b/slp_tfplan/tests/util/asserts.py @@ -0,0 +1,36 @@ +from otm.otm.entity.parent_type import ParentType +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent +from slp_tfplan.tests.util.builders import DEFAULT_TRUSTZONE + + +####### +# OTM # +####### + +def assert_parents(components: [TFPlanComponent], relationships: dict = None): + for component in components: + assert_parent(component=component, parent_id=relationships.get(component.id)) + + +def assert_parent(component: TFPlanComponent, parent_id: str = None): + if parent_id: + assert component.parent_type == ParentType.COMPONENT + assert component.parent == parent_id + else: + assert component.parent_type == ParentType.TRUST_ZONE + assert component.parent == DEFAULT_TRUSTZONE.id + + +########## +# TFPLAN # +########## +def assert_common_properties(properties: {}): + assert properties['resource_mode'] == 'managed' + assert properties['resource_provider_name'] == 'registry.terraform.io/hashicorp/aws' + assert properties['resource_schema_version'] == 0 + assert properties['val1'] == 'value1' + assert properties['senval1'] == 'value1' + + +def assert_resource_id(resource: {}): + assert resource['resource_id'] == resource['properties']['resource_address'] diff --git a/slp_tfplan/tests/util/builders.py b/slp_tfplan/tests/util/builders.py new file mode 100644 index 00000000..c3bd3b43 --- /dev/null +++ b/slp_tfplan/tests/util/builders.py @@ -0,0 +1,182 @@ +from copy import deepcopy +from typing import List, Dict, Tuple + +from networkx import DiGraph + +from otm.otm.entity.dataflow import Dataflow +from otm.otm.entity.parent_type import ParentType +from otm.otm.entity.trustzone import Trustzone +from slp_tfplan.slp_tfplan.objects.tfplan_objects import TFPlanComponent, TFPlanOTM, SecurityGroup, \ + LaunchTemplate + +DEFAULT_TRUSTZONE = Trustzone( + trustzone_id='default-trustzone-id', + name='default-trustzone-name', + type='default-trustzone-type') + +TFPLAN_MINIMUM_STRUCTURE = {'planned_values': {'root_module': {}}} +MIN_FILE_SIZE = 20 +MAX_TFPLAN_FILE_SIZE = 5 * 1024 * 1024 # 5MB +MAX_TFGRAPH_FILE_SIZE = 2 * 1024 * 1024 # 2MB + + +####### +# OTM # +####### + +def build_mocked_otm(components: List[TFPlanComponent], + dataflows: List[Dataflow] = None, + security_groups: List[SecurityGroup] = None, + launch_templates: List[LaunchTemplate] = None) -> {}: + otm = build_base_otm(DEFAULT_TRUSTZONE) + otm.components = components or [] + otm.security_groups = security_groups or [] + otm.launch_templates = launch_templates or [] + otm.dataflows = dataflows or [] + return otm + + +def build_base_otm(default_trustzone: Trustzone = None): + otm = TFPlanOTM( + project_id='project_id', + project_name='project_name', + components=[], + security_groups=[], + launch_templates=[], + dataflows=[], + ) + if default_trustzone: + otm.default_trustzone = default_trustzone + + return otm + + +def build_mocked_tfplan_component(component: {}) -> TFPlanComponent: + component_name = component['component_name'] + tf_type = component['tf_type'] + component_id = build_component_id(component_name, tf_type) + return TFPlanComponent( + component_id=component_id, + name=component_name, + component_type=component.get('component_type', build_otm_type(tf_type)), + parent=component.get('parent_id', DEFAULT_TRUSTZONE.id), + parent_type=component.get('parent_type', ParentType.TRUST_ZONE), + tags=component.get('tags', [tf_type]), + tf_resource_id=component_id, + tf_type=tf_type, + configuration=component.get('configuration', {})) + + +def build_mocked_dataflow( + component_a: TFPlanComponent, component_b: TFPlanComponent, + bidirectional: bool = False, attributes=None, tags=None): + return Dataflow( + f"{component_a.id} -> {component_b.id}", + f"{component_a.name} to {component_b.name}", + component_a.id, component_b.id, + bidirectional=bidirectional, attributes=attributes, tags=tags) + + +def build_component_node(component_id: str) -> str: + return f'[root] {component_id} (expand)' + + +def build_component_id(base_name: str, component_type: str) -> str: + return f'{component_type}.