From 41b6f06c81d62c5f55c093de503e53541ecbd741 Mon Sep 17 00:00:00 2001 From: pranavskumar Date: Wed, 11 Sep 2024 11:18:34 +0530 Subject: [PATCH] 11 Sept Release --- docs/resources/volterra_apm.md | 2 +- docs/resources/volterra_cloud_site_labels.md | 2 +- docs/resources/volterra_service_policy.md | 363 +- .../resources/volterra_service_policy_rule.md | 4 +- ...ection_resource_volterra_service_policy.go | 164 +- volterra/resource_helper.go | 2 +- .../resource_volterra_reg_approval_test.go | 2 + ...resource_volterra_registration_approval.go | 1 + volterra/resource_volterra_service_policy.go | 8211 +++++++++++------ volterra/resource_volterra_token.go | 28 +- 10 files changed, 5677 insertions(+), 3102 deletions(-) diff --git a/docs/resources/volterra_apm.md b/docs/resources/volterra_apm.md index d7bdb28b4..3598ace3b 100644 --- a/docs/resources/volterra_apm.md +++ b/docs/resources/volterra_apm.md @@ -18,7 +18,7 @@ description: "The apm allows CRUD of Apm resource on Volterra SaaS" The Apm allows CRUD of Apm resource on Volterra SaaS -~> **Note:** Please refer to [Apm API docs](https://docs.cloud.f5.com/docs-v2/api/apm) to learn more +~> **Note:** Please refer to [Apm API docs]( https://docs.cloud.f5.com/docs-v2/api/bigip-apm) to learn more ## Example Usage diff --git a/docs/resources/volterra_cloud_site_labels.md b/docs/resources/volterra_cloud_site_labels.md index b9497293e..6008cb970 100644 --- a/docs/resources/volterra_cloud_site_labels.md +++ b/docs/resources/volterra_cloud_site_labels.md @@ -10,7 +10,7 @@ Resource volterra_cloud_site_labels volterra_cloud_site_labels resource updates the labels for the cloud site also known as view sites -~> **Note:** Please add ignore_lifecycle hooks for your you cloud sites to ignore updates on labels and control the update of site label through this resource. Below is a sample snippet. +~> **Note:** Please add ignore_lifecycle hooks for your cloud sites to ignore updates on labels and control the update of site label through this resource. Below is a sample snippet. ``` lifecycle { diff --git a/docs/resources/volterra_service_policy.md b/docs/resources/volterra_service_policy.md index c0bfd5334..d529c0565 100644 --- a/docs/resources/volterra_service_policy.md +++ b/docs/resources/volterra_service_policy.md @@ -312,7 +312,9 @@ The predicate evaluates to true if the destination address is covered by one or `invert_match` - (Optional) Invert the match result. (`Bool`). -`ip_prefixes` - (Required) List of IPv4 prefix strings. (`String`). +`ip_prefixes` - (Optional) List of IPv4 prefix strings. (`String`). + +`ipv6_prefixes` - (Optional) List of IPv6 prefix strings. (`String`). ### Headers @@ -352,7 +354,9 @@ The predicate evaluates to true if the client IPv4 Address is covered by one or `invert_match` - (Optional) Invert the match result. (`Bool`). -`ip_prefixes` - (Required) List of IPv4 prefix strings. (`String`). +`ip_prefixes` - (Optional) List of IPv4 prefix strings. (`String`). + +`ipv6_prefixes` - (Optional) List of IPv6 prefix strings. (`String`). ### Item @@ -392,10 +396,6 @@ List of references to service_policy_rule objects. `rules` - (Optional) The order of evaluation of the rules depends on the rule combining algorithm.. See [ref](#ref) below for details. -### Malicious User Mitigation Bypass - -the appropriate match conditions in the enclosing policy rule and setting malicious user mitigation bypass flag.. - ### Metadata Common attributes for the rule including name and description.. @@ -422,6 +422,8 @@ The predicate evaluates to true if the actual path value matches any of the exac `transformers` - (Optional) An ordered list of transformers (starting from index 0) to be applied to the path before matching. (`List of Strings`). +`invert_matcher` - (Optional) Invert the match result. (`Bool`). + ### Port Matcher The list of port ranges to which the destination port should belong. In case of an HTTP Connect, the port is extracted from the desired destination.. @@ -434,7 +436,9 @@ The list of port ranges to which the destination port should belong. In case of Addresses that are covered by the given list of IPv4 prefixes. -`prefixes` - (Required) List of IPv4 prefixes that represent an endpoint (`String`). +`prefixes` - (Optional) List of IPv4 prefixes that represent an endpoint (`String`). + +`ipv6_prefixes` - (Optional) List