diff --git a/linter_exclusions.yml b/linter_exclusions.yml index f1e0a3c4d35..85c81f4eb4c 100644 --- a/linter_exclusions.yml +++ b/linter_exclusions.yml @@ -2092,6 +2092,9 @@ network front-door waf-policy create: custom_block_response_status_code: rule_exclusions: - option_length_too_long + captcha_expiration_in_minutes: + rule_exclusions: + - option_length_too_long network front-door waf-policy update: parameters: custom_block_response_body: @@ -2100,6 +2103,9 @@ network front-door waf-policy update: custom_block_response_status_code: rule_exclusions: - option_length_too_long + captcha_expiration_in_minutes: + rule_exclusions: + - option_length_too_long network manager connect-config create: parameters: delete_existing_peering: diff --git a/src/front-door/HISTORY.rst b/src/front-door/HISTORY.rst index ba293fa351c..c988e126b80 100644 --- a/src/front-door/HISTORY.rst +++ b/src/front-door/HISTORY.rst @@ -2,6 +2,10 @@ Release History =============== +1.3.0 +++++++ +* Add support for captcha + 1.2.1 ++++++ * Update module documentation. diff --git a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_create.py b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_create.py index 1f6401fd96b..660670f0fbe 100644 --- a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_create.py +++ b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_create.py @@ -19,9 +19,9 @@ class Create(AAZCommand): """ _aaz_info = { - "version": "2024-02-01", + "version": "2025-03-01", "resources": [ - ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2024-02-01"], + ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2025-03-01"], ] } @@ -81,6 +81,15 @@ def _build_arguments_schema(cls, *args, **kwargs): # define Arg Group "PolicySettings" _args_schema = cls._args_schema + _args_schema.captcha_expiration_in_minutes = AAZIntArg( + options=["--captcha-expiration-in-minutes"], + arg_group="PolicySettings", + help="Defines the Captcha cookie validity lifetime in minutes. This setting is only applicable to Premium_AzureFrontDoor. Value must be an integer between 5 and 1440 with the default value being 30.", + fmt=AAZIntArgFormat( + maximum=1440, + minimum=5, + ), + ) _args_schema.custom_block_response_body = AAZStrArg( options=["--custom-block-response-body"], arg_group="PolicySettings", @@ -197,7 +206,7 @@ def _build_arguments_schema(cls, *args, **kwargs): options=["action"], help="Describes what action to be applied when rule matches.", required=True, - enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, + enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "CAPTCHA": "CAPTCHA", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, ) _element.enabled_state = AAZStrArg( options=["enabled-state"], @@ -367,7 +376,7 @@ def _build_arguments_schema(cls, *args, **kwargs): _element.action = AAZStrArg( options=["action"], help="Describes the override action to be applied when rule matches.", - enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, + enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "CAPTCHA": "CAPTCHA", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, ) _element.enabled_state = AAZStrArg( options=["enabled-state"], @@ -516,7 +525,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } @@ -653,11 +662,12 @@ def content(self): policy_settings = _builder.get(".properties.policySettings") if policy_settings is not None: + policy_settings.set_prop("captchaExpirationInMinutes", AAZIntType, ".captcha_expiration_in_minutes") policy_settings.set_prop("customBlockResponseBody", AAZStrType, ".custom_block_response_body") policy_settings.set_prop("customBlockResponseStatusCode", AAZIntType, ".custom_block_response_status_code") policy_settings.set_prop("enabledState", AAZStrType, ".enabled_state") policy_settings.set_prop("javascriptChallengeExpirationInMinutes", AAZIntType, ".javascript_challenge_expiration_in_minutes") - policy_settings.set_prop("logScrubbing", AAZObjectType, ".log_scrubbing") + policy_settings.set_prop("logScrubbing", AAZObjectType, ".log_scrubbing", typ_kwargs={"flags": {"client_flatten": True}}) policy_settings.set_prop("mode", AAZStrType, ".mode") policy_settings.set_prop("redirectUrl", AAZStrType, ".redirect_url") policy_settings.set_prop("requestBodyCheck", AAZStrType, ".request_body_check") @@ -957,6 +967,9 @@ def _build_schema_web_application_firewall_policy_read(cls, _schema): cls._build_schema_managed_rule_exclusion_read(exclusions.Element) policy_settings = _schema_web_application_firewall_policy_read.properties.policy_settings + policy_settings.captcha_expiration_in_minutes = AAZIntType( + serialized_name="captchaExpirationInMinutes", + ) policy_settings.custom_block_response_body = AAZStrType( serialized_name="customBlockResponseBody", ) @@ -971,6 +984,7 @@ def _build_schema_web_application_firewall_policy_read(cls, _schema): ) policy_settings.log_scrubbing = AAZObjectType( serialized_name="logScrubbing", + flags={"client_flatten": True}, ) policy_settings.mode = AAZStrType() policy_settings.redirect_url = AAZStrType( diff --git a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_delete.py b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_delete.py index 013f5b75977..5d331fcbaa2 100644 --- a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_delete.py +++ b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_delete.py @@ -19,9 +19,9 @@ class Delete(AAZCommand): """ _aaz_info = { - "version": "2024-02-01", + "version": "2025-03-01", "resources": [ - ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2024-02-01"], + ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2025-03-01"], ] } @@ -142,7 +142,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } diff --git a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_list.py b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_list.py index 5412a0f7c95..f17a0a3f053 100644 --- a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_list.py +++ b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_list.py @@ -19,9 +19,9 @@ class List(AAZCommand): """ _aaz_info = { - "version": "2024-02-01", + "version": "2025-03-01", "resources": [ - ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies", "2024-02-01"], + ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies", "2025-03-01"], ] } @@ -109,7 +109,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } @@ -343,6 +343,9 @@ def _build_schema_on_200(cls): _ListHelper._build_schema_managed_rule_exclusion_read(exclusions.Element) policy_settings = cls._schema_on_200.value.Element.properties.policy_settings + policy_settings.captcha_expiration_in_minutes = AAZIntType( + serialized_name="captchaExpirationInMinutes", + ) policy_settings.custom_block_response_body = AAZStrType( serialized_name="customBlockResponseBody", ) diff --git a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_show.py b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_show.py index 9343f10d302..8e71a0fc42b 100644 --- a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_show.py +++ b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_show.py @@ -19,9 +19,9 @@ class Show(AAZCommand): """ _aaz_info = { - "version": "2024-02-01", + "version": "2025-03-01", "resources": [ - ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2024-02-01"], + ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2025-03-01"], ] } @@ -120,7 +120,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } @@ -343,6 +343,9 @@ def _build_schema_on_200(cls): _ShowHelper._build_schema_managed_rule_exclusion_read(exclusions.Element) policy_settings = cls._schema_on_200.properties.policy_settings + policy_settings.captcha_expiration_in_minutes = AAZIntType( + serialized_name="captchaExpirationInMinutes", + ) policy_settings.custom_block_response_body = AAZStrType( serialized_name="customBlockResponseBody", ) @@ -357,6 +360,7 @@ def _build_schema_on_200(cls): ) policy_settings.log_scrubbing = AAZObjectType( serialized_name="logScrubbing", + flags={"client_flatten": True}, ) policy_settings.mode = AAZStrType() policy_settings.redirect_url = AAZStrType( diff --git a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_update.py b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_update.py index adcf7da1262..1e596b3744f 100644 --- a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_update.py +++ b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_update.py @@ -24,9 +24,9 @@ class Update(AAZCommand): """ _aaz_info = { - "version": "2024-02-01", + "version": "2025-03-01", "resources": [ - ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2024-02-01"], + ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2025-03-01"], ] } @@ -75,9 +75,6 @@ def _build_arguments_schema(cls, *args, **kwargs): arg_group="Parameters", help="Resource location.", nullable=True, - fmt=AAZResourceLocationArgFormat( - resource_group_arg="resource_group", - ), ) _args_schema.tags = AAZDictArg( options=["--tags"], @@ -94,6 +91,16 @@ def _build_arguments_schema(cls, *args, **kwargs): # define Arg Group "PolicySettings" _args_schema = cls._args_schema + _args_schema.captcha_expiration_in_minutes = AAZIntArg( + options=["--captcha-expiration-in-minutes"], + arg_group="PolicySettings", + help="Defines the Captcha cookie validity lifetime in