{base_name}' + + +def build_otm_type(component_type: str) -> str: + return f'{component_type}-otm-type' + + +########## +# TFPLAN # +########## + +def build_tfplan(resources: List[Dict] = None, child_modules: List[Dict] = None) -> {}: + tfplan = deepcopy(TFPLAN_MINIMUM_STRUCTURE) + + if resources: + tfplan['planned_values']['root_module']['resources'] = resources + + if child_modules: + tfplan['planned_values']['root_module']['child_modules'] = child_modules + + return tfplan + + +def generate_resources(resource_count: int, module_child: bool = False) -> List[Dict]: + resources = [] + for i in range(1, resource_count + 1): + resource = { + 'address': f'r{i}-addr', + 'mode': 'managed', + 'type': f'r{i}-type', + 'name': f'r{i}-name', + 'provider_name': 'registry.terraform.io/hashicorp/aws', + 'schema_version': 0, + 'values': { + 'val1': 'value1', + 'val2': 'value2', + }, + 'sensitive_values': { + 'senval1': 'value1', + 'senval2': 'value2', + } + } + + if module_child: + resource['index'] = '0' + + resources.append(resource) + + return resources + + +def generate_child_modules(module_count: int, + child_modules: List[Dict] = None, + resource_count: int = None) -> List[Dict]: + modules = [] + for i in range(1, module_count + 1): + module = { + 'address': f'cm{i}-addr', + } + + if child_modules: + module['child_modules'] = child_modules + + if resource_count: + module['resources'] = generate_resources(resource_count, True) + + modules.append(module) + + return modules + + +########### +# TFGRAPH # +########### + +def build_tfgraph(relationships: List[Tuple] = None) -> DiGraph: + graph = DiGraph() + + if not relationships: + return graph + + for relationship in relationships: + resource_id = relationship[0] + graph.add_node(build_component_node(resource_id), label=resource_id) + + for resource_id, parent_id in relationships: + if parent_id != DEFAULT_TRUSTZONE.id: + graph.add_edge(build_component_node(resource_id), build_component_node(parent_id)) + + return graph + + +########### +# GENERIC # +########### + +def create_artificial_file(size: int) -> bytes: + return bytes('A' * size, 'utf-8') diff --git a/slp_visio/slp_visio/validate/visio_validator.py b/slp_visio/slp_visio/validate/visio_validator.py index db88fb3c..f5c28612 100644 --- a/slp_visio/slp_visio/validate/visio_validator.py +++ b/slp_visio/slp_visio/validate/visio_validator.py @@ -2,7 +2,7 @@ import os from zipfile import ZipFile -import magic as magik +from sl_util.sl_util.file_utils import get_file_type_by_name from slp_base import ProviderValidator, DiagramFileNotValidError, DiagramType from slp_base.slp_base.provider_validator import generate_content_type_error, generate_size_error @@ -30,17 +30,13 @@ def __validate_size(self): if size > MAX_SIZE or size < MIN_SIZE: raise generate_size_error(self.provider, 'diag_file', DiagramFileNotValidError) - def __get_mime_type(self): - magic = magik.Magic(mime=True) - return magic.from_file(self.file.name) - def __validate_content_type(self): - mime = self.__get_mime_type() + mime = get_file_type_by_name(self.file.name) if mime not in self.provider.valid_mime: raise generate_content_type_error(self.provider, 'diag_file', DiagramFileNotValidError) def __validate_zip_content(self): - mime = self.