of IPv6 prefix strings (`String`). ### Query Params @@ -508,6 +512,10 @@ Specification for the rule including match predicates and actions.. `body_matcher` - (Optional) The actual request body value is extracted from the request API as a string.. See [Body Matcher ](#body-matcher) below for details. +`bot_action` - (Optional) Bot action to be enforced if the input request matches the rule. See [Bot Action ](#bot-action) + +`mum_action` - (Optional) Specifies how Malicious User Mitigation is handled. See [MUM Action ](#mum-action) below for details. + `challenge_action` - (Required) Select challenge action, enable javascript/captcha challenge or disable challenge (`String`). `any_client` - (Optional) Any Client (bool). @@ -518,8 +526,12 @@ Specification for the rule including match predicates and actions.. `client_selector` - (Optional) The predicate evaluates to true if the expressions in the label selector are true for the client labels.. See [Client Selector ](#client-selector) below for details. +`ip_threat_category_list` - (Optional) IP threat categories to choose from. See [Client Choice Ip Threat Category List ](#client-choice-ip-threat-category-list) below for details. + `client_role` - (Optional) The predicate evaluates to true if any of the client's roles match the value(s) specified in client role.. See [Client Role ](#client-role) below for details. +`content_rewrite_action` - (Optional) Rewrite HTML response action to insert HTML content such as Javascript script tags into the HTML document. See [Content Rewrite Action ](#content-rewrite-action) below for details. + `cookie_matchers` - (Optional) Note that all specified cookie matcher predicates must evaluate to true.. See [Cookie Matchers ](#cookie-matchers) below for details. `domain_matcher` - (Optional) matcher.. See [Domain Matcher ](#domain-matcher) below for details. @@ -534,7 +546,7 @@ Specification for the rule including match predicates and actions.. `dst_ip_matcher` - (Optional) The predicate evaluates to true if the client IPv4 Address is covered by one or more of the IPv4 Prefixes in the IP Prefix Sets.. See [Dst Ip Matcher ](#dst-ip-matcher) below for details. -`dst_ip_prefix_list` - (Optional) The predicate evaluates to true if the destination address is covered by one or more of the IPv4 Prefixes from the list.. See [Dst Ip Prefix List ](#dst-ip-prefix-list) below for details. +`dst_ip_prefix_list` - (Optional) The predicate evaluates to true if the destination address is covered by one or more of the IP Prefixes from the list. See [Dst Ip Prefix List ](#dst-ip-prefix-list) below for details. `expiration_timestamp` - (Optional) the configuration but is not applied anymore. (`String`). @@ -550,14 +562,12 @@ Specification for the rule including match predicates and actions.. `ip_matcher` - (Optional) The predicate evaluates to true if the client IPv4 Address is covered by one or more of the IPv4 Prefixes in the IP Prefix Sets.. See [Ip Matcher ](#ip-matcher) below for details. -`ip_prefix_list` - (Optional) The predicate evaluates to true if the client IPv4 Address is covered by one or more of the IPv4 Prefixes from the list.. See [Ip Prefix List ](#ip-prefix-list) below for details. +`ip_prefix_list` - (Optional) The predicate evaluates to true if the client IP Address is covered by one or more of the IP Prefixes from the list. See [Ip Prefix List ](#ip-prefix-list) below for details. `l4_dest_matcher` - (Optional) IP matches one of the prefixes and the destination port belongs to the port range.. See [L4 Dest Matcher ](#l4-dest-matcher) below for details. `label_matcher` - (Optional) other labels do not matter.. See [Label Matcher ](#label-matcher) below for details. -`malicious_user_mitigation_bypass` - (Optional) the appropriate match conditions in the enclosing policy rule and setting malicious user mitigation bypass flag. (bool). - `path` - (Optional) The predicate evaluates to true if the actual path value matches any of the exact or prefix values or regular expressions in the path matcher.. See [Path ](#path) below for details. `port_matcher` - (Optional) The list of port ranges to which the destination port should belong. In case of an HTTP Connect, the port is extracted from the desired destination.. See [Port Matcher ](#port-matcher) below for details. @@ -570,6 +580,8 @@ Specification for the rule including match predicates and actions.. `server_selector` - (Optional) The predicate evaluates to true if the expressions in the label selector are true for the server labels.. See [Server Selector ](#server-selector) below for details. +`shape_protected_endpoint_action` - (Optional) Shape Protected Endpoint Action that include application traffic type and mitigation.. See [Shape Protected Endpoint Action](#shape-protected-endpoint-action) below for details. + `tls_fingerprint_matcher` - (Optional) The predicate evaluates to true if the TLS fingerprint matches any of the exact values or classes of known TLS fingerprints.. See [Tls Fingerprint Matcher ](#tls-fingerprint-matcher) below for details. `url_matcher` - (Optional) A URL matcher specifies a list of URL items as match criteria. The match is considered successful if the domain and path match any of the URL items.. See [Url Matcher ](#url-matcher) below for details. @@ -578,6 +590,14 @@ Specification for the rule including match predicates and actions.. `waf_action` - (Required) App Firewall action to be enforced if the input request matches the rule.. See [Waf Action ](#waf-action) below for details. +`jwt_claims` - (Optional) A list of predicates for various JWT claims that need to match. The criteria for matching each JWT claim are described in individual JWTClaimMatcherType instances. The actual JWT claims values are extracted from the JWT payload as a list of strings.Note that all specified JWT claim predicates must evaluate to true. See [Jwt Claims ](#jwt-claims) below for details. + +`request_constraints` - (Optional) Place limits on request based on the request attributes. The request matches if any of the attribute sizes exceed the corresponding maximum value.. See [Request Constraints ](#request-constraints) below for details. + +`user_identity_matcher` - (Optional) Match the specified user identity. The format is prefixed by the type.. See [User Identity Matcher ](#user-identity-matcher) below for details. + +`segment_policy` - (Optional) Skip the configuration or set option as Any to ignore corresponding segment match. See [Segment Policy ](#segment-policy) below for details. + ### Tls Fingerprint Matcher The predicate evaluates to true if the TLS fingerprint matches any of the exact values or classes of known TLS fingerprints.. @@ -628,35 +648,328 @@ App Firewall action to be enforced if the input request matches the rule.. `waf_in_monitoring_mode` - (Optional) App Firewall will run in monitoring mode without blocking the request (bool). -`waf_inline_rule_control` - (Optional) App Firewall rule changes to be applied for this request. See [Waf Inline Rule Control ](#waf-inline-rule-control) below for details. - -`waf_rule_control` - (Optional) App Firewall rule changes to be applied for this request. See [Waf Rule Control ](#waf-rule-control) below for details. - `waf_skip_processing` - (Optional) Skip all App Firewall processing for this request (bool). +`app_firewall_detection_control` - (Optional) Define the list of Signature IDs, Violations, Attack Types and Bot Names that should be excluded from triggering on the defined match criteria.. See [Waf Advanced Configuration App Firewall Detection Control ](#waf-advanced-configuration-app-firewall-detection-control) below for details. + ### Waf In Monitoring Mode App Firewall will run in monitoring mode without blocking the request. -### Waf Inline Rule Control -App Firewall rule changes to be applied for this request. +### Waf Skip Processing -`exclude_rule_ids` - (Optional) App Firewall Rule IDs to be excluded for this request (`List of Strings`). +Skip all App Firewall processing for this request. -`monitoring_mode` - (Optional) App Firewall will run in monitoring mode without blocking the request (`Bool`). +### Bot Action -### Waf Rule Control +Bot action to be enforced if the input request matches the rule. -App Firewall rule changes to be applied for this request. +###### One of the arguments from this list "bot_skip_processing none" must be set -`exclude_rule_ids` - (Optional) App Firewall Rule List specifying the rule IDs to be excluded for this request. See [ref](#ref) below for details. +`bot_skip_processing` - (Optional) Skip all Bot processing for this request (`Bool`). -`monitoring_mode` - (Optional) App