minutes. This setting is only applicable to Premium_AzureFrontDoor. Value must be an integer between 5 and 1440 with the default value being 30.", + nullable=True, + fmt=AAZIntArgFormat( + maximum=1440, + minimum=5, + ), + ) _args_schema.custom_block_response_body = AAZStrArg( options=["--custom-block-response-body"], arg_group="PolicySettings", @@ -226,7 +233,7 @@ def _build_arguments_schema(cls, *args, **kwargs): _element.action = AAZStrArg( options=["action"], help="Describes what action to be applied when rule matches.", - enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, + enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "CAPTCHA": "CAPTCHA", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, ) _element.enabled_state = AAZStrArg( options=["enabled-state"], @@ -418,7 +425,7 @@ def _build_arguments_schema(cls, *args, **kwargs): options=["action"], help="Describes the override action to be applied when rule matches.", nullable=True, - enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, + enum={"Allow": "Allow", "AnomalyScoring": "AnomalyScoring", "Block": "Block", "CAPTCHA": "CAPTCHA", "JSChallenge": "JSChallenge", "Log": "Log", "Redirect": "Redirect"}, ) _element.enabled_state = AAZStrArg( options=["enabled-state"], @@ -566,7 +573,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } @@ -665,7 +672,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } @@ -835,11 +842,12 @@ def _update_instance(self, instance): policy_settings = _builder.get(".properties.policySettings") if policy_settings is not None: + policy_settings.set_prop("captchaExpirationInMinutes", AAZIntType, ".captcha_expiration_in_minutes") policy_settings.set_prop("customBlockResponseBody", AAZStrType, ".custom_block_response_body") policy_settings.set_prop("customBlockResponseStatusCode", AAZIntType, ".custom_block_response_status_code") policy_settings.set_prop("enabledState", AAZStrType, ".enabled_state") policy_settings.set_prop("javascriptChallengeExpirationInMinutes", AAZIntType, ".javascript_challenge_expiration_in_minutes") - policy_settings.set_prop("logScrubbing", AAZObjectType, ".log_scrubbing") + policy_settings.set_prop("logScrubbing", AAZObjectType, ".log_scrubbing", typ_kwargs={"flags": {"client_flatten": True}}) policy_settings.set_prop("mode", AAZStrType, ".mode") policy_settings.set_prop("redirectUrl", AAZStrType, ".redirect_url") policy_settings.set_prop("requestBodyCheck", AAZStrType, ".request_body_check") @@ -1127,6 +1135,9 @@ def _build_schema_web_application_firewall_policy_read(cls, _schema): cls._build_schema_managed_rule_exclusion_read(exclusions.Element) policy_settings = _schema_web_application_firewall_policy_read.properties.policy_settings + policy_settings.captcha_expiration_in_minutes = AAZIntType( + serialized_name="captchaExpirationInMinutes", + ) policy_settings.custom_block_response_body = AAZStrType( serialized_name="customBlockResponseBody", ) @@ -1141,6 +1152,7 @@ def _build_schema_web_application_firewall_policy_read(cls, _schema): ) policy_settings.log_scrubbing = AAZObjectType( serialized_name="logScrubbing", + flags={"client_flatten": True}, ) policy_settings.mode = AAZStrType() policy_settings.redirect_url = AAZStrType( diff --git a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_wait.py b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_wait.py index ca4052ccaae..eb3c39c8328 100644 --- a/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_wait.py +++ b/src/front-door/azext_front_door/aaz/latest/network/front_door/waf_policy/_wait.py @@ -20,7 +20,7 @@ class Wait(AAZWaitCommand): _aaz_info = { "resources": [ - ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2024-02-01"], + ["mgmt-plane", "/subscriptions/{}/resourcegroups/{}/providers/microsoft.network/frontdoorwebapplicationfirewallpolicies/{}", "2025-03-01"], ] } @@ -119,7 +119,7 @@ def url_parameters(self): def query_parameters(self): parameters = { **self.serialize_query_param( - "api-version", "2024-02-01", + "api-version", "2025-03-01", required=True, ), } @@ -342,6 +342,9 @@ def _build_schema_on_200(cls): _WaitHelper._build_schema_managed_rule_exclusion_read(exclusions.Element) policy_settings = cls._schema_on_200.properties.policy_settings + policy_settings.captcha_expiration_in_minutes = AAZIntType( + serialized_name="captchaExpirationInMinutes", + ) policy_settings.custom_block_response_body = AAZStrType( serialized_name="customBlockResponseBody", ) @@ -356,6 +359,7 @@ def _build_schema_on_200(cls): ) policy_settings.log_scrubbing = AAZObjectType( serialized_name="logScrubbing", + flags={"client_flatten": True}, ) policy_settings.mode = AAZStrType() policy_settings.redirect_url = AAZStrType( diff --git a/src/front-door/azext_front_door/azext_metadata.json b/src/front-door/azext_front_door/azext_metadata.json index 34f7fac3fed..108df673ca9 100644 --- a/src/front-door/azext_front_door/azext_metadata.json +++ b/src/front-door/azext_front_door/azext_metadata.json @@ -1,3 +1,3 @@ { - "azext.minCliCoreVersion": "2.57.0" + "azext.minCliCoreVersion": "2.67.0" } \ No newline at end of file diff --git a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_captcha.yaml b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_captcha.yaml new file mode 100644 index 00000000000..4816e2799c8 --- /dev/null +++ b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_captcha.yaml @@ -0,0 +1,207 @@ +interactions: +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - network front-door waf-policy create + Connection: + - keep-alive + ParameterSetName: + - -g -n --captcha-expiration-in-minutes --mode --sku + User-Agent: + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) + method: GET + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001?api-version=2022-09-01 + response: + body: + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"owner":"jingnanxu"},"properties":{"provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-cache + content-length: + - '258' + content-type: + - application/json; charset=utf-8 + date: + - Thu, 01 May 2025 07:41:12 GMT + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' + x-msedge-ref: + - 'Ref A: FD78A65F3CB44D9D97CAFFB78FF8E447 Ref B: SYD03EDGE1521 Ref C: 2025-05-01T07:41:12Z' + status: + code: 200 + message: OK +- request: + body: '{"location": "global", "properties": {"policySettings": {"captchaExpirationInMinutes": + 5, "enabledState": "Enabled", "mode": "Prevention"}}, "sku": {"name": "Premium_AzureFrontDoor"}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - network front-door waf-policy create + Connection: + - keep-alive + Content-Length: + - '183' + Content-Type: + - application/json + ParameterSetName: + - -g -n --captcha-expiration-in-minutes --mode --sku + User-Agent: + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) + method: PUT + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 + response: + body: + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"captchaExpirationInMinutes":5,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-cache + content-length: + - '791' + content-type: + - application/json; charset=utf-8 + date: + - Thu, 01 May 2025 07:41:16 GMT + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/6195f2af-f662-4da3-a2d3-6dea814d51ea + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' + x-ms-ratelimit-remaining-subscription-writes: + - '799' + x-msedge-ref: + - 'Ref A: F888E3275C6F4F02978551D024B2807B Ref B: SYD03EDGE1612 Ref C: 2025-05-01T07:41:13Z' + status: + code: 201 + message: Created +- request: + body: null + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - network front-door waf-policy update + Connection: + - keep-alive + ParameterSetName: + - -g -n --captcha-expiration-in-minutes + User-Agent: + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) + method: GET + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 + response: + body: + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"captchaExpirationInMinutes":5,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-cache + content-length: + - '791' + content-type: + - application/json; charset=utf-8 + date: + - Thu, 01 May 2025 07:41:18 GMT + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' + x-msedge-ref: + - 'Ref A: 40D8819A9C83487B8187633FE96422DD Ref B: SYD03EDGE1108 Ref C: 2025-05-01T07:41:17Z' + status: + code: 200 + message: OK +- request: + body: '{"location": "global", "properties": {"customRules": {"rules": []}, "managedRules": + {"managedRuleSets": []}, "policySettings": {"captchaExpirationInMinutes": 12, + "enabledState": "Enabled", "javascriptChallengeExpirationInMinutes": 30, "mode": + "Prevention", "requestBodyCheck": "Enabled"}}, "sku": {"name": "Premium_AzureFrontDoor"}, + "tags": {}}' + headers: + Accept: + - application/json + Accept-Encoding: + - gzip, deflate + CommandName: + - network front-door waf-policy update + Connection: + - keep-alive + Content-Length: + - '344' + Content-Type: + - application/json + ParameterSetName: + - -g -n --captcha-expiration-in-minutes + User-Agent: + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) + method: PUT + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 + response: + body: + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"captchaExpirationInMinutes":12,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + headers: + cache-control: + - no-cache + content-length: + - '792' + content-type: + - application/json; charset=utf-8 + date: + - Thu, 01 May 2025 07:41:20 GMT + expires: + - '-1' + pragma: + - no-cache + strict-transport-security: + - max-age=31536000; includeSubDomains + x-cache: + - CONFIG_NOCACHE + x-content-type-options: + - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/9f44af02-caa8-4aa0-ae69-75dc33efa310 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' + x-ms-ratelimit-remaining-subscription-writes: + - '799' + x-msedge-ref: + - 'Ref A: D354E8B641764578AFEC3255AE826630 Ref B: SYD03EDGE1108 Ref C: 2025-05-01T07:41:18Z' + status: + code: 200 + message: OK +version: 1 diff --git a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml index f96e817ef11..9f8b3c2f045 100644 --- a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml +++ b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_exclusions.yaml @@ -13,21 +13,21 @@ interactions: ParameterSetName: - -g -n --mode User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"product":"azurecli","cause":"automation","test":"test_waf_exclusions","date":"2024-04-22T03:31:46Z","module":"front-door"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"owner":"jingnanxu"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '361' + - '258' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:31:56 GMT + - Thu, 01 May 2025 07:12:43 GMT expires: - '-1' pragma: @@ -38,13 +38,16 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 92CE524171E74787A5D374A1A59590C0 Ref B: MAA201060515025 Ref C: 2024-04-22T03:31:57Z' + - 'Ref A: 108633CF27DA4E198A65C4E13C23EF28 Ref B: SYD03EDGE2121 Ref C: 2025-05-01T07:12:43Z' status: code: 200 message: OK - request: - body: '{"location": "westus", "properties": {"policySettings": {"mode": "Prevention"}}}' + body: '{"location": "global", "properties": {"policySettings": {"enabledState": + "Enabled", "mode": "Prevention"}}, "sku": {"name": "Premium_AzureFrontDoor"}}' headers: Accept: - application/json @@ -55,27 +58,27 @@ interactions: Connection: - keep-alive Content-Length: - - '80' + - '150' Content-Type: - application/json ParameterSetName: - -g -n --mode User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"captchaExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '762' + - '792' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:02 GMT + - Thu, 01 May 2025 07:12:47 GMT expires: - '-1' pragma: @@ -86,10 +89,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/f00c763d-8d78-43b7-931a-d7e7b1df0c34 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 892BDCBC0DC44CDDB73E8327DB79EE7A Ref B: MAA201060513011 Ref C: 2024-04-22T03:31:58Z' + - 'Ref A: 31A274F7FC484D8F92DD00D25D11A799 Ref B: SYD03EDGE1913 Ref C: 2025-05-01T07:12:43Z' status: code: 201 message: Created @@ -107,21 +114,21 @@ interactions: ParameterSetName: - -g --policy-name --type --version User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '762' + - '760' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:05 GMT + - Thu, 01 May 2025 07:12:49 GMT expires: - '-1' pragma: @@ -132,16 +139,19 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: FB5FCAFD2228481BACC1EA15C7712ED8 Ref B: MAA201060515053 Ref C: 2024-04-22T03:32:04Z' + - 'Ref A: E96E6C79F40944ADAEE963DC627E7854 Ref B: SYD03EDGE1315 Ref C: 2025-05-01T07:12:48Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0"}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0"}]}}}' headers: Accept: - application/json @@ -152,27 +162,27 @@ interactions: Connection: - keep-alive Content-Length: - - '322' + - '368' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --version User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:06 GMT + - Thu, 01 May 2025 07:12:50 GMT expires: - '-1' pragma: @@ -183,10 +193,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/4218c141-c524-429b-8274-4ba29bed8883 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: DA821DD3CB23438AB959A78087ECD448 Ref B: MAA201060515053 Ref C: 2024-04-22T03:32:05Z' + - 'Ref A: 42F10EFFDF2D4D138F9F025B0BE656DF Ref B: SYD03EDGE1315 Ref C: 2025-05-01T07:12:49Z' status: code: 200 message: OK @@ -204,21 +218,21 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:08 GMT + - Thu, 01 May 2025 07:12:51 GMT expires: - '-1' pragma: @@ -229,8 +243,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 299495CAB13D4D1693A08B2C3A4407C1 Ref B: MAA201060515029 Ref C: 2024-04-22T03:32:08Z' + - 'Ref A: DBBEBF97594B4074891E765CF1400063 Ref B: SYD03EDGE2116 Ref C: 2025-05-01T07:12:51Z' status: code: 200 message: OK @@ -248,21 +264,21 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:10 GMT + - Thu, 01 May 2025 07:12:54 GMT expires: - '-1' pragma: @@ -273,8 +289,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: E93331D195D84ACFBED3E116F941585D Ref B: MAA201060516029 Ref C: 2024-04-22T03:32:10Z' + - 'Ref A: 8B136DE085B14A5CAA495366188AE3A7 Ref B: SYD03EDGE1121 Ref C: 2025-05-01T07:12:52Z' status: code: 200 message: OK @@ -292,21 +310,21 @@ interactions: ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:13 GMT + - Thu, 01 May 2025 07:12:55 GMT expires: - '-1' pragma: @@ -317,18 +335,21 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: AB7BB34622764DFFA98198E7F6A2067E Ref B: MAA201060513011 Ref C: 2024-04-22T03:32:12Z' + - 'Ref A: 0EB6DC962C5E4591A926EEB94E32D4C3 Ref B: SYD03EDGE0906 Ref C: 2025-05-01T07:12:54Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", - "exclusions": [{"matchVariable": "RequestHeaderNames", "selectorMatchOperator": - "Contains", "selector": "ignoreme"}], "ruleGroupOverrides": []}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [{"matchVariable": + "RequestHeaderNames", "selectorMatchOperator": "Contains", "selector": "ignoreme"}], + "ruleGroupOverrides": []}]}}}' headers: Accept: - application/json @@ -339,27 +360,27 @@ interactions: Connection: - keep-alive Content-Length: - - '466' + - '512' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '973' + - '971' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:15 GMT + - Thu, 01 May 2025 07:12:57 GMT expires: - '-1' pragma: @@ -370,10 +391,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/05bacafd-5055-4265-88de-fef66c2e8ffb + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 8D7782A3E303487BB441E35792F2AD85 Ref B: MAA201060513011 Ref C: 2024-04-22T03:32:14Z' + - 'Ref A: 279712340EA84CB095154E717543572A Ref B: SYD03EDGE0906 Ref C: 2025-05-01T07:12:56Z' status: code: 200 message: OK @@ -391,21 +416,21 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '973' + - '971' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:17 GMT + - Thu, 01 May 2025 07:12:59 GMT expires: - '-1' pragma: @@ -416,8 +441,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: F896570E1185481E85B2DED4A17B550F Ref B: MAA201060513033 Ref C: 2024-04-22T03:32:16Z' + - 'Ref A: E0FFFBBE52AA43DF867B77D522955E49 Ref B: SYD03EDGE1410 Ref C: 2025-05-01T07:12:58Z' status: code: 200 message: OK @@ -435,21 +462,21 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '973' + - '971' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:19 GMT + - Thu, 01 May 2025 07:12:59 GMT expires: - '-1' pragma: @@ -460,8 +487,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 35CC0A5983F844E4898EDA2EF724F0E4 Ref B: MAA201060513053 Ref C: 2024-04-22T03:32:18Z' + - 'Ref A: 630AA2DA0D2A4AB7832D2C42D42F2252 Ref B: SYD03EDGE1116 Ref C: 2025-05-01T07:12:59Z' status: code: 200 message: OK @@ -479,21 +508,21 @@ interactions: ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '973' + - '971' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:21 GMT + - Thu, 01 May 2025 07:13:02 GMT expires: - '-1' pragma: @@ -504,17 +533,20 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 8412FE236D5C481987AF5750F607FD6F Ref B: MAA201060514035 Ref C: 2024-04-22T03:32:20Z' + - 'Ref A: E6DC360023FA4732BB9E6DD778B8D52B Ref B: SYD03EDGE2110 Ref C: 2025-05-01T07:13:01Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", - "exclusions": [], "ruleGroupOverrides": []}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": + []}]}}}' headers: Accept: - application/json @@ -525,27 +557,27 @@ interactions: Connection: - keep-alive Content-Length: - - '366' + - '412' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:23 GMT + - Thu, 01 May 2025 07:13:04 GMT expires: - '-1' pragma: @@ -556,10 +588,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/811795bf-c6ee-41b6-afe6-fb9e0e18d791 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: A18D528CE4864DFE8CE055CD10B1FFC0 Ref B: MAA201060514035 Ref C: 2024-04-22T03:32:22Z' + - 'Ref A: 3A823C0322AE4396BA1F7C8F82191483 Ref B: SYD03EDGE2110 Ref C: 2025-05-01T07:13:02Z' status: code: 200 message: OK @@ -577,21 +613,21 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:24 GMT + - Thu, 01 May 2025 07:13:05 GMT expires: - '-1' pragma: @@ -602,8 +638,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 41483B06205840FAA850929CDE9F3FE7 Ref B: MAA201060516045 Ref C: 2024-04-22T03:32:25Z' + - 'Ref A: F40CDB7206D3481CAF63B4F7BCB8F6F0 Ref B: SYD03EDGE0919 Ref C: 2025-05-01T07:13:04Z' status: code: 200 message: OK @@ -621,21 +659,21 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:26 GMT + - Thu, 01 May 2025 