diff --git a/docs/resources/rules_settings.md b/docs/resources/rules_settings.md index 66d3691..51d6e29 100644 --- a/docs/resources/rules_settings.md +++ b/docs/resources/rules_settings.md @@ -96,7 +96,6 @@ resource "wallarm_rules_settings" "rules_settings" { open_vulns_weight = 9 serialized_data_weight = 6 risk_score_algo = "maximum" - pii_fallback = false } ``` @@ -119,7 +118,6 @@ resource "wallarm_rules_settings" "rules_settings" { * `open_vulns_weight` - (optional) [risk score][1] weight of active vulnerabilities. Active vulnerabilities may result in unauthorized data access or corruption. * `serialized_data_weight` - (optional) [risk score][1] weight of accepting XML / JSON objects. XML / JSON objects are often used to transfer malicious payloads to attack servers. * `risk_score_algo` - (optional) method of [risk score][1] calculation. Specify how the risk score calculation should be performed. Available values: maximum, average. -* `pii_fallback` - (optional) defines whether fallback mechanism for PII detection is active. [1]: https://docs.wallarm.com/api-discovery/overview/#endpoint-risk-score [2]: https://docs.wallarm.com/user-guides/rules/rules/ diff --git a/examples/wallarm_rules_settings.tf b/examples/wallarm_rules_settings.tf index f675f47..9beb226 100644 --- a/examples/wallarm_rules_settings.tf +++ b/examples/wallarm_rules_settings.tf @@ -16,5 +16,4 @@ resource "wallarm_rules_settings" "rules_settings" { open_vulns_weight = 9 serialized_data_weight = 6 risk_score_algo = "maximum" - pii_fallback = false } diff --git a/wallarm/resource_rule_binary_data.go b/wallarm/resource_rule_binary_data.go index 9051cf9..cc7f561 100644 --- a/wallarm/resource_rule_binary_data.go +++ b/wallarm/resource_rule_binary_data.go @@ -266,7 +266,7 @@ func resourceWallarmBinaryDataRead(d *schema.ResourceData, m interface{}) error OrderDesc: true, Filter: &wallarm.HintFilter{ Clientid: []int{clientID}, - ActionID: []int{actionID}, + ID: []int{ruleID}, Type: []string{"binary_data"}, }, } diff --git a/wallarm/resource_rule_bola_counter_test.go b/wallarm/resource_rule_bola_counter_test.go index 295f352..fad29a7 100644 --- a/wallarm/resource_rule_bola_counter_test.go +++ b/wallarm/resource_rule_bola_counter_test.go @@ -2,6 +2,7 @@ package wallarm import ( "fmt" + "os" "regexp" "strconv" "testing" @@ -13,6 +14,9 @@ import ( ) func TestAccRuleBolaCounterCreate(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_bola_counter." + rnd resource.Test(t, resource.TestCase{ @@ -24,7 +28,7 @@ func TestAccRuleBolaCounterCreate(t *testing.T) { Config: testAccRuleBolaCounterCreate(rnd), Check: resource.ComposeTestCheckFunc( resource.TestCheckResourceAttr(name, "action.#", "3"), - resource.TestMatchResourceAttr(name, "counter", regexp.MustCompile("^d:.+")), + resource.TestMatchResourceAttr(name, "counter", regexp.MustCompile("^i:.+")), ), ExpectNonEmptyPlan: true, }, diff --git a/wallarm/resource_rule_brute_counter_test.go b/wallarm/resource_rule_brute_counter_test.go index 49e5eba..9eaa92d 100644 --- a/wallarm/resource_rule_brute_counter_test.go +++ b/wallarm/resource_rule_brute_counter_test.go @@ -2,6 +2,7 @@ package wallarm import ( "fmt" + "os" "regexp" "testing" @@ -9,6 +10,9 @@ import ( ) func TestAccRuleBruteForceCounterCreate(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_bruteforce_counter." + rnd resource.Test(t, resource.TestCase{ diff --git a/wallarm/resource_rule_dirbust_counter_test.go