github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/no_public_firewall_access.tf.go (about) 1 package database 2 3 var terraformNoPublicFirewallAccessGoodExamples = []string{ 4 ` 5 resource "azurerm_sql_firewall_rule" "good_example" { 6 name = "good_rule" 7 resource_group_name = azurerm_resource_group.example.name 8 server_name = azurerm_sql_server.example.name 9 start_ip_address = "0.0.0.0" 10 end_ip_address = "0.0.0.0" 11 } 12 `, 13 } 14 15 var terraformNoPublicFirewallAccessBadExamples = []string{ 16 ` 17 resource "azurerm_sql_firewall_rule" "bad_example" { 18 name = "bad_rule" 19 resource_group_name = azurerm_resource_group.example.name 20 server_name = azurerm_sql_server.example.name 21 start_ip_address = "0.0.0.0" 22 end_ip_address = "255.255.255.255" 23 } 24 25 resource "azurerm_postgresql_firewall_rule" "bad_example" { 26 name = "bad_example" 27 resource_group_name = azurerm_resource_group.example.name 28 server_name = azurerm_postgresql_server.example.name 29 start_ip_address = "0.0.0.0" 30 end_ip_address = "255.255.255.255" 31 } 32 `, 33 } 34 35 var terraformNoPublicFirewallAccessLinks = []string{ 36 `https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/sql_firewall_rule#end_ip_address`, 37 } 38 39 var terraformNoPublicFirewallAccessRemediationMarkdown = ``