07:13:06 GMT expires: - '-1' pragma: @@ -646,8 +684,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 62EC133B7DDB485A83EC43BAC9558D30 Ref B: MAA201060515011 Ref C: 2024-04-22T03:32:26Z' + - 'Ref A: 9B0DFE8A0DED488C9C0FA6DA79911A3C Ref B: SYD03EDGE1710 Ref C: 2025-05-01T07:13:06Z' status: code: 200 message: OK @@ -665,21 +705,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:29 GMT + - Thu, 01 May 2025 07:13:07 GMT expires: - '-1' pragma: @@ -690,8 +730,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 9F283F5A77164A5689689A4E589D331E Ref B: MAA201060513029 Ref C: 2024-04-22T03:32:28Z' + - 'Ref A: DD42B9D0856441F08FF729688A384B65 Ref B: SYD03EDGE2122 Ref C: 2025-05-01T07:13:06Z' status: code: 200 message: OK @@ -709,21 +751,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:31 GMT + - Thu, 01 May 2025 07:13:08 GMT expires: - '-1' pragma: @@ -734,8 +776,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 73478BA3C2EC4501882E1CAC14E4B811 Ref B: MAA201060513035 Ref C: 2024-04-22T03:32:30Z' + - 'Ref A: 6D37C43E54874578ACE8A45E49A988AA Ref B: SYD03EDGE1305 Ref C: 2025-05-01T07:13:08Z' status: code: 200 message: OK @@ -753,21 +797,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '878' + - '876' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:33 GMT + - Thu, 01 May 2025 07:13:09 GMT expires: - '-1' pragma: @@ -778,19 +822,21 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: E1A8562E7EDD4078B429FC2552C78A06 Ref B: MAA201060516033 Ref C: 2024-04-22T03:32:32Z' + - 'Ref A: 915F0B7ED166460092DDDFA952A8223E Ref B: SYD03EDGE1721 Ref C: 2025-05-01T07:13:09Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", - "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": - [{"matchVariable": "RequestHeaderNames", "selectorMatchOperator": "Contains", - "selector": "ignoreme"}]}]}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": + [{"ruleGroupName": "SQLI", "exclusions": [{"matchVariable": "RequestHeaderNames", + "selectorMatchOperator": "Contains", "selector": "ignoreme"}]}]}]}}}' headers: Accept: - application/json @@ -801,27 +847,27 @@ interactions: Connection: - keep-alive Content-Length: - - '509' + - '555' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1024' + - '1022' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:35 GMT + - Thu, 01 May 2025 07:13:10 GMT expires: - '-1' pragma: @@ -832,10 +878,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/ada74c19-2765-408a-bef2-33702a690664 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: C5D8D38B7E1146BABB827DA4B0DA2BCD Ref B: MAA201060516033 Ref C: 2024-04-22T03:32:33Z' + - 'Ref A: 2FC9BBE363644255BF88CDC12EFCFFB3 Ref B: SYD03EDGE1721 Ref C: 2025-05-01T07:13:10Z' status: code: 200 message: OK @@ -853,21 +903,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1024' + - '1022' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:37 GMT + - Thu, 01 May 2025 07:13:12 GMT expires: - '-1' pragma: @@ -878,8 +928,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: B0E8E4F615A24C09A90C503CFED68E2B Ref B: MAA201060514033 Ref C: 2024-04-22T03:32:36Z' + - 'Ref A: EE8B2CD85716413386AF03E20CBFFA27 Ref B: SYD03EDGE2118 Ref C: 2025-05-01T07:13:11Z' status: code: 200 message: OK @@ -897,21 +949,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1024' + - '1022' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:38 GMT + - Thu, 01 May 2025 07:13:13 GMT expires: - '-1' pragma: @@ -922,8 +974,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 02B4CC209AC645DDB3403C183A4C845E Ref B: MAA201060515009 Ref C: 2024-04-22T03:32:38Z' + - 'Ref A: BAA13EA46EA74467B2CCF9A50A753926 Ref B: SYD03EDGE2017 Ref C: 2025-05-01T07:13:13Z' status: code: 200 message: OK @@ -941,21 +995,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1024' + - '1022' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:40 GMT + - Thu, 01 May 2025 07:13:15 GMT expires: - '-1' pragma: @@ -966,18 +1020,20 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: F655B62072D44B7891B80D1C8D84D66D Ref B: MAA201060516029 Ref C: 2024-04-22T03:32:40Z' + - 'Ref A: B6FCD2D1F911498E8976C33AD05DB0EC Ref B: SYD03EDGE1320 Ref C: 2025-05-01T07:13:14Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", - "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": - [], "rules": []}]}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": + [{"ruleGroupName": "SQLI", "exclusions": [], "rules": []}]}]}}}' headers: Accept: - application/json @@ -988,27 +1044,27 @@ interactions: Connection: - keep-alive Content-Length: - - '422' + - '468' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --rule-group-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '929' + - '927' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:41 GMT + - Thu, 01 May 2025 07:13:17 GMT expires: - '-1' pragma: @@ -1019,10 +1075,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/797bf096-1e97-479e-899d-46bcce2a2542 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 2F38387C14E44EBFA7C6A957C6494622 Ref B: MAA201060516029 Ref C: 2024-04-22T03:32:41Z' + - 'Ref A: B209C42076B343CD9D465BC574662CEA Ref B: SYD03EDGE1320 Ref C: 2025-05-01T07:13:15Z' status: code: 200 message: OK @@ -1040,21 +1100,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '929' + - '927' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:43 GMT + - Thu, 01 May 2025 07:13:18 GMT expires: - '-1' pragma: @@ -1065,8 +1125,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 13A8BA57F4494357B875FD8327009353 Ref B: MAA201060516031 Ref C: 2024-04-22T03:32:43Z' + - 'Ref A: 34DFF3F33369475D9D8B37823283A936 Ref B: SYD03EDGE0813 Ref C: 2025-05-01T07:13:17Z' status: code: 200 message: OK @@ -1084,21 +1146,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '929' + - '927' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:46 GMT + - Thu, 01 May 2025 07:13:19 GMT expires: - '-1' pragma: @@ -1109,8 +1171,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 1C702F67B4D24C108401FB05C458D55C Ref B: MAA201060515029 Ref C: 2024-04-22T03:32:45Z' + - 'Ref A: AEBE2A3B289B4C6EB3C6F03972F476EE Ref B: SYD03EDGE1421 Ref C: 2025-05-01T07:13:18Z' status: code: 200 message: OK @@ -1129,21 +1193,21 @@ interactions: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '929' + - '927' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:48 GMT + - Thu, 01 May 2025 07:13:21 GMT expires: - '-1' pragma: @@ -1154,19 +1218,22 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: F59E2DDB31EE4A1A9C47C5F1CD17F9A0 Ref B: MAA201060516011 Ref C: 2024-04-22T03:32:47Z' + - 'Ref A: E95EF7E721494D6C8996117B44AADB57 Ref B: SYD03EDGE1520 Ref C: 2025-05-01T07:13:20Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", - "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": - [], "rules": [{"ruleId": "942100", "exclusions": [{"matchVariable": "RequestHeaderNames", - "selectorMatchOperator": "Contains", "selector": "ignoreme"}]}]}]}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": + [{"ruleGroupName": "SQLI", "exclusions": [], "rules": [{"ruleId": "942100", + "exclusions": [{"matchVariable": "RequestHeaderNames", "selectorMatchOperator": + "Contains", "selector": "ignoreme"}]}]}]}]}}}' headers: Accept: - application/json @@ -1177,28 +1244,28 @@ interactions: Connection: - keep-alive Content-Length: - - '560' + - '606' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1101' + - '1099' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:49 GMT + - Thu, 01 May 2025 07:13:23 GMT expires: - '-1' pragma: @@ -1209,10 +1276,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/f23448c9-cb06-4b0c-9176-73b49a18c785 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: D723A4383E664B7D89B93E0CECCC46BE Ref B: MAA201060516011 Ref C: 2024-04-22T03:32:48Z' + - 'Ref A: 335997FA79424AB1816A59B81C5BC24E Ref B: SYD03EDGE1520 Ref C: 2025-05-01T07:13:21Z' status: code: 200 message: OK @@ -1230,21 +1301,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1101' + - '1099' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:51 GMT + - Thu, 01 May 2025 07:13:23 GMT expires: - '-1' pragma: @@ -1255,8 +1326,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 6F39DAFB128B4FF9A6C9B71C805DF1F8 Ref B: MAA201060516023 Ref C: 2024-04-22T03:32:50Z' + - 'Ref A: 9779F52AD05E424D8A5109056BA92708 Ref B: SYD03EDGE1007 Ref C: 2025-05-01T07:13:24Z' status: code: 200 message: OK @@ -1274,21 +1347,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1101' + - '1099' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:53 GMT + - Thu, 01 May 2025 07:13:25 GMT expires: - '-1' pragma: @@ -1299,8 +1372,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: BB62E2533C52403BAFB3FF717D283EB9 Ref B: MAA201060515049 Ref C: 2024-04-22T03:32:52Z' + - 'Ref A: 87C9446626164A3C85D1F0980A8BEC95 Ref B: SYD03EDGE1919 Ref C: 2025-05-01T07:13:24Z' status: code: 200 message: OK @@ -1319,21 +1394,21 @@ interactions: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[{"matchVariable":"RequestHeaderNames","selectorMatchOperator":"Contains","selector":"ignoreme"}]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1101' + - '1099' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:55 GMT + - Thu, 01 May 2025 07:13:25 GMT expires: - '-1' pragma: @@ -1344,19 +1419,21 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: BA2795C0C5D247BDB1EA39AC8C7EEEB4 Ref B: MAA201060516009 Ref C: 2024-04-22T03:32:54Z' + - 'Ref A: C2D5B734C623458BBD2B3DCFC2EB8596 Ref B: SYD03EDGE2122 Ref C: 2025-05-01T07:13:26Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", - "requestBodyCheck": "Enabled"}, "customRules": {"rules": []}, "managedRules": - {"managedRuleSets": [{"ruleSetType": "DefaultRuleSet", "ruleSetVersion": "1.0", - "exclusions": [], "ruleGroupOverrides": [{"ruleGroupName": "SQLI", "exclusions": - [], "rules": [{"ruleId": "942100", "enabledState": "Enabled", "action": "Block", - "exclusions": []}]}]}]}}}' + "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, + "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": + "DefaultRuleSet", "ruleSetVersion": "1.0", "exclusions": [], "ruleGroupOverrides": + [{"ruleGroupName": "SQLI", "exclusions": [], "rules": [{"ruleId": "942100", + "enabledState": "Enabled", "action": "Block", "exclusions": []}]}]}]}}}' headers: Accept: - application/json @@ -1367,28 +1444,28 @@ interactions: Connection: - keep-alive Content-Length: - - '506' + - '552' Content-Type: - application/json ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --match-variable --operator --value User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1006' + - '1004' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:56 GMT + - Thu, 01 May 2025 07:13:27 GMT expires: - '-1' pragma: @@ -1399,10 +1476,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/1bf770e7-cafb-4c4c-95df-892d512ef18d + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1198' + - '799' x-msedge-ref: - - 'Ref A: AEA870D6369A46259DF0C07293295943 Ref B: MAA201060516009 Ref C: 2024-04-22T03:32:56Z' + - 'Ref A: B8833440F3A345D39DEC3F895020CDFB Ref B: SYD03EDGE2122 Ref C: 2025-05-01T07:13:26Z' status: code: 200 message: OK @@ -1420,21 +1501,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1006' + - '1004' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:32:58 GMT + - Thu, 01 May 2025 07:13:28 GMT expires: - '-1' pragma: @@ -1445,8 +1526,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 06140506F34B48C5BC62306EC9068512 Ref B: MAA201060513053 Ref C: 2024-04-22T03:32:57Z' + - 'Ref A: AB57A45E28E345DC8E1BC076D85CF03D Ref B: SYD03EDGE0713 Ref C: 2025-05-01T07:13:28Z' status: code: 200 message: OK @@ -1464,21 +1547,21 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Enabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '1006' + - '1004' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:33:00 GMT + - Thu, 01 May 2025 07:13:30 GMT expires: - '-1' pragma: @@ -1489,8 +1572,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 099704FCD72C41DB844B29ECE1C64033 Ref B: MAA201060513023 Ref C: 2024-04-22T03:33:00Z' + - 'Ref A: 71CFAAC0E19744EC9F69F7D9A654B238 Ref B: SYD03EDGE1006 Ref C: 2025-05-01T07:13:29Z' status: code: 200 message: OK diff --git a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_log_scrubbing.yaml b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_log_scrubbing.yaml index b053807dbee..c5ac2cee0d6 100644 --- a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_log_scrubbing.yaml +++ b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_log_scrubbing.yaml @@ -13,21 +13,21 @@ interactions: ParameterSetName: - -g -n --mode --sku User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"product":"azurecli","cause":"automation","test":"test_waf_log_scrubbing","date":"2024-04-22T03:33:07Z","module":"front-door"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"owner":"jingnanxu"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '364' + - '258' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:33:12 GMT + - Thu, 01 May 2025 07:40:40 GMT expires: - '-1' pragma: @@ -38,14 +38,16 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 746E81B62BC2447E86E91461395E54B7 Ref B: MAA201060515047 Ref C: 2024-04-22T03:33:12Z' + - 'Ref A: 058B502DCFDD4C8AB7CC16EA3B761B5F Ref B: SYD03EDGE2113 Ref C: 2025-05-01T07:40:41Z' status: code: 200 message: OK - request: - body: '{"location": "westus", "properties": {"policySettings": {"mode": "Prevention"}}, - "sku": {"name": "Standard_AzureFrontDoor"}}' + body: '{"location": "global", "properties": {"policySettings": {"enabledState": + "Enabled", "mode": "Prevention"}}, "sku": {"name": "Standard_AzureFrontDoor"}}' headers: Accept: - application/json @@ -56,27 +58,27 @@ interactions: Connection: - keep-alive Content-Length: - - '124' + - '151' Content-Type: - application/json ParameterSetName: - -g -n --mode --sku User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"captchaExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '763' + - '797' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:33:15 GMT + - Thu, 01 May 2025 07:40:45 GMT expires: - '-1' pragma: @@ -87,10 +89,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/9dcf0764-631a-4ee0-8319-6e09cf2df56d + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 3DC23A03F4164793B5EB196A01098E86 Ref B: MAA201060516045 Ref C: 2024-04-22T03:33:13Z' + - 'Ref A: CA1388EA760C4CF18D4A8A4DECC2E325 Ref B: SYD03EDGE1607 Ref C: 2025-05-01T07:40:41Z' status: code: 201 message: Created @@ -108,65 +114,21 @@ interactions: ParameterSetName: - -g -n --log-scrubbing User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001?api-version=2022-09-01 - response: - body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"product":"azurecli","cause":"automation","test":"test_waf_log_scrubbing","date":"2024-04-22T03:33:07Z","module":"front-door"},"properties":{"provisioningState":"Succeeded"}}' - headers: - cache-control: - - no-cache - content-length: - - '364' - content-type: - - application/json; charset=utf-8 - date: - - Mon, 22 Apr 2024 03:33:17 GMT - expires: - - '-1' - pragma: - - no-cache - strict-transport-security: - - max-age=31536000; includeSubDomains - x-cache: - - CONFIG_NOCACHE - x-content-type-options: - - nosniff - x-msedge-ref: - - 'Ref A: 997F08545E0E461D965E140E21701A6F Ref B: MAA201060514047 Ref C: 2024-04-22T03:33:17Z' - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - application/json - Accept-Encoding: - - gzip, deflate - CommandName: - - network front-door waf-policy update - Connection: - - keep-alive - ParameterSetName: - - -g -n --log-scrubbing - User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"captchaExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '763' + - '797' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:33:19 GMT + - Thu, 01 May 2025 07:40:47 GMT expires: - '-1' pragma: @@ -177,13 +139,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: A9C5A5AC62754901B124A59FB564A91C Ref B: MAA201060513009 Ref C: 2024-04-22T03:33:18Z' + - 'Ref A: 7E62B8A39E7C465180651B015A591B6A Ref B: SYD03EDGE2021 Ref C: 2025-05-01T07:40:46Z' status: code: 200 message: OK - request: - body: '{"location": "westus", "properties": {"customRules": {"rules": []}, "managedRules": + body: '{"location": "global", "properties": {"customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}, "policySettings": {"enabledState": "Enabled", "logScrubbing": {"scrubbingRules": [{"matchVariable": "QueryStringArgNames", "selectorMatchOperator": "EqualsAny"}], "state": "Enabled"}, "mode": "Prevention", "requestBodyCheck": @@ -204,21 +168,21 @@ interactions: ParameterSetName: - -g -n --log-scrubbing User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":{"state":"Enabled","scrubbingRules":[{"matchVariable":"QueryStringArgNames","selectorMatchOperator":"EqualsAny","selector":null,"state":"Enabled"}]}},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Standard_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"captchaExpirationInMinutes":null,"logScrubbing":{"state":"Enabled","scrubbingRules":[{"matchVariable":"QueryStringArgNames","selectorMatchOperator":"EqualsAny","selector":null,"state":"Enabled"}]}},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '907' + - '941' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:33:20 GMT + - Thu, 01 May 2025 07:40:49 GMT expires: - '-1' pragma: @@ -229,10 +193,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/f85842ef-3ef8-423d-85a3-ecaac3934c9d + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1198' + - '799' x-msedge-ref: - - 'Ref A: 4E9DB7DE73704BBEAA3E2C0D346D7BCB Ref B: MAA201060513009 Ref C: 2024-04-22T03:33:19Z' + - 'Ref A: 18904C3C5EA646C8942B2EBF1C8D520A Ref B: SYD03EDGE2021 Ref C: 2025-05-01T07:40:47Z' status: code: 200 message: OK diff --git a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rule_matching.yaml b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rule_matching.yaml index bc3dc88a8bc..1f3a7dd2c65 100644 --- a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rule_matching.yaml +++ b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_custom_rule_matching.yaml @@ -11,23 +11,23 @@ interactions: Connection: - keep-alive ParameterSetName: - - --resource-group --name + - --resource-group --name --sku User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"product":"azurecli","cause":"automation","test":"test_waf_policy_custom_rule_matching","date":"2024-04-22T03:34:06Z","module":"front-door"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"owner":"jingnanxu"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '378' + - '258' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:11 