b/wallarm/resource_rule_dirbust_counter_test.go index 9226219..29cecfa 100644 --- a/wallarm/resource_rule_dirbust_counter_test.go +++ b/wallarm/resource_rule_dirbust_counter_test.go @@ -2,6 +2,7 @@ package wallarm import ( "fmt" + "os" "regexp" "strconv" "testing" @@ -13,6 +14,9 @@ import ( ) func TestAccRuleDirbustCounterCreate(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_dirbust_counter." + rnd resource.Test(t, resource.TestCase{ diff --git a/wallarm/resource_rule_disable_attack_type_test.go b/wallarm/resource_rule_disable_attack_type_test.go index 15d03ff..df2e291 100644 --- a/wallarm/resource_rule_disable_attack_type_test.go +++ b/wallarm/resource_rule_disable_attack_type_test.go @@ -2,7 +2,6 @@ package wallarm import ( "fmt" - "regexp" "strconv" "testing" @@ -34,20 +33,6 @@ func TestAccRuleDisableAttackTypeCreate_Basic(t *testing.T) { }) } -func TestAccRuleDisableAttackTypeCreate_IncorrectAttackType(t *testing.T) { - rnd := generateRandomResourceName(5) - resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, - Providers: testAccProviders, - Steps: []resource.TestStep{ - { - Config: testWallarmRuleDisableAttackTypeBasicConfig(rnd, "incorrect", "iequal", "attack-types.wallarm.com", "HOST", `["post"],["form_urlencoded","query"]`), - ExpectError: regexp.MustCompile(`config is invalid: expected attack_type to be one of \[sqli xss rce ptrav crlf nosqli xxe ldapi scanner ssti ssi mail_injection vpatch\], got incorrect`), - }, - }, - }) -} - func TestAccRuleDisableAttackTypeCreateRecreate(t *testing.T) { rnd := generateRandomResourceName(5) name := "wallarm_rule_disable_attack_type." + rnd diff --git a/wallarm/resource_rule_ignore_regex.go b/wallarm/resource_rule_ignore_regex.go index 4b57280..3edfb1d 100644 --- a/wallarm/resource_rule_ignore_regex.go +++ b/wallarm/resource_rule_ignore_regex.go @@ -275,7 +275,7 @@ func resourceWallarmIgnoreRegexRead(d *schema.ResourceData, m interface{}) error OrderDesc: true, Filter: &wallarm.HintFilter{ Clientid: []int{clientID}, - ActionID: []int{actionID}, + ID: []int{ruleID}, }, } actionHints, err := client.HintRead(hint) diff --git a/wallarm/resource_rule_overlimit_res_settings.go b/wallarm/resource_rule_overlimit_res_settings.go index b73fee5..87c42b7 100644 --- a/wallarm/resource_rule_overlimit_res_settings.go +++ b/wallarm/resource_rule_overlimit_res_settings.go @@ -360,7 +360,7 @@ func resourceWallarmOverlimitResSettingsImport(d *schema.ResourceData, m interfa } d.Set("action_id", actionID) d.Set("rule_id", ruleID) - d.Set("rule_type", "rate_limit") + d.Set("rule_type", "overlimit_res_settings") hint := &wallarm.HintRead{ Limit: 1000, @@ -370,7 +370,7 @@ func resourceWallarmOverlimitResSettingsImport(d *schema.ResourceData, m interfa Filter: &wallarm.HintFilter{ Clientid: []int{clientID}, ID: []int{ruleID}, - Type: []string{"rate_limit"}, + Type: []string{"overlimit_res_settings"}, }, } actionHints, err := client.HintRead(hint) diff --git a/wallarm/resource_rule_overlimit_res_settings_test.go b/wallarm/resource_rule_overlimit_res_settings_test.go index eb734b9..56efaa5 100644 --- a/wallarm/resource_rule_overlimit_res_settings_test.go +++ b/wallarm/resource_rule_overlimit_res_settings_test.go @@ -21,7 +21,7 @@ func TestAccOverlimitResSettings(t *testing.T) { { Config: testAccRuleOverlimitResSettings(resourceName), Check: resource.ComposeTestCheckFunc( - resource.TestCheckResourceAttr(resourceAddress, "overlimit_time", "2000"), + resource.TestCheckResourceAttr(resourceAddress, "overlimit_time", "1000"), resource.TestCheckResourceAttr(resourceAddress, "mode", "monitoring"), ), }, @@ -33,7 +33,7 @@ func testAccRuleOverlimitResSettings(resourceName string) string { return fmt.Sprintf(` resource "wallarm_rule_overlimit_res_settings" %[1]q { - mode = "blocking" + mode = "monitoring" overlimit_time = 1000 action { type = "iequal" diff --git a/wallarm/resource_rule_parser_state_test.go b/wallarm/resource_rule_parser_state_test.go index f3da436..ecad8ad 100644 --- a/wallarm/resource_rule_parser_state_test.go +++ b/wallarm/resource_rule_parser_state_test.go @@ -49,20 +49,6 @@ func TestAccRuleParserStateCreate_IncorrectState(t *testing.T) { }) } -func TestAccRuleParserStateCreate_IncorrectParser(t *testing.T) { - rnd := generateRandomResourceName(5) - resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, - Providers: testAccProviders, - Steps: []resource.TestStep{ - { - Config: testWallarmRuleParserStateBasicConfig(rnd, "incorrect", "enabled", "iequal", "parsers.wallarm.com", "HOST", `["post"],["form_urlencoded","query"]`), - ExpectError: regexp.MustCompile(`config is invalid: expected parser to be one of \[base64 cookie form_urlencoded gzip grpc json_doc multipart percent protobuf htmljs viewstate xml\], got incorrect`), - }, - }, - }) -} - func TestAccRuleParserStateCreateRecreate(t *testing.T) { rnd := generateRandomResourceName(5) name := "wallarm_rule_parser_state." + rnd diff --git a/wallarm/resource_rule_rate_limit.go b/wallarm/resource_rule_rate_limit.go index 504077e..6a4289f 100644 --- a/wallarm/resource_rule_rate_limit.go +++ b/wallarm/resource_rule_rate_limit.go @@ -188,7 +188,7 @@ func resourceWallarmRateLimit() *schema.Resource { "delay": { Type: schema.TypeInt, ForceNew: true, - Required: true, + Optional: true, ValidateFunc: validation.IntBetween(0, 1000), }, diff --git a/wallarm/resource_rule_rate_limit_test.go b/wallarm/resource_rule_rate_limit_test.go index ad22565..f80b446 100644 --- a/wallarm/resource_rule_rate_limit_test.go +++ b/wallarm/resource_rule_rate_limit_test.go @@ -35,7 +35,6 @@ func testAccRuleRateLimit(resourceName string) string { resource "wallarm_rule_rate_limit" %[1]q { point = [["header", "HOST"]] - cred_stuff_type = "custom" action { type = "iequal" value = "example.com" @@ -45,7 +44,7 @@ resource "wallarm_rule_rate_limit" %[1]q { } comment = "My TF Rate Limit 5" - delay = 50 + delay = 100 burst = 20 rate = 300 rsp_status = 500 diff --git a/wallarm/resource_rule_regex.go b/wallarm/resource_rule_regex.go index 451b4c0..970e073 100644 --- a/wallarm/resource_rule_regex.go +++ b/wallarm/resource_rule_regex.go @@ -68,8 +68,6 @@ func resourceWallarmRegex() *schema.Resource { Type: schema.TypeString, Required: true, ForceNew: true, - ValidateFunc: validation.StringInSlice([]string{"any", "sqli", "rce", "crlf", "nosqli", "ptrav", - "xxe", "ptrav", "xss", "scanner", "redir", "ldapi", "vpatch"}, false), }, "action": { diff --git a/wallarm/resource_rule_set_response_header.go b/wallarm/resource_rule_set_response_header.go index 210993c..ceac093 100644 --- a/wallarm/resource_rule_set_response_header.go +++ b/wallarm/resource_rule_set_response_header.go @@ -63,17 +63,20 @@ func resourceWallarmSetResponseHeader() *schema.Resource { "mode": { Type: schema.TypeString, Required: true, + ForceNew: true, ValidateFunc: validation.StringInSlice([]string{"append", "replace"}, false), }, "name": { Type: schema.TypeString, Required: true, + ForceNew: true, }, "values": { Type: schema.TypeList, Required: true, + ForceNew: true, Elem: &schema.Schema{Type: schema.TypeString}, }, diff --git a/wallarm/resource_rule_variative_keys_test.go b/wallarm/resource_rule_variative_keys_test.go index 9115de7..83e9a61 100644 --- a/wallarm/resource_rule_variative_keys_test.go +++ b/wallarm/resource_rule_variative_keys_test.go @@ -2,6 +2,7 @@ package wallarm import ( "fmt" + "os" "strconv" "testing" @@ -12,6 +13,9 @@ import ( ) func TestAccRuleVariativeKeysCreate_Basic(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_variative_keys." + rnd resource.Test(t, resource.TestCase{ @@ -32,6 +36,9 @@ func TestAccRuleVariativeKeysCreate_Basic(t *testing.T) { } func TestAccRuleVariativeKeysCreateRecreate(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_variative_keys." + rnd resource.Test(t, resource.TestCase{ diff --git a/wallarm/resource_rule_variative_values_test.go b/wallarm/resource_rule_variative_values_test.go index 3c676b8..447defa 100644 --- a/wallarm/resource_rule_variative_values_test.go +++ b/wallarm/resource_rule_variative_values_test.go @@ -2,6 +2,7 @@ package wallarm import ( "fmt" + "os" "strconv" "testing" @@ -11,6 +12,9 @@ import ( ) func TestAccRuleVariativeValuesCreate_Basic(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_variative_values." + rnd resource.Test(t, resource.TestCase{ @@ -31,6 +35,9 @@ func TestAccRuleVariativeValuesCreate_Basic(t *testing.T) { } func TestAccRuleVariativeValuesCreateRecreate(t *testing.T) { + if os.Getenv("WALLARM_EXTRA_PERMISSIONS") == "" { + t.Skip("Skipping not test as it requires WALLARM_EXTRA_PERMISSIONS set") + } rnd := generateRandomResourceName(5) name := "wallarm_rule_variative_values." + rnd resource.Test(t, resource.TestCase{ diff --git a/wallarm/resource_rule_vpatch_test.go b/wallarm/resource_rule_vpatch_test.go index bd00519..2133fd0 100644 --- a/wallarm/resource_rule_vpatch_test.go +++ b/wallarm/resource_rule_vpatch_test.go @@ -11,13 +11,6 @@ import ( "github.com/hashicorp/terraform-plugin-sdk/terraform" ) -type vpatchTestingRule struct { - attackType string - point string - matchType []string - value string -} - func TestAccRuleVpatchCreate_Basic(t *testing.T) { rnd := generateRandomResourceName(5) name := "wallarm_rule_vpatch." + rnd @@ -30,7 +23,7 @@ func TestAccRuleVpatchCreate_Basic(t *testing.T) { { Config: testWallarmRuleVpatchBasicConfig(rnd, "xss", "iequal", "vpatch.wallarm.com", "HOST", "get_all"), Check: resource.ComposeTestCheckFunc( - resource.TestCheckResourceAttr(name, "attack_type.0", "xss"), + resource.TestCheckResourceAttr(name, "attack_type", "xss"), resource.TestCheckResourceAttr(name, "action.#", "1"), resource.TestCheckResourceAttr(name, "point.0.0", "get_all"), ), @@ -42,7 +35,6 @@ func TestAccRuleVpatchCreate_Basic(t *testing.T) { func TestAccRuleVpatchCreate_DefaultBranch(t *testing.T) { rnd := generateRandomResourceName(5) name := "wallarm_rule_vpatch." + rnd - attackType := `"crlf", "scanner", "redir", "ldapi"` point := `["get", "query"]` resource.Test(t, resource.TestCase{ @@ -51,12 +43,9 @@ func TestAccRuleVpatchCreate_DefaultBranch(t *testing.T) { CheckDestroy: testAccCheckWallarmRuleVpatchDestroy, Steps: []resource.TestStep{ { - Config: testWallarmRuleVpatchDefaultBranchConfig(rnd, attackType, point), + Config: testWallarmRuleVpatchDefaultBranchConfig(rnd, `"crlf"`, point), Check: resource.ComposeTestCheckFunc( - resource.TestCheckResourceAttr(name, "attack_type.0", "crlf"), - resource.TestCheckResourceAttr(name, "attack_type.1", "scanner"), - resource.TestCheckResourceAttr(name, "attack_type.2", "redir"), - resource.TestCheckResourceAttr(name, "attack_type.3", "ldapi"), + resource.TestCheckResourceAttr(name, "attack_type", "crlf"), resource.TestCheckResourceAttr(name, "point.0.0", "get"), resource.TestCheckResourceAttr(name, "point.0.1", "query"), resource.TestCheckNoResourceAttr(name, "action"), @@ -66,52 +55,10 @@ func TestAccRuleVpatchCreate_DefaultBranch(t *testing.T) { }) } -func TestAccRuleVpatchCreate_FullSettings(t *testing.T) { - rnd := generateRandomResourceName(5) - name := "wallarm_rule_vpatch." + rnd - attackType := `"any", "sqli", "rce", "crlf", "nosqli", "ptrav", "xxe", "ptrav", "xss", "scanner", "redir", "ldapi"` - point := `["post"],["json_doc"],["array",0],["hash","password"]` - matchType := []string{"equal", "iequal", "regex", "absent"} - value := generateRandomResourceName(10) + ".example.com" - - rule := vpatchTestingRule{ - attackType: attackType, - point: point, - matchType: matchType, - value: value, - } - - resource.Test(t, resource.TestCase{ - PreCheck: func() { testAccPreCheck(t) }, - Providers: testAccProviders, - CheckDestroy: testAccCheckWallarmRuleVpatchDestroy, - Steps: []resource.TestStep{ - { - Config: testWallarmRuleVpatchFullSettingsConfig(rnd, rule), - Check: resource.ComposeTestCheckFunc( - resource.TestCheckResourceAttr(name, "attack_type.#", "12"), - resource.TestCheckResourceAttr(name, "action.#", "9"), - resource.TestCheckResourceAttr(name, "point.#", "4"), - resource.TestCheckResourceAttr(name, "point.0.#", "1"), - resource.TestCheckResourceAttr(name, "point.0.0", "post"), - resource.TestCheckResourceAttr(name, "point.1.#", "1"), - resource.TestCheckResourceAttr(name, "point.1.0", "json_doc"), - resource.TestCheckResourceAttr(name, "point.2.#", "2"), - resource.TestCheckResourceAttr(name, "point.2.0", "array"), - resource.TestCheckResourceAttr(name, "point.2.1", "0"), - resource.TestCheckResourceAttr(name, "point.3.#", "2"), - resource.TestCheckResourceAttr(name, "point.3.0", "hash"), - resource.TestCheckResourceAttr(name, "point.3.1", "password"), - ), - }, - }, - }) -} - func testWallarmRuleVpatchBasicConfig(resourceID, attackType, actionType, actionValue, actionPoint, point string) string { return fmt.Sprintf(` resource "wallarm_rule_vpatch" "%[1]s" { - attack_type = ["%[2]s"] + attack_type = "%[2]s" action { type = "%[3]s" value = "%[4]s" @@ -126,94 +73,11 @@ resource "wallarm_rule_vpatch" "%[1]s" { func testWallarmRuleVpatchDefaultBranchConfig(resourceID, attackType, point string) string { return fmt.Sprintf(` resource "wallarm_rule_vpatch" "%[1]s" { - attack_type = [%[2]s] + attack_type = %[2]s point = [%[3]s] }`, resourceID, attackType, point) } -func testWallarmRuleVpatchFullSettingsConfig(resourceID string, rule vpatchTestingRule) string { - equal := rule.matchType[0] - iequal := rule.matchType[1] - regex := rule.matchType[2] - absent := rule.matchType[3] - return fmt.Sprintf(` -resource "wallarm_rule_vpatch" "%[8]s" { - - attack_type = [%[1]s] - - action { - point = { - instance = 1 - } - } - - action { - point = { - instance = 1 - } - } - - action { - type = "%[3]s" - point = { - action_name = "masking" - } - } - - action { - type = "%[5]s" - point = { - action_ext = "" - } - } - - action { - type = "%[5]s" - point = { - path = 0 - } - } - - action { - type = "%[3]s" - point = { - method = "GET" - } - } - - action { - type = "%[2]s" - point = { - scheme = "https" - } - } - - action { - type = "%[2]s" - point = { - proto = "1.1" - } - } - - action { - type = "%[4]s" - point = { - uri = "/api/token[0-9A-Za-z]+" - } - } - - action { - type = "%[3]s" - value = "%[6]s" - point = { - header = "HOST" - } - } - - point = [%[7]s] -}`, rule.attackType, equal, iequal, regex, absent, rule.value, rule.point, resourceID) -} - func testAccCheckWallarmRuleVpatchDestroy(s *terraform.State) error { client := testAccProvider.Meta().