github.com/khulnasoft-lab/defsec@v1.0.5-0.20230827010352-5e9f46893d95/rules/cloud/policies/azure/database/no_public_firewall_access.tf.go (about)

     1  package database
     2  
     3  var terraformNoPublicFirewallAccessGoodExamples = []string{
     4  	`
     5   resource "azurerm_sql_firewall_rule" "good_example" {
     6     name                = "good_rule"
     7     resource_group_name = azurerm_resource_group.example.name
     8     server_name         = azurerm_sql_server.example.name
     9     start_ip_address    = "0.0.0.0"
    10     end_ip_address      = "0.0.0.0"
    11   }
    12   `,
    13  }
    14  
    15  var terraformNoPublicFirewallAccessBadExamples = []string{
    16  	`
    17   resource "azurerm_sql_firewall_rule" "bad_example" {
    18     name                = "bad_rule"
    19     resource_group_name = azurerm_resource_group.example.name
    20     server_name         = azurerm_sql_server.example.name
    21     start_ip_address    = "0.0.0.0"
    22     end_ip_address      = "255.255.255.255"
    23   }
    24   
    25   resource "azurerm_postgresql_firewall_rule" "bad_example" {
    26     name                = "bad_example"
    27     resource_group_name = azurerm_resource_group.example.name
    28     server_name         = azurerm_postgresql_server.example.name
    29     start_ip_address    = "0.0.0.0"
    30     end_ip_address      = "255.255.255.255"
    31   }
    32   `,
    33  }
    34  
    35  var terraformNoPublicFirewallAccessLinks = []string{
    36  	`https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/sql_firewall_rule#end_ip_address`,
    37  }
    38  
    39  var terraformNoPublicFirewallAccessRemediationMarkdown = ``