GMT + - Thu, 01 May 2025 07:29:09 GMT expires: - '-1' pragma: @@ -38,13 +38,16 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 8A62CE2439724BF58F4BAE8B7042C733 Ref B: MAA201060515011 Ref C: 2024-04-22T03:34:12Z' + - 'Ref A: A8D2F2F274C048458E3E273BD979E154 Ref B: SYD03EDGE1521 Ref C: 2025-05-01T07:29:08Z' status: code: 200 message: OK - request: - body: '{"location": "westus"}' + body: '{"location": "global", "properties": {"policySettings": {"enabledState": + "Enabled"}}, "sku": {"name": "Classic_AzureFrontDoor"}}' headers: Accept: - application/json @@ -55,27 +58,27 @@ interactions: Connection: - keep-alive Content-Length: - - '22' + - '128' Content-Type: - application/json ParameterSetName: - - --resource-group --name + - --resource-group --name --sku User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"captchaExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '762' + - '796' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:15 GMT + - Thu, 01 May 2025 07:29:15 GMT expires: - '-1' pragma: @@ -86,10 +89,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/ed56166e-8ffc-444b-ba78-03d551859b86 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: D9BDBABBDE134DC891DD4BA35A4A862D Ref B: MAA201060516027 Ref C: 2024-04-22T03:34:13Z' + - 'Ref A: BF0E3630D4514FB0A5DC8F554CA90098 Ref B: SYD03EDGE1414 Ref C: 2025-05-01T07:29:10Z' status: code: 201 message: Created @@ -107,12 +114,12 @@ interactions: ParameterSetName: - -g --policy-name -n --priority --rule-type --action --defer User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -121,7 +128,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:17 GMT + - Thu, 01 May 2025 07:29:17 GMT expires: - '-1' pragma: @@ -132,13 +139,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: DDC1DC097F8E44D4BB0B3C296397B91D Ref B: MAA201060516019 Ref C: 2024-04-22T03:34:17Z' + - 'Ref A: BD8D74CAE91A4F1FA25AAD599EF6D53A Ref B: SYD03EDGE0907 Ref C: 2025-05-01T07:29:16Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Classic_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Enabled"}, "customRules": {"rules": [{"name": "cli000003", "priority": 6, "enabledState": "Enabled", "ruleType": "MatchRule", "matchConditions": @@ -160,12 +169,12 @@ interactions: ParameterSetName: - -g --policy-name -n --match-variable --operator --values User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":6,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"matchConditions":[{"matchVariable":"RequestBody","selector":null,"operator":"RegEx","negateCondition":false,"matchValue":["something"],"transforms":[]}],"action":"Block","groupBy":[]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Classic_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":null,"logScrubbing":null},"customRules":{"rules":[{"name":"cli000003","enabledState":"Enabled","priority":6,"ruleType":"MatchRule","rateLimitDurationInMinutes":null,"rateLimitThreshold":null,"matchConditions":[{"matchVariable":"RequestBody","selector":null,"operator":"RegEx","negateCondition":false,"matchValue":["something"],"transforms":[]}],"action":"Block","groupBy":[]}]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -174,7 +183,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:19 GMT + - Thu, 01 May 2025 07:29:21 GMT expires: - '-1' pragma: @@ -185,10 +194,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/0c403c46-57b7-4f8e-92a7-51befc444624 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 9F414BA3D6464B53A426ABB99170CEAA Ref B: MAA201060515045 Ref C: 2024-04-22T03:34:19Z' + - 'Ref A: F7B9223D1B304681805569365781E65E Ref B: SYD03EDGE1321 Ref C: 2025-05-01T07:29:18Z' status: code: 200 message: OK @@ -227,15 +240,15 @@ interactions: ParameterSetName: - --resource-group --backend-address --name User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/cli000004?api-version=2021-06-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Creating","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"d972eb52-21a0-443d-a6c6-f2cc8a48f2b7","extendedProperties":{},"resourceState":"Creating","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Creating","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Creating","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Creating","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Creating","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":null,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Creating"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Creating","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"3d97360f-166e-4a79-9626-f6ed896061d1","extendedProperties":{},"resourceState":"Creating","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Creating","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Creating","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Creating","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Creating","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":null,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Creating"}}' headers: azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/746178f2-cc4a-49de-960a-79d48d89cbb7?api-version=2021-06-01&t=638493536652906864&c=MIIHADCCBeigAwIBAgITHgPr-Oynpc11nukqPwAAA-v47DANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwMjAxMTUzMzMzWhcNMjUwMTI2MTUzMzMzWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL0fVpJv9HfZ9lDyFsKVf2PJgsZDMFA6khnm_67kUV0KDb8vTd3bmnw1UYl75g2Cp9GDvvaCqKVn-aux3TWe11D61vAtFcTPbNvezESM6bHR-RV1e4LhXUIl6PZRcIE65rk0bYF8P1O_zZ4mpWHx99Mc9gSe6E2sqh_sWRIuE4mSXNxVzzmndknLOkcDnqNl9Kt1VpXt5orBSwAV74sCBJuvzSE7MEW2kHUJtqzGWoXvf5pm-rYfwqhQa3HLjUMj7xbwzsBDtEn2ZYJLlqJqIps5iVHixHPn8k6opx-9FVP2u009BccFRDwiVl1b6xWXhwzq58hYtdYc3SoMCcWMtf0CAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBABwCQ0hRgTzuMiiq8PUrVdDBN8_c3HcEZsxdazvy4RNcw_7WjYA3QdRzVtaOAEfPq6GrfCF7n8qlpXjMSOq5Oc-mL6EwulQAybtx4RxY0zI5tDTHfITDo2FVSa6thj9WVlgOF2UxNbopXBAYpN-fbgUTanBsphWY2F_Kz_VKFv-4UXHwyNiDa3wpaQrmQ2urunWos3lEhx0aRKdNTZwjJtK78rfIazNccJHT1LHpWU7i8XEBYP_RzftkGhoEhofdnth4t99G4Clw9RBOC8Km1SZ7zJTtaYcCU-NXSzWQgWTQeGMwo5CnvADN5uPXz3aUMxAukDY-ed4wPldjzzJFmzk&s=nPnstUEolHRmehJDEQS7XEbxPvQPpWAbE6ElzDpXhdB_GsDOiJg42OlenrGPt1m5btJEdeg5UCR5zi0D10c4_ftjOFINj4_L-ajQ9_hYJKPVGU5ID7dJQMFz_4UmBS9LSjKZB1xlkeqw3pweDD2uTa4YtC2RyKlqsVbxYawZLulYpXtfqwDVYHG9sqyOPZ1hVWBo0k0_q8VJq94u9_w2r6ZxpTCT_LJDcDGIdUOI5whHMotZ2MZ8niTO9fquwmwfpYRB38YXj6oGR0qKy1xIg5PjeTpZElbWWW-1yI5czNc_sKXwBPTveHx8Z3o9wf2NvCPpwT3kXTM3Zo3WU4dAQw&h=gv95cLlN47EviBpktJm1sthWFgQowf4Yek5VLNdz-XA + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/97753918-8d6c-406c-a2ca-ae59e83dc32d?api-version=2021-06-01&t=638816813668438200&c=MIIHhzCCBm-gAwIBAgITHgbNPFSSw01fLY31NAAABs08VDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjUwNDIwMTYxMzA1WhcNMjUxMDE3MTYxMzA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK9_WbkUwtKTmXs3lhPVCIa37QoahEPtFvUMKk28MzwN9Tq4BvL0LOzchsAvGOx_dQ9ItOZrLi-iLS0DeUD2cyAIo2s7lG1NyC1WmCUW5UFJ9sG28v2BkySSWGNB5Fz9DuiK15zZ5UMv8Pn_Ji25Jpq45BNyfzCM_BegBlWZdJE_cye9mz7ldfqXsYzP-vWfDvBr5dc5WfWso2GgEOv29scH724Cp8SgDn8YAtiY-Lp6yjgs9-J2j1MC4mLP_bXCTAPAK7vTkD-qOo_dnj7JU_vXzAbAv2o-EXpH7MIhc2c8pspYfjLOYQrfAR9rVypexpg8U8saq6S6X1GhVmRcn_kCAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAAKRhA1IScu7m3zGtHa7Jf0yXY9taecKaI7DnOqw4p6soWb1-OhHM4dPSSUza0AqnzTeXifKedb-PrbjwVwUnf4znUf5Q18bI7klLziLZLoCp-S7EynlSCCBoTWaKoK-nexPAt90elRyWWVfzWDCewTfmQAuJkaV-DGST4sqEwvaEeV7SWNkoZ8WY9AvMZTKePC-FPsq_c14G7upN3fxzCrv730QqVUlrfzZyIYUpeWJfQp5QTdepXag42kcHVeWqFexDkx-YP5SE6DI3JaJh5bmrdGP9s0AFHH8HcjPuL0o1lU0A7O1KbOsCCRH4rgNno9Nj-PUrRK4tAG3dCCih4M&s=oStO7iG-szEw3bHpqLx8nK0BSf2ggznK1IATGvQUHwNOvSl9w6rn7ySijdRU04agR1Dy_f3SdzUROpx5eXZNXfMbHcj4-OZ0lGHz5Tl02dMBezySkkERHSv95RqZsDk8fj_FzlwiJ1Qq8ZM504Y2KWr45-JAG4uKmKXeosXqZTI3OvVhmc6cCvTxXBF0-zeItHJRL602oGsXvQiSkmxOl2E1HfXGeksugiXx5C9ZvdepvoJ4-iKjK1UpsoYs7Drl5pXW20saVA7jS8Th5eOhWOBxHRtwkcAQMScnavSq_sle9QECPUotmwMpRJpk8CPHA5LN_zYUkv6gAfiUw3fmig&h=e1O4YDE001RgyLSruadFyyZSFwK5KoRwoijJhF0u9_g cache-control: - no-cache content-length: @@ -243,7 +256,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:25 GMT + - Thu, 01 May 2025 07:29:25 GMT expires: - '-1' pragma: @@ -254,10 +267,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/1f8d13eb-1b50-4dec-aa63-562dbe56e7cd + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 739E7C16B40E45718DAAB806BC872DFF Ref B: MAA201060514037 Ref C: 2024-04-22T03:34:21Z' + - 'Ref A: DA4584BF1546487790D0400693A365FE Ref B: SYD03EDGE1421 Ref C: 2025-05-01T07:29:22Z' status: code: 201 message: Created @@ -275,9 +292,9 @@ interactions: ParameterSetName: - --resource-group --backend-address --name