(wallarm.API) diff --git a/wallarm/resource_rules_settings.go b/wallarm/resource_rules_settings.go index 9b29bcb..f564f50 100644 --- a/wallarm/resource_rules_settings.go +++ b/wallarm/resource_rules_settings.go @@ -57,7 +57,7 @@ func resourceWallarmRulesSettings() *schema.Resource { "rules_snapshot_enabled": { Type: schema.TypeBool, Optional: true, - Computed: true, + Computed: false, }, "rules_snapshot_max_count": { Type: schema.TypeInt, @@ -117,11 +117,6 @@ func resourceWallarmRulesSettings() *schema.Resource { Computed: true, ValidateFunc: validation.StringInSlice([]string{"maximum", "average"}, false), }, - "pii_fallback": { - Type: schema.TypeBool, - Optional: true, - Computed: true, - }, }, } } @@ -199,10 +194,6 @@ func resourceWallarmRulesSettingsRead(d *schema.ResourceData, m interface{}) err return err } - if err := d.Set("pii_fallback", res.Body.PiiFallback); err != nil { - return err - } - return nil } @@ -329,12 +320,6 @@ func updateRulesSettings(d *schema.ResourceData, m interface{}) error { } } - if v, ok := d.GetOk("pii_fallback"); ok { - if val, ok := v.(bool); ok { - params.PiiFallback = &val - } - } - _, err := client.RulesSettingsUpdate(params, clientID) if err != nil { return err diff --git a/wallarm/resource_rules_settings_test.go b/wallarm/resource_rules_settings_test.go index 299d6d0..0220c54 100644 --- a/wallarm/resource_rules_settings_test.go +++ b/wallarm/resource_rules_settings_test.go @@ -17,9 +17,9 @@ func TestAccWallarmRulesSettings(t *testing.T) { "max_lom_size": "10000", "lom_disabled": "false", "lom_compilation_delay": "1000", - "rules_snapshot_enabled": "true", + "rules_snapshot_enabled": "false", "rules_snapshot_max_count": "55", - "rules_manipulation_locked": "true", + "rules_manipulation_locked": "false", "heavy_lom": "true", "parameters_count_weight": "1", "path_variativity_weight": "2", @@ -28,7 +28,6 @@ func TestAccWallarmRulesSettings(t *testing.T) { "open_vulns_weight": "5", "serialized_data_weight": "6", "risk_score_algo": "maximum", - "pii_fallback": "true", } resource.Test(t, resource.TestCase{ @@ -54,7 +53,6 @@ func TestAccWallarmRulesSettings(t *testing.T) { resource.TestCheckResourceAttr(resourceName, "open_vulns_weight", attrs["open_vulns_weight"]), resource.TestCheckResourceAttr(resourceName, "serialized_data_weight", attrs["serialized_data_weight"]), resource.TestCheckResourceAttr(resourceName, "risk_score_algo", attrs["risk_score_algo"]), - resource.TestCheckResourceAttr(resourceName, "pii_fallback", attrs["pii_fallback"]), ), }, }, @@ -80,7 +78,6 @@ resource "wallarm_rules_settings" "%[1]s" { open_vulns_weight = %[15]s serialized_data_weight = %[16]s risk_score_algo = "%[17]s" - pii_fallback = %[18]s }`, resourceID, attrs["min_lom_format"], attrs["max_lom_format"], @@ -98,6 +95,5 @@ resource "wallarm_rules_settings" "%[1]s" { attrs["open_vulns_weight"], attrs["serialized_data_weight"], attrs["risk_score_algo"], - attrs["pii_fallback"], ) }