Firewall will run in monitoring mode without blocking the request (`Bool`). +`none` - (Optional) Perform normal Bot processing for this request (`Bool`). -### Waf Skip Processing +### MUM Action -Skip all App Firewall processing for this request. +Specifies how Malicious User Mitigation is handled + +###### One of the arguments from this list "default skip_processing" must be set + +`default` - (Optional) Perform the default enforcement for this request (`Bool`). + +`skip_processing` - (Optional) Do not perform enforcement for this request (`Bool`). + +### Client Choice Ip Threat Category List + +IP threat categories to choose from. + +`ip_threat_categories` - (Required) The IP threat categories is obtained from the list and is used to auto-generate equivalent label selection expressions (`List of Strings`). + +### Content Rewrite Action + +Rewrite HTML response action to insert HTML content such as Javascript script tags into the HTML document. + +`element_selector` - (Required) Element selector to insert into. (`String`). + +`insert_content` - (Optional) HTML content to insert. (`String`). + +`inserted_types` - (Optional) Inserted types of security configuration like Bot Defense, Client Side Defense. (`Bool`). + +`position` - (Optional) Position of HTML content to be inserted within HTML tag. (`String`). + +### Shape Protected Endpoint Action + +Shape Protected Endpoint Action that include application traffic type and mitigation. + +`allow_goodbot` - (Required) Good bot (`Bool`). + +`app_traffic_type` - (Required) Traffic type (`String`). + +`flow_label` - (Required) Flow label (`String`). + +`mitigation` - (Required) Mitigation action for protected endpoint. See [Shape Protected Endpoint Action Mitigation ](#shape-protected-endpoint-action-mitigation) below for details. + +`transaction_result` - (Optional) Success/failure Criteria for transaction result. See [Shape Protected Endpoint Action Transaction Result ](#shape-protected-endpoint-action-transaction-result) below for details. + +`web_scraping` - (Required) Web scraping protection enabled for protected endpoint (`Bool`). + +### Shape Protected Endpoint Action Mitigation + +Mitigation action for protected endpoint. + +###### One of the arguments from this list "none, block, redirect, flag" can be set + +`block` - (Optional) Block bot request and send response with custom content.. See [Action Type Block ](#action-type-block) below for details. + +`flag` - (Optional) Flag the request while not taking any invasive actions.. See [Action Type Flag ](#action-type-flag) below for details. + +`none` - (Optional) No mitigation actions. (`Bool`).(Deprecated) + +`redirect` - (Optional) Redirect bot request to a custom URI.. See [Action Type Redirect ](#action-type-redirect) below for details. + +### Shape Protected Endpoint Action Transaction Result + +Success/failure Criteria for transaction result. + +`failure_conditions` - (Optional) Failure Conditions. See [Transaction Result Failure Conditions ](#transaction-result-failure-conditions) below for details. + +`success_conditions` - (Optional) Success Conditions. See [Transaction Result Success Conditions ](#transaction-result-success-conditions) below for details. + +### Transaction Result Failure Conditions + +Failure Conditions. + +`name` - (Optional) A case-insensitive HTTP header name. (`String`). + +`regex_values` - (Optional) A list of regular expressions to match the input against. (`String`). + +`status` - (Required) HTTP Status code (`String`). + +### Transaction Result Success Conditions + +Success Conditions. + +`name` - (Optional) A case-insensitive HTTP header name. (`String`). + +`regex_values` - (Optional) A list of regular expressions to match the input against. (`String`). + +`status` - (Required) HTTP Status code (`String`). + +### Action Type Block + +Block bot request and send response with custom content.. + +`body` - (Optional) E.g. "

Your request was blocked