User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/746178f2-cc4a-49de-960a-79d48d89cbb7?api-version=2021-06-01&t=638493536652906864&c=MIIHADCCBeigAwIBAgITHgPr-Oynpc11nukqPwAAA-v47DANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwMjAxMTUzMzMzWhcNMjUwMTI2MTUzMzMzWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL0fVpJv9HfZ9lDyFsKVf2PJgsZDMFA6khnm_67kUV0KDb8vTd3bmnw1UYl75g2Cp9GDvvaCqKVn-aux3TWe11D61vAtFcTPbNvezESM6bHR-RV1e4LhXUIl6PZRcIE65rk0bYF8P1O_zZ4mpWHx99Mc9gSe6E2sqh_sWRIuE4mSXNxVzzmndknLOkcDnqNl9Kt1VpXt5orBSwAV74sCBJuvzSE7MEW2kHUJtqzGWoXvf5pm-rYfwqhQa3HLjUMj7xbwzsBDtEn2ZYJLlqJqIps5iVHixHPn8k6opx-9FVP2u009BccFRDwiVl1b6xWXhwzq58hYtdYc3SoMCcWMtf0CAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBR1fq2N8kAQnlwHFZuqRYZ3nIu5LjAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBABwCQ0hRgTzuMiiq8PUrVdDBN8_c3HcEZsxdazvy4RNcw_7WjYA3QdRzVtaOAEfPq6GrfCF7n8qlpXjMSOq5Oc-mL6EwulQAybtx4RxY0zI5tDTHfITDo2FVSa6thj9WVlgOF2UxNbopXBAYpN-fbgUTanBsphWY2F_Kz_VKFv-4UXHwyNiDa3wpaQrmQ2urunWos3lEhx0aRKdNTZwjJtK78rfIazNccJHT1LHpWU7i8XEBYP_RzftkGhoEhofdnth4t99G4Clw9RBOC8Km1SZ7zJTtaYcCU-NXSzWQgWTQeGMwo5CnvADN5uPXz3aUMxAukDY-ed4wPldjzzJFmzk&s=nPnstUEolHRmehJDEQS7XEbxPvQPpWAbE6ElzDpXhdB_GsDOiJg42OlenrGPt1m5btJEdeg5UCR5zi0D10c4_ftjOFINj4_L-ajQ9_hYJKPVGU5ID7dJQMFz_4UmBS9LSjKZB1xlkeqw3pweDD2uTa4YtC2RyKlqsVbxYawZLulYpXtfqwDVYHG9sqyOPZ1hVWBo0k0_q8VJq94u9_w2r6ZxpTCT_LJDcDGIdUOI5whHMotZ2MZ8niTO9fquwmwfpYRB38YXj6oGR0qKy1xIg5PjeTpZElbWWW-1yI5czNc_sKXwBPTveHx8Z3o9wf2NvCPpwT3kXTM3Zo3WU4dAQw&h=gv95cLlN47EviBpktJm1sthWFgQowf4Yek5VLNdz-XA + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/97753918-8d6c-406c-a2ca-ae59e83dc32d?api-version=2021-06-01&t=638816813668438200&c=MIIHhzCCBm-gAwIBAgITHgbNPFSSw01fLY31NAAABs08VDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjUwNDIwMTYxMzA1WhcNMjUxMDE3MTYxMzA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK9_WbkUwtKTmXs3lhPVCIa37QoahEPtFvUMKk28MzwN9Tq4BvL0LOzchsAvGOx_dQ9ItOZrLi-iLS0DeUD2cyAIo2s7lG1NyC1WmCUW5UFJ9sG28v2BkySSWGNB5Fz9DuiK15zZ5UMv8Pn_Ji25Jpq45BNyfzCM_BegBlWZdJE_cye9mz7ldfqXsYzP-vWfDvBr5dc5WfWso2GgEOv29scH724Cp8SgDn8YAtiY-Lp6yjgs9-J2j1MC4mLP_bXCTAPAK7vTkD-qOo_dnj7JU_vXzAbAv2o-EXpH7MIhc2c8pspYfjLOYQrfAR9rVypexpg8U8saq6S6X1GhVmRcn_kCAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAAKRhA1IScu7m3zGtHa7Jf0yXY9taecKaI7DnOqw4p6soWb1-OhHM4dPSSUza0AqnzTeXifKedb-PrbjwVwUnf4znUf5Q18bI7klLziLZLoCp-S7EynlSCCBoTWaKoK-nexPAt90elRyWWVfzWDCewTfmQAuJkaV-DGST4sqEwvaEeV7SWNkoZ8WY9AvMZTKePC-FPsq_c14G7upN3fxzCrv730QqVUlrfzZyIYUpeWJfQp5QTdepXag42kcHVeWqFexDkx-YP5SE6DI3JaJh5bmrdGP9s0AFHH8HcjPuL0o1lU0A7O1KbOsCCRH4rgNno9Nj-PUrRK4tAG3dCCih4M&s=oStO7iG-szEw3bHpqLx8nK0BSf2ggznK1IATGvQUHwNOvSl9w6rn7ySijdRU04agR1Dy_f3SdzUROpx5eXZNXfMbHcj4-OZ0lGHz5Tl02dMBezySkkERHSv95RqZsDk8fj_FzlwiJ1Qq8ZM504Y2KWr45-JAG4uKmKXeosXqZTI3OvVhmc6cCvTxXBF0-zeItHJRL602oGsXvQiSkmxOl2E1HfXGeksugiXx5C9ZvdepvoJ4-iKjK1UpsoYs7Drl5pXW20saVA7jS8Th5eOhWOBxHRtwkcAQMScnavSq_sle9QECPUotmwMpRJpk8CPHA5LN_zYUkv6gAfiUw3fmig&h=e1O4YDE001RgyLSruadFyyZSFwK5KoRwoijJhF0u9_g response: body: string: '{"status":"InProgress","error":{"code":"None","message":null}}' @@ -289,7 +306,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:26 GMT + - Thu, 01 May 2025 07:29:27 GMT expires: - '-1' pragma: @@ -300,8 +317,12 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/d1af411d-b78d-40c5-b6e0-5f9a0d7a0eb9 + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 37E7EA89990644798686DBDFC9AA9081 Ref B: MAA201060514037 Ref C: 2024-04-22T03:34:25Z' + - 'Ref A: 4D67A56F94284FF2B749D45C9F6072BB Ref B: SYD03EDGE1421 Ref C: 2025-05-01T07:29:26Z' status: code: 200 message: OK @@ -319,9 +340,9 @@ interactions: ParameterSetName: - --resource-group --backend-address --name User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/746178f2-cc4a-49de-960a-79d48d89cbb7?api-version=2021-06-01&t=638493536652906864&c=MIIHADCCBeigAwIBAgITHgPr-Oynpc11nukqPwAAA-v47DANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjQwMjAxMTUzMzMzWhcNMjUwMTI2MTUzMzMzWjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAL0fVpJv9HfZ9lDyFsKVf2PJgsZDMFA6khnm_67kUV0KDb8vTd3bmnw1UYl75g2Cp9GDvvaCqKVn-aux3TWe11D61vAtFcTPbNvezESM6bHR-RV1e4LhXUIl6PZRcIE65rk0bYF8P1O_zZ4mpWHx99Mc9gSe6E2sqh_sWRIuE4mSXNxVzzmndknLOkcDnqNl9Kt1VpXt5orBSwAV74sCBJuvzSE7MEW2kHUJtqzGWoXvf5pm-rYfwqhQa3HLjUMj7xbwzsBDtEn2ZYJLlqJqIps5iVHixHPn8k6opx-9FVP2u009BccFRDwiVl1b6xWXhwzq58hYtdYc3SoMCcWMtf0CAwEAAaOCA-0wggPpMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-hZvdFs6dEoFggvX2K4Py0SACAWQCAQowggHLBggrBgEFBQcBAQSCAb0wggG5MGMGCCsGAQUFBzAChldodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ2VydHMvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmwxLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MFMGCCsGAQUFBzAChkdodHRwOi8vY3JsMi5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAyLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDA2LmNydDBTBggrBgEFBQcwAoZHaHR0cDovL2NybDMuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMi5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwNi5jcnQwUwYIKwYBBQUHMAKGR2h0dHA6Ly9jcmw0LmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDIuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3J0MB0GA1UdDgQWBBR1fq2N8kAQnlwHFZuqRYZ3nIu5LjAOBgNVHQ8BAf8EBAMCBaAwggEmBgNVHR8EggEdMIIBGTCCARWgggERoIIBDYY_aHR0cDovL2NybC5taWNyb3NvZnQuY29tL3BraWluZnJhL0NSTC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMS5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMi5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsMy5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JshjFodHRwOi8vY3JsNC5hbWUuZ2JsL2NybC9BTUUlMjBJbmZyYSUyMENBJTIwMDYuY3JsMBcGA1UdIAQQMA4wDAYKKwYBBAGCN3sBATAfBgNVHSMEGDAWgBTxRmjG8cPwKy19i2rhsvm-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBABwCQ0hRgTzuMiiq8PUrVdDBN8_c3HcEZsxdazvy4RNcw_7WjYA3QdRzVtaOAEfPq6GrfCF7n8qlpXjMSOq5Oc-mL6EwulQAybtx4RxY0zI5tDTHfITDo2FVSa6thj9WVlgOF2UxNbopXBAYpN-fbgUTanBsphWY2F_Kz_VKFv-4UXHwyNiDa3wpaQrmQ2urunWos3lEhx0aRKdNTZwjJtK78rfIazNccJHT1LHpWU7i8XEBYP_RzftkGhoEhofdnth4t99G4Clw9RBOC8Km1SZ7zJTtaYcCU-NXSzWQgWTQeGMwo5CnvADN5uPXz3aUMxAukDY-ed4wPldjzzJFmzk&s=nPnstUEolHRmehJDEQS7XEbxPvQPpWAbE6ElzDpXhdB_GsDOiJg42OlenrGPt1m5btJEdeg5UCR5zi0D10c4_ftjOFINj4_L-ajQ9_hYJKPVGU5ID7dJQMFz_4UmBS9LSjKZB1xlkeqw3pweDD2uTa4YtC2RyKlqsVbxYawZLulYpXtfqwDVYHG9sqyOPZ1hVWBo0k0_q8VJq94u9_w2r6ZxpTCT_LJDcDGIdUOI5whHMotZ2MZ8niTO9fquwmwfpYRB38YXj6oGR0qKy1xIg5PjeTpZElbWWW-1yI5czNc_sKXwBPTveHx8Z3o9wf2NvCPpwT3kXTM3Zo3WU4dAQw&h=gv95cLlN47EviBpktJm1sthWFgQowf4Yek5VLNdz-XA + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/97753918-8d6c-406c-a2ca-ae59e83dc32d?api-version=2021-06-01&t=638816813668438200&c=MIIHhzCCBm-gAwIBAgITHgbNPFSSw01fLY31NAAABs08VDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDYwHhcNMjUwNDIwMTYxMzA1WhcNMjUxMDE3MTYxMzA1WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAK9_WbkUwtKTmXs3lhPVCIa37QoahEPtFvUMKk28MzwN9Tq4BvL0LOzchsAvGOx_dQ9ItOZrLi-iLS0DeUD2cyAIo2s7lG1NyC1WmCUW5UFJ9sG28v2BkySSWGNB5Fz9DuiK15zZ5UMv8Pn_Ji25Jpq45BNyfzCM_BegBlWZdJE_cye9mz7ldfqXsYzP-vWfDvBr5dc5WfWso2GgEOv29scH724Cp8SgDn8YAtiY-Lp6yjgs9-J2j1MC4mLP_bXCTAPAK7vTkD-qOo_dnj7JU_vXzAbAv2o-EXpH7MIhc2c8pspYfjLOYQrfAR9rVypexpg8U8saq6S6X1GhVmRcn_kCAwEAAaOCBHQwggRwMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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-NfzRQTAdBgNVHSUEFjAUBggrBgEFBQcDAQYIKwYBBQUHAwIwDQYJKoZIhvcNAQELBQADggEBAAKRhA1IScu7m3zGtHa7Jf0yXY9taecKaI7DnOqw4p6soWb1-OhHM4dPSSUza0AqnzTeXifKedb-PrbjwVwUnf4znUf5Q18bI7klLziLZLoCp-S7EynlSCCBoTWaKoK-nexPAt90elRyWWVfzWDCewTfmQAuJkaV-DGST4sqEwvaEeV7SWNkoZ8WY9AvMZTKePC-FPsq_c14G7upN3fxzCrv730QqVUlrfzZyIYUpeWJfQp5QTdepXag42kcHVeWqFexDkx-YP5SE6DI3JaJh5bmrdGP9s0AFHH8HcjPuL0o1lU0A7O1KbOsCCRH4rgNno9Nj-PUrRK4tAG3dCCih4M&s=oStO7iG-szEw3bHpqLx8nK0BSf2ggznK1IATGvQUHwNOvSl9w6rn7ySijdRU04agR1Dy_f3SdzUROpx5eXZNXfMbHcj4-OZ0lGHz5Tl02dMBezySkkERHSv95RqZsDk8fj_FzlwiJ1Qq8ZM504Y2KWr45-JAG4uKmKXeosXqZTI3OvVhmc6cCvTxXBF0-zeItHJRL602oGsXvQiSkmxOl2E1HfXGeksugiXx5C9ZvdepvoJ4-iKjK1UpsoYs7Drl5pXW20saVA7jS8Th5eOhWOBxHRtwkcAQMScnavSq_sle9QECPUotmwMpRJpk8CPHA5LN_zYUkv6gAfiUw3fmig&h=e1O4YDE001RgyLSruadFyyZSFwK5KoRwoijJhF0u9_g response: body: string: '{"status":"Succeeded","error":{"code":"None","message":null}}' @@ -333,7 +354,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:57 GMT + - Thu, 01 May 2025 07:29:59 GMT expires: - '-1' pragma: @@ -344,8 +365,12 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/fbb554b4-1ee0-4886-ba7d-56b0a145dfac + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 2718263F9B7640E084498DB7ECC80FA9 Ref B: MAA201060514037 Ref C: 2024-04-22T03:34:56Z' + - 'Ref A: 0876393874CC4CB287B0026E78F897CB Ref B: SYD03EDGE1421 Ref C: 2025-05-01T07:29:58Z' status: code: 200 message: OK @@ -363,12 +388,12 @@ interactions: ParameterSetName: - --resource-group --backend-address --name User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/cli000004?api-version=2021-06-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"d972eb52-21a0-443d-a6c6-f2cc8a48f2b7","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":null,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"3d97360f-166e-4a79-9626-f6ed896061d1","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":null,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -377,7 +402,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:34:58 GMT + - Thu, 01 May 2025 07:30:01 GMT expires: - '-1' pragma: @@ -388,8 +413,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 7998D2DBFA384972A36453E5B2A5FFC9 Ref B: MAA201060514037 Ref C: 2024-04-22T03:34:57Z' + - 'Ref A: 704EF8A8F778466BB0B4BFBE70FA194C Ref B: SYD03EDGE1421 Ref C: 2025-05-01T07:29:59Z' status: code: 200 message: OK @@ -407,12 +434,12 @@ interactions: ParameterSetName: - --name --resource-group --set