__get_mime_type() + mime = get_file_type_by_name(self.file.name) if 'application/zip' == mime: with ZipFile(self.file.name) as myzip: if not any("[Content_Types].xml" == file.filename for file in myzip.filelist): diff --git a/slp_visio/tests/integration/test_visio_processor.py b/slp_visio/tests/integration/test_visio_processor.py index e2ed2b5d..44fd9c76 100644 --- a/slp_visio/tests/integration/test_visio_processor.py +++ b/slp_visio/tests/integration/test_visio_processor.py @@ -1,7 +1,7 @@ import pytest from pytest import mark -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base import DiagramFileNotValidError from slp_base.tests.util.otm import validate_and_compare_otm, validate_and_compare from slp_visio.slp_visio.visio_processor import VisioProcessor @@ -27,7 +27,7 @@ class TestVisioProcessor: ]) def test_empties(self, vsdx, mapping): visio_file = open(vsdx, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() assert len(otm.trustzones) == 0 assert len(otm.components) == 0 @@ -43,7 +43,7 @@ def test_aws_shapes(self, mapping): "project-id", "project-name", visio_file, - [get_data(mapping)], + [get_byte_data(mapping)], ).process() result, expected = validate_and_compare_otm(otm.json(), expected_aws_shapes, None) assert result == expected @@ -54,7 +54,7 @@ def test_aws_shapes(self, mapping): ]) def test_generic_elements(self, mapping): visio_file = open(test_resource_paths.visio_generic_shapes, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_generic_shapes, None) assert result == expected @@ -64,7 +64,7 @@ def test_generic_elements(self, mapping): ]) def test_self_pointing_connectors(self, mapping): visio_file = open(test_resource_paths.visio_self_pointing_connectors, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_self_pointing_connectors, None) assert result == expected @@ -74,7 +74,7 @@ def test_self_pointing_connectors(self, mapping): ]) def test_extraneous_elements(self, mapping): visio_file = open(test_resource_paths.visio_extraneous_elements, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_extraneous_elements, None) assert result == expected @@ -84,7 +84,7 @@ def test_extraneous_elements(self, mapping): ]) def test_simple_boundary_tzs(self, mapping): visio_file = open(test_resource_paths.visio_simple_boundary_tzs, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_simple_boundary_tzs, None) assert result == expected @@ -94,7 +94,7 @@ def test_simple_boundary_tzs(self, mapping): ]) def test_boundary_tz_and_default_tz(self, mapping): visio_file = open(test_resource_paths.visio_boundary_tz_and_default_tz, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_boundary_tz_and_default_tz, None) assert result == expected @@ -108,7 +108,7 @@ def test_overlapped_boundary_tzs(self, mapping): "project-id", "project-name", visio_file, - [get_data(mapping)], + [get_byte_data(mapping)], ).process() result, expected = validate_and_compare_otm(otm.json(), expected_overlapped_boundary_tzs, None) assert result == expected @@ -119,7 +119,7 @@ def test_overlapped_boundary_tzs(self, mapping): ]) def test_visio_boundary_and_component_tzs(self, mapping): visio_file = open(test_resource_paths.visio_boundary_and_component_tzs, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_boundary_and_component_tzs, None) assert result == expected @@ -129,7 +129,7 @@ def test_visio_boundary_and_component_tzs(self, mapping): ]) def test_multiple_pages_diagram(self, mapping): visio_file = open(test_resource_paths.visio_multiple_pages_diagram, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_multiple_pages_diagram, None) assert result == expected @@ -139,7 +139,7 @@ def test_multiple_pages_diagram(self, mapping): ]) def test_complex_diagram(self, mapping): visio_file = open(test_resource_paths.visio_aws_with_tz_and_vpc, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_aws_with_tz_and_vpc, None) assert result == expected @@ -149,7 +149,7 @@ def test_complex_diagram(self, mapping): ]) def