". Base64 encoded string for this html is "LzxwPiBZb3VyIHJlcXVlc3Qgd2FzIGJsb2NrZWQgPC9wPg==" (`String`). + +`body_hash` - (Optional) Represents the corresponding MD5 Hash for the body message. (`String`).(Deprecated) + +`status` - (Optional) HTTP Status code to respond with (`String`). + +### Action Type Flag + +Flag the request while not taking any invasive actions.. + +###### One of the arguments from this list "no_headers, append_headers" can be set + +`append_headers` - (Optional) Append mitigation headers.. See [Send Headers Choice Append Headers ](#send-headers-choice-append-headers) below for details. + +`no_headers` - (Optional) No mitigation headers. (`Bool`). + +### Send Headers Choice Append Headers + +Append mitigation headers.. + +`auto_type_header_name` - (Required) A case-insensitive HTTP header name. (`String`). + +`inference_header_name` - (Required) A case-insensitive HTTP header name. (`String`). + +### Action Type Redirect + +Redirect bot request to a custom URI.. + +`uri` - (Required) URI location for redirect may be relative or absolute. (`String`). + +### Waf Advanced Configuration App Firewall Detection Control + +Define the list of Signature IDs, Violations, Attack Types and Bot Names that should be excluded from triggering on the defined match criteria.. + +`exclude_attack_type_contexts` - (Optional) Attack Types to be excluded for the defined match criteria. See [App Firewall Detection Control Exclude Attack Type Contexts ](#app-firewall-detection-control-exclude-attack-type-contexts) below for details. + +`exclude_bot_name_contexts` - (Optional) Bot Names to be excluded for the defined match criteria. See [App Firewall Detection Control Exclude Bot Name Contexts ](#app-firewall-detection-control-exclude-bot-name-contexts) below for details. + +`exclude_signature_contexts` - (Optional) Signature IDs to be excluded for the defined match criteria. See [App Firewall Detection Control Exclude Signature Contexts ](#app-firewall-detection-control-exclude-signature-contexts) below for details. + +`exclude_violation_contexts` - (Optional) Violations to be excluded for the defined match criteria. See [App Firewall Detection Control Exclude Violation Contexts ](#app-firewall-detection-control-exclude-violation-contexts) below for details. + +### App Firewall Detection Control Exclude Attack Type Contexts + +Attack Types to be excluded for the defined match criteria. + +`context` - (Required) x-required (`String`). + +`context_name` - (Optional) Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. (`String`). + +`exclude_attack_type` - (Required) x-required (`String`). + +### App Firewall Detection Control Exclude Bot Name Contexts + +Bot Names to be excluded for the defined match criteria. + +`bot_name` - (Required) x-example: "Hydra" (`String`). + +### App Firewall Detection Control Exclude Signature Contexts + +Signature IDs to be excluded for the defined match criteria. + +`context` - (Required) x-required (`String`). + +`context_name` - (Optional) Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. (`String`). + +`signature_id` - (Required) 0 implies that all signatures will be excluded for the specified context. (`Int`). + +### App Firewall Detection Control Exclude Violation Contexts + +Violations to be excluded for the defined match criteria. + +`context` - (Required) x-required (`String`). + +`context_name` - (Optional) Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. (`String`). + +`exclude_violation` - (Required) x-required (`String`). + +### Jwt Claims + +List of predicates for various JWT claims that need to match. + +`invert_matcher` - (Optional) Invert the match result. (`Bool`). + +###### One of the arguments from this list "check_present, check_not_present, item" must be set + +`check_not_present` - (Optional) Check that the JWT Claim is not present. (`Bool`). + +`check_present` - (Optional) Check that the JWT Claim is present. (`Bool`). + +`item` - (Optional) Criteria for matching the values for the JWT Claim. The match is successful if any of the values in the input satisfies the criteria in the matcher. See [Match Item ](#match-item) below for details. + +`name` - (Required) JWT claim name. (`String`). + +### Match Item + +Criteria for matching the values for the JWT Claim. The match is successful if any of the values in the input satisfies the criteria in the matcher. + +`exact_values` - (Optional) A list of exact values to match the input against. (`String`). + +`regex_values` - (Optional) A list of regular expressions to match the input against. (`String`). + +`transformers` - (Optional) An ordered list of transformers (starting from index 0) to be applied to the path before matching. (`List of Strings`). + +### Request Constraints + +Place limits on request based on the request attributes. The request matches if any of the attribute sizes exceed the corresponding maximum value.. + +###### One of the arguments from this list "max_cookie_count_none, max_cookie_count_exceeds" must be set + +`max_cookie_count_exceeds` - (Optional) x-example: "40" (`Int`). + +`max_cookie_count_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_cookie_key_size_none, max_cookie_key_size_exceeds" must be set + +`max_cookie_key_size_exceeds` - (Optional) x-example: "64" (`Int`). + +`max_cookie_key_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_cookie_value_size_none, max_cookie_value_size_exceeds" must be set + +`max_cookie_value_size_exceeds` - (Optional) x-example: "4096" (`Int`). + +`max_cookie_value_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_header_count_none, max_header_count_exceeds" must be set + +`max_header_count_exceeds` - (Optional) x-example: "20" (`Int`). + +`max_header_count_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_header_key_size_none, max_header_key_size_exceeds" must be set + +`max_header_key_size_exceeds` - (Optional) x-example: "32" (`Int`). + +`max_header_key_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_header_value_size_none, max_header_value_size_exceeds" must be set + +`max_header_value_size_exceeds` - (Optional) x-example: "1024" (`Int`). + +`max_header_value_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_parameter_count_exceeds, max_parameter_count_none" must be set + +`max_parameter_count_exceeds` - (Optional) x-example: "4" (`Int`). + +`max_parameter_count_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_parameter_name_size_none, max_parameter_name_size_exceeds" must be set + +`max_parameter_name_size_exceeds` - (Optional) x-example: "64" (`Int`). + +`max_parameter_name_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_parameter_value_size_none, max_parameter_value_size_exceeds" must be set + +`max_parameter_value_size_exceeds` - (Optional) x-example: "1000" (`Int`). + +`max_parameter_value_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_query_size_none, max_query_size_exceeds" must be set + +`max_query_size_exceeds` - (Optional) x-example: "4096" (`Int`). + +`max_query_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_request_line_size_none, max_request_line_size_exceeds" must be set + +`max_request_line_size_exceeds` - (Optional) x-example: "4096" (`Int`). + +`max_request_line_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_request_size_none, max_request_size_exceeds" must be set + +`max_request_size_exceeds` - (Optional) x-example: "32768" (`Int`). + +`max_request_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +###### One of the arguments from this list "max_url_size_none, max_url_size_exceeds" must be set + +`max_url_size_exceeds` - (Optional) x-example: "4096" (`Int`). + +`max_url_size_none` - (Optional) x-displayName: "Not Configured" (`Bool`). + +### User Identity Matcher + +Match the specified user identity. The format is prefixed by the type. + +`exact_values` - (Optional) A list of exact values to match the input against. (`String`). + +`regex_values` - (Optional) A list of regular expressions to match the input against. (`String`). + +### Segment Policy + +Skip the configuration or set option as Any to ignore corresponding segment match. + +###### One of the arguments from this list "src_any, src_segments" can be set + +`src_any` - (Optional) Traffic is not matched against any segment (`Bool`). + +`src_segments` - (Optional) Source traffic is matched against selected segments. See [Src Segment Choice Src Segments ](#src-segments) below for details. + +### Src Segments + +Source traffic is matched against selected segments. + +`segments` - (Required) Select list of segments. See [ref](#ref) below for details. Attribute Reference ------------------- diff --git a/docs/resources/volterra_service_policy_rule.md b/docs/resources/volterra_service_policy_rule.md index b7ce2f3e5..45679e1bb 100644 --- a/docs/resources/volterra_service_policy_rule.md +++ b/docs/resources/volterra_service_policy_rule.md @@ -190,7 +190,7 @@ resource "volterra_service_policy_rule" "example" { -`content_rewrite_action` - (Optional) Rewrite HTML response action to insert HTML content such as Javascript