User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/cli000004?api-version=2021-06-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"d972eb52-21a0-443d-a6c6-f2cc8a48f2b7","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":null,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"3d97360f-166e-4a79-9626-f6ed896061d1","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":null,"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -421,7 +448,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:35:00 GMT + - Thu, 01 May 2025 07:30:03 GMT expires: - '-1' pragma: @@ -432,8 +459,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 08046EFC1ABC4CD098D2D6A268C42BE0 Ref B: MAA201060513017 Ref C: 2024-04-22T03:34:59Z' + - 'Ref A: 4AD6D2ECCFB54E16A1D9F72534898DD6 Ref B: SYD03EDGE0915 Ref C: 2025-05-01T07:30:01Z' status: code: 200 message: OK @@ -477,15 +506,15 @@ interactions: ParameterSetName: - --name --resource-group --set User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/cli000004?api-version=2021-06-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"d972eb52-21a0-443d-a6c6-f2cc8a48f2b7","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002"},"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"3d97360f-166e-4a79-9626-f6ed896061d1","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002"},"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' headers: azure-asyncoperation: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/12f53389-4a91-4289-8b6a-8f5bb7eb4a52?api-version=2021-06-01&t=638493537059208184&c=MIIHrTCCBpWgAwIBAgITfwLBjXw4zjrTc5t5NAAEAsGNfDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDIwHhcNMjQwMzA0MDE1ODIwWhcNMjUwMjI3MDE1ODIwWjCBjDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xPjA8BgNVBAMTNWFzeW5jb3BlcmF0aW9uc2lnbmluZ2NlcnRpZmljYXRlLm1hbmFnZW1lbnQuYXp1cmUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvtNWzX7Z4RXasqNpidaHzNujkmKIyeVQ0-WDwUq-xuI9MngwGfjp7c7s5Xb8FEMqNdZ1xARSX0cBqqPaGRNWlUq2dptWsjU2XASz899FGoiPCAP0Hw1IzLGB5egvgqEb0tCLMFDKHps1ibdq1zbzi7_t6RAzAiBv_Y0HV0WGZ80NUuUhFFUdf94u96e-8r6L7dz9zEXWHApvUxiDHDGAKil_Vll-2CU3hoBQYCEkwSHgBwBBs9_wCw27ArDoCA1tO2_8aMdCvk4KfT8pZ7Qxj12bxHYzURqOlVVjmkCF9mTAoAagk9JTqwWwqjpUNl2v4QcVNmeI6T51P82qPWqbzQIDAQABo4IETTCCBEkwJwYJKwYBBAGCNxUKBBowGDAKBggrBgEFBQcDATAKBggrBgEFBQcDAjA9BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiGkOMNhNW0eITxiz6Fm90Wzp0SgWCC9fYrg_LRIAIBZAIBCjCCAdoGCCsGAQUFBwEBBIIBzDCCAcgwZgYIKwYBBQUHMAKGWmh0dHA6Ly9jcmwubWljcm9zb2Z0LmNvbS9wa2lpbmZyYS9DZXJ0cy9CTDJQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDAyKDQpLmNydDBWBggrBgEFBQcwAoZKaHR0cDovL2NybDEuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcnQwVgYIKwYBBQUHMAKGSmh0dHA6Ly9jcmwyLmFtZS5nYmwvYWlhL0JMMlBLSUlOVENBMDEuQU1FLkdCTF9BTUUlMjBJbmZyYSUyMENBJTIwMDIoNCkuY3J0MFYGCCsGAQUFBzAChkpodHRwOi8vY3JsMy5hbWUuZ2JsL2FpYS9CTDJQS0lJTlRDQTAxLkFNRS5HQkxfQU1FJTIwSW5mcmElMjBDQSUyMDAyKDQpLmNydDBWBggrBgEFBQcwAoZKaHR0cDovL2NybDQuYW1lLmdibC9haWEvQkwyUEtJSU5UQ0EwMS5BTUUuR0JMX0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcnQwHQYDVR0OBBYEFH0WB2hDveCytfalzMbzM6A_u3fJMA4GA1UdDwEB_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_TvdS1UGS1bLXbc7WCmjz1SY2cbMWSy7F1JLL2cdtJQunrfzR8hinuMeynkkpEAWzLv-QEzW5c6bJ9MOBQKfcP-JVyIpUJTWKeWGEPwiH986PrB3MvzN6AaYRL6CdZPVlNl9TwhL8Uom3OFDx0m0mLdYvyfeTEW_Ifuil7NDR_sTJXNqBOg38-06i2DKZdwNcx92E3UsgW_avrTtx_jeUivpCTrRXRgXa814xZxBcvZTeyOe9yzKJxcM6_QIGW97JT9oBXaCceQ2KQgaD0FQLAWSANWbHqNf6Wzz3Osu0t0UO57HorMxIM1ZHA2wKetsyhuX8yzeGvnoQ&s=hGxj0NO6RbLmZ8feLLH06KYCdPb9JjKVf7-NyiAgmhmQxvqq5iPEzrwqYPaJqCubw04m5ZPklWDDifo8h8fB-ObfSaaWauTnc_A9x_dM72S-l-JvsBBlzT6BvWgI9SkTWPeCO2bouhl4UnWwyDCcDd1vOSF9ONKgY8J5Wo4BASBvqxg0jXxX19LncxvDM2kEnOvAt3Ej8jWEOo9y2-gshighmpXViCCm0JqFaMqTDi2uuCBOC51vzpGSyupl5sQ0I4JMR55_ncT63n-yeyzUw82K_9ExrGWjNWsdNBWsDVCHjz42OWeIMUeTLPKwZ7XHhjnvLnob8JRIf3ABadIinA&h=ZCMG6CWkATg70i7obv0TapaMXdb1nyS6MOjWGBTjRJI + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/c7ba0752-aba2-43d1-bb92-f41615bc3ace?api-version=2021-06-01&t=638816814065167089&c=MIIHpTCCBo2gAwIBAgITfwV1XFBM14xxqYIqEgAEBXVcUDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDIwHhcNMjUwNDIwMTQ1OTM3WhcNMjUxMDE3MTQ1OTM3WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANlxIFJqNN_OufUB10c86078n914r2WPITqQ7XIuNjZ3kKFyJfNTPH9FCgXYcFiZyl31-F519KwpAfPU6ZaDGIAFAGVh7uwm0NddEAeZQMryzM0oLIhpawnErtAgi6xebrBkm0o-m6f_MCJGLUai_vdl1aFF-tvHldU0S1BX9f1UEIxoQxYWtSOf1UldgltKscFsAHqF-g4qmkAIrV0Ox5br72D_Xh88YTwytDn9B_8bZDAEXu__M70zYUYp_rtk4Xh0DblPC3f_ygvya4-UPS0051jbJELzA01aKbASDBa1KuzLpbmuK1NeDS-BkZ703MlU9CqT5v5GQL801MWZ85UCAwEAAaOCBJIwggSOMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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_D90nsX9dNeMEROR-3mF-w5R8A8iq4ZfHbQbtBrIGJnQoGhHpbItIox0cOCH9GhDmvlEesTxLvmiLl3pdRs70eK90tbUxYsQDNN4tsfl3m3B_-Jk0Z12D2-vckHNA6jB1q620KCtft5LW2gLJmS80-AhisqwYMsx6N_aw69y5XNbtBDVyAgCI7zlxtLRZmQtkrE1rPDjvXy6aC6UgdnWx__LK9KqedcOuXWaQ_xJ9LaUUb2wC39Orm3cmx_Hrt72kMh9ebwnnoaRZNa31wA6zJerb5-oruoIMyiHfTTykazrioLX6feYqUmMI6CpAN_nGyQAlSg5uO8pYDiaCc&s=EMnWD740pFfbyo_GJVE1izKncL4z_R56lY_MzKVb_9E8oN8rczmUA0xOunXoSz_OyYOC2Zxl270TYO04K62V2JneQHAOb_aja6hSraQqT1DTH_56gNWPyEFVpJ_pcqA9lB6SAjYcKNvXyn3koWCgIkxeeHsiwrm2SoOWXKLFKqm9VkG2_06KSSXy0GvX7h0gzXb6lWMgcKv7ucGo3vheQYHn52KVYk5_DGeS0nUof02XjTc7gZZnBir4GS_PmtErdOWJipd2HLQqMYNW5ADjI1PTc-qjCxAtqq9LGVcRyNhXD8IIlJ3RjoqMufUTloqeFB1UN2Q8GE57SX8C0LH21w&h=cGjeypAt6zaaQf2k2nhhUMoE60neU-7sCY9frbMrQAc cache-control: - no-cache content-length: @@ -493,11 +522,11 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:35:05 GMT + - Thu, 01 May 2025 07:30:06 GMT expires: - '-1' location: - - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/12f53389-4a91-4289-8b6a-8f5bb7eb4a52/frontdoorresults/cli000004?api-version=2021-06-01 + - https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/c7ba0752-aba2-43d1-bb92-f41615bc3ace/frontdoorresults/cli000004?api-version=2021-06-01 pragma: - no-cache strict-transport-security: @@ -506,10 +535,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/70199951-418e-43cf-86f9-ebd1e269b2f4 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: D51AEFBCC77745CC98039DF965437AEB Ref B: MAA201060516047 Ref C: 2024-04-22T03:35:02Z' + - 'Ref A: AC19F27FE4AB4A9B8E2B671E4AC9A048 Ref B: SYD03EDGE1111 Ref C: 2025-05-01T07:30:03Z' status: code: 202 message: Accepted @@ -527,9 +560,9 @@ interactions: ParameterSetName: - --name --resource-group --set User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/12f53389-4a91-4289-8b6a-8f5bb7eb4a52?api-version=2021-06-01&t=638493537059208184&c=MIIHrTCCBpWgAwIBAgITfwLBjXw4zjrTc5t5NAAEAsGNfDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDIwHhcNMjQwMzA0MDE1ODIwWhcNMjUwMjI3MDE1ODIwWjCBjDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xPjA8BgNVBAMTNWFzeW5jb3BlcmF0aW9uc2lnbmluZ2NlcnRpZmljYXRlLm1hbmFnZW1lbnQuYXp1cmUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvtNWzX7Z4RXasqNpidaHzNujkmKIyeVQ0-WDwUq-xuI9MngwGfjp7c7s5Xb8FEMqNdZ1xARSX0cBqqPaGRNWlUq2dptWsjU2XASz899FGoiPCAP0Hw1IzLGB5egvgqEb0tCLMFDKHps1ibdq1zbzi7_t6RAzAiBv_Y0HV0WGZ80NUuUhFFUdf94u96e-8r6L7dz9zEXWHApvUxiDHDGAKil_Vll-2CU3hoBQYCEkwSHgBwBBs9_wCw27ArDoCA1tO2_8aMdCvk4KfT8pZ7Qxj12bxHYzURqOlVVjmkCF9mTAoAagk9JTqwWwqjpUNl2v4QcVNmeI6T51P82qPWqbzQIDAQABo4IETTCCBEkwJwYJKwYBBAGCNxUKBBowGDAKBggrBgEFBQcDATAKBggrBgEFBQcDAjA9BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiGkOMNhNW0eITxiz6Fm90Wzp0SgWCC9fYrg_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_u3fJMA4GA1UdDwEB_wQEAwIFoDBABgNVHREEOTA3gjVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCATUGA1UdHwSCASwwggEoMIIBJKCCASCgggEchkJodHRwOi8vY3JsLm1pY3Jvc29mdC5jb20vcGtpaW5mcmEvQ1JML0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcmyGNGh0dHA6Ly9jcmwxLmFtZS5nYmwvY3JsL0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcmyGNGh0dHA6Ly9jcmwyLmFtZS5nYmwvY3JsL0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcmyGNGh0dHA6Ly9jcmwzLmFtZS5nYmwvY3JsL0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcmyGNGh0dHA6Ly9jcmw0LmFtZS5nYmwvY3JsL0FNRSUyMEluZnJhJTIwQ0ElMjAwMig0KS5jcmwwFwYDVR0gBBAwDjAMBgorBgEEAYI3ewEBMB8GA1UdIwQYMBaAFK55wmtdJYgTBvYHCcOXfHuXjx1VMB0GA1UdJQQWMBQGCCsGAQUFBwMBBggrBgEFBQcDAjANBgkqhkiG9w0BAQsFAAOCAQEAQecZ6u3Vy_TvdS1UGS1bLXbc7WCmjz1SY2cbMWSy7F1JLL2cdtJQunrfzR8hinuMeynkkpEAWzLv-QEzW5c6bJ9MOBQKfcP-JVyIpUJTWKeWGEPwiH986PrB3MvzN6AaYRL6CdZPVlNl9TwhL8Uom3OFDx0m0mLdYvyfeTEW_Ifuil7NDR_sTJXNqBOg38-06i2DKZdwNcx92E3UsgW_avrTtx_jeUivpCTrRXRgXa814xZxBcvZTeyOe9yzKJxcM6_QIGW97JT9oBXaCceQ2KQgaD0FQLAWSANWbHqNf6Wzz3Osu0t0UO57HorMxIM1ZHA2wKetsyhuX8yzeGvnoQ&s=hGxj0NO6RbLmZ8feLLH06KYCdPb9JjKVf7-NyiAgmhmQxvqq5iPEzrwqYPaJqCubw04m5ZPklWDDifo8h8fB-ObfSaaWauTnc_A9x_dM72S-l-JvsBBlzT6BvWgI9SkTWPeCO2bouhl4UnWwyDCcDd1vOSF9ONKgY8J5Wo4BASBvqxg0jXxX19LncxvDM2kEnOvAt3Ej8jWEOo9y2-gshighmpXViCCm0JqFaMqTDi2uuCBOC51vzpGSyupl5sQ0I4JMR55_ncT63n-yeyzUw82K_9ExrGWjNWsdNBWsDVCHjz42OWeIMUeTLPKwZ7XHhjnvLnob8JRIf3ABadIinA&h=ZCMG6CWkATg70i7obv0TapaMXdb1nyS6MOjWGBTjRJI + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/c7ba0752-aba2-43d1-bb92-f41615bc3ace?api-version=2021-06-01&t=638816814065167089&c=MIIHpTCCBo2gAwIBAgITfwV1XFBM14xxqYIqEgAEBXVcUDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDIwHhcNMjUwNDIwMTQ1OTM3WhcNMjUxMDE3MTQ1OTM3WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANlxIFJqNN_OufUB10c86078n914r2WPITqQ7XIuNjZ3kKFyJfNTPH9FCgXYcFiZyl31-F519KwpAfPU6ZaDGIAFAGVh7uwm0NddEAeZQMryzM0oLIhpawnErtAgi6xebrBkm0o-m6f_MCJGLUai_vdl1aFF-tvHldU0S1BX9f1UEIxoQxYWtSOf1UldgltKscFsAHqF-g4qmkAIrV0