test_prune_orphan_connectors(self, mapping): visio_file = open(test_resource_paths.visio_orphan_dataflows, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_orphan_dataflows, None) assert result == expected @@ -159,7 +159,7 @@ def test_prune_orphan_connectors(self, mapping): ]) def test_bidirectional_connectors(self, mapping): visio_file = open(test_resource_paths.visio_bidirectional_connectors, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_bidirectional_connectors, None) assert result == expected @@ -169,7 +169,7 @@ def test_bidirectional_connectors(self, mapping): ]) def test_manually_modified_connectors(self, mapping): visio_file = open(test_resource_paths.visio_modified_single_connectors, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), expected_visio_modified_single_connectors, None) assert result == expected @@ -186,7 +186,7 @@ def test_dataflows_connecting_trust_zones(self, vsdx, expected): "project-id", "project-name", visio_file, - [get_data(test_resource_paths.default_visio_mapping)], + [get_byte_data(test_resource_paths.default_visio_mapping)], ).process() result, expected = validate_and_compare(otm, expected, None) @@ -205,7 +205,7 @@ def test_nested_trust_zones(self, vsdx, expected): "project-id", "project-name", visio_file, - [get_data(default_visio_mapping)], + [get_byte_data(default_visio_mapping)], ).process() # Then the otm should be the expected @@ -218,7 +218,7 @@ def test_nested_trust_zones(self, vsdx, expected): ]) def test_master_unique_id(self, mapping): visio_file = open(test_resource_paths.master_unique_id, "r") - otm = VisioProcessor("project-id", "project-name", visio_file, [get_data(mapping)]).process() + otm = VisioProcessor("project-id", "project-name", visio_file, [get_byte_data(mapping)]).process() result, expected = validate_and_compare_otm(otm.json(), test_resource_paths.expected_master_unique_id, None) assert result == expected @@ -227,7 +227,7 @@ def test_temporary_file_not_created(self): source = open(test_resource_paths.visio_aws_shapes, "r") # When the processor is instanced - processor = VisioProcessor("project-id", "project-name", source, [get_data(default_visio_mapping)]) + processor = VisioProcessor("project-id", "project-name", source, [get_byte_data(default_visio_mapping)]) # Then the original file is being used assert file_exists(processor.source.name) @@ -245,7 +245,7 @@ def test_temporary_file_is_deleted(self): source = get_upload_file(test_resource_paths.visio_aws_shapes) # When the processor is instanced - processor = VisioProcessor("project-id", "project-name", source, [get_data(default_visio_mapping)]) + processor = VisioProcessor("project-id", "project-name", source, [get_byte_data(default_visio_mapping)]) # Then a temporary file is created assert file_exists(processor.source.name) @@ -263,7 +263,7 @@ def test_temporary_file_is_deleted_when_exception(self): source = get_upload_file(test_resource_paths.visio_invalid_file_size) # When the processor is instanced - processor = VisioProcessor("project-id", "project-name", source, [get_data(default_visio_mapping)]) + processor = VisioProcessor("project-id", "project-name", source, [get_byte_data(default_visio_mapping)]) # Then a temporary file is created assert file_exists(processor.source.name) diff --git a/startleft/resources/api/v1/swagger.yaml b/startleft/resources/api/v1/swagger.yaml index fb5bf91f..4afd070a 100644 --- a/startleft/resources/api/v1/swagger.yaml +++ b/startleft/resources/api/v1/swagger.yaml @@ -295,6 +295,7 @@ components: enum: - CLOUDFORMATION - TERRAFORM + - TFPLAN type: string description: Type of IaC file example: TERRAFORM diff --git a/startleft/startleft/cli/cli.py b/startleft/startleft/cli/cli.py index 6f5a9047..427e3dac 100644 --- a/startleft/startleft/cli/cli.py +++ b/startleft/startleft/cli/cli.py @@ -7,7 +7,7 @@ from _sl_build.modules import PROCESSORS from otm.otm.entity.otm import OTM -from sl_util.sl_util.file_utils import get_data, get_byte_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base import CommonError from slp_base import DiagramType, OTMGenerationError, EtmType from slp_base import IacType @@ -85,9 +85,9 @@ def parse_iac(iac_type, mapping_file, output_file, project_name, project_id, iac logger.info("Parsing IaC source files into OTM") iac_data = [] for iac_file in iac_files: - iac_data.append(get_data(iac_file)) + iac_data.append(get_byte_data(iac_file)) - mapping_data = [get_data(mapping_file)] + mapping_data = [get_byte_data(mapping_file)] processor = provider_resolver.get_processor(IacType(iac_type.upper()), project_id, project_name, iac_data, mapping_data) @@ -105,10 +105,10 @@ def parse_diagram(diagram_type, default_mapping_file, custom_mapping_file, outpu type_ = DiagramType(diagram_type.upper()) file = open(diag_file[0], "r") - mapping_data_list = [get_data(default_mapping_file)] + mapping_data_list = [get_byte_data(default_mapping_file)] if custom_mapping_file: - mapping_data_list.append(get_data(custom_mapping_file)) + mapping_data_list.append(get_byte_data(custom_mapping_file)) processor = provider_resolver.get_processor(type_, project_id, project_name, file, mapping_data_list, diag_type=type_) @@ -125,10 +125,10 @@ def parse_etm(etm_type, default_mapping_file, custom_mapping_file, output_file, type_ = EtmType(etm_type.upper()) file = get_byte_data(etm_file[0]) - mapping_data_list = [get_data(default_mapping_file)] + mapping_data_list = [get_byte_data(default_mapping_file)] if custom_mapping_file: - mapping_data_list.append(get_data(custom_mapping_file)) + mapping_data_list.append(get_byte_data(custom_mapping_file)) processor = provider_resolver.get_processor(type_, project_id, project_name, file, mapping_data_list) otm = processor.process() @@ -232,7 +232,7 @@ def search(iac_type, query, source_file): Searches source files for the given query """ logger.info("Running JMESPath search query against the IaC file") - get_iac_searcher(iac_type, [get_data(sf) for sf in source_file]).search(query) + get_iac_searcher(iac_type, [get_byte_data(sf) for sf in source_file]).search(query) @cli.command() diff --git a/startleft/startleft/messages.py b/startleft/startleft/messages.py index 88c509e3..6e2c62f6 100644 --- a/startleft/startleft/messages.py +++ b/startleft/startleft/messages.py @@ -27,7 +27,7 @@ IAC_TYPE_NAME = '--iac-type' IAC_TYPE_SHORTNAME = '-t' IAC_TYPE_DESC = 'The IaC file type.' -IAC_TYPE_SUPPORTED = ['CLOUDFORMATION', 'TERRAFORM'] +IAC_TYPE_SUPPORTED = ['CLOUDFORMATION', 'TERRAFORM', 'TFPLAN'] DIAGRAM_TYPE_NAME = '--diagram-type' DIAGRAM_TYPE_SHORTNAME = '-g' diff --git a/tests/unit/test_otm_unifier.py b/tests/unit/test_otm_unifier.py index d4d9e343..711310e6 100644 --- a/tests/unit/test_otm_unifier.py +++ b/tests/unit/test_otm_unifier.py @@ -5,7 +5,7 @@ from otm.otm.entity.trustzone import Trustzone from otm.otm.otm_builder import OTMBuilder from otm.otm.provider import Provider -from sl_util.sl_util.file_utils import get_data +from sl_util.sl_util.file_utils import get_byte_data from slp_base.slp_base.otm_trustzone_unifier import OTMTrustZoneUnifier from tests.resources.test_resource_paths import MTMT_multiple_trustzones_same_type_ID @@ -38,7 +38,7 @@ def test_multiple_trustzones_same_type(self): .build() # AND the expected otm without tz type field - expected = json.loads(get_data(MTMT_multiple_trustzones_same_type_ID)) + expected = json.loads(get_byte_data(MTMT_multiple_trustzones_same_type_ID)) # WHEN we unify the trust zones OTMTrustZoneUnifier(origin).unify()