Skip to content

[Enhancement:] cdn_frontdoor_firewall_policy* - add support for js_challenge_cookie_expiration_in_minutes policy#28284

Merged
jackofallops merged 2 commits intomainfrom
e_frontdoor_waf_policies_2
Jan 31, 2025
Merged

[Enhancement:] cdn_frontdoor_firewall_policy* - add support for js_challenge_cookie_expiration_in_minutes policy#28284
jackofallops merged 2 commits intomainfrom
e_frontdoor_waf_policies_2

Conversation

@WodansSon
Copy link
Collaborator

@WodansSon WodansSon commented Dec 14, 2024

Community Note

  • Please vote on this PR by adding a 👍 reaction to the original PR to help the community and maintainers prioritize for review
  • Please do not leave comments along the lines of "+1", "me too" or "any updates", they generate extra noise for PR followers and do not help prioritize for review

Description

  • cdn_frontdoor_firewall_policy_data_source - add support for js_challenge_cookie_expiration_in_minutes policy
  • cdn_frontdoor_firewall_policy - add support for js_challenge_cookie_expiration_in_minutes policy

PR Checklist

  • I have followed the guidelines in our Contributing Documentation.
  • I have checked to ensure there aren't other open Pull Requests for the same update/change.
  • I have checked if my changes close any open issues. If so please include appropriate closing keywords below.
  • I have updated/added Documentation as required written in a helpful and kind way to assist users that may be unfamiliar with the resource / data source.
  • I have used a meaningful PR title to help maintainers and other users understand this change and help prevent duplicate work.
    For example: “resource_name_here - description of change e.g. adding property new_property_name_here

Changes to existing Resource / Data Source

  • I have added an explanation of what my changes do and why I'd like you to include them (This may be covered by linking to an issue above, but may benefit from additional explanation).
  • I have written new tests for my resource or datasource changes & updated any relevent documentation.
  • I have successfully run tests with my changes locally. If not, please provide details on testing challenges that prevented you running the tests.
  • (For changes that include a state migration only). I have manually tested the migration path between relevant versions of the provider.

Testing

  • My submission includes Test coverage as described in the Contribution Guide and the tests pass. (if this is not possible for any reason, please include details of why you did or could not add test coverage)

Change Log

Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.

  • cdn_frontdoor_firewall_policy_data_source - add support for js_challenge_cookie_expiration_in_minutes policy [GH-00000]
  • cdn_frontdoor_firewall_policy - add support for js_challenge_cookie_expiration_in_minutes policy [GH-00000]

This is a (please select all that apply):

  • Bug Fix
  • New Feature (ie adding a service, resource, or data source)
  • Enhancement
  • Breaking Change

Related Issue(s)

Fixes #27325

Related PR(s)

Supersedes #28162
Depends on #28308

Note

If this PR changes meaningfully during the course of review please update the title and description as required.

Copy link
Member

@jackofallops jackofallops left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks @WodansSon - This LGTM and the tests are all green:
image

@jackofallops jackofallops merged commit d834600 into main Jan 31, 2025
1 check passed
@jackofallops jackofallops deleted the e_frontdoor_waf_policies_2 branch January 31, 2025 09:32
@github-actions github-actions bot added this to the v4.18.0 milestone Jan 31, 2025
@richardfric
Copy link
Contributor

After this PR the terraform plan command reports a change on existing firewall policy but apply fails because js_challenge_cookie_expiration_in_minutes is supported only for premium tier

resource "azurerm_cdn_frontdoor_firewall_policy" "example" {
        id                                        = "/subscriptions/xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx/resourceGroups/example/providers/Microsoft.Network/frontDoorWebApplicationFirewallPolicies/example"
      ~ js_challenge_cookie_expiration_in_minutes = 0 -> 30
        name                                      = "example"
        tags                                      = {}
        # (9 unchanged attributes hidden)

        # (1 unchanged block hidden)
    }

performing PoliciesCreateOrUpdate: webapplicationfirewallpolicies.WebApplicationFirewallPoliciesClient#PoliciesCreateOrUpdate: Failure sending request: StatusCode=0 -- Original Error: Code="BadRequest" Message="WebApplicationFirewallPolicy validation failed. More information ""JavascriptChallengeExpirationInMinutes" is only supported for Premium Sku."."

hqhqhqhqhqhqhqhqhqhqhq pushed a commit to hqhqhqhqhqhqhqhqhqhqhq/terraform-provider-azurerm that referenced this pull request Feb 26, 2025
…_challenge_cookie_expiration_in_minutes` policy (hashicorp#28284)

* Initial Check-in...

* Added js Challenge to policy and policy datasources...
@github-actions
Copy link
Contributor

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Mar 16, 2025
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Support for JS Challenge in resource azurerm_cdn_frontdoor_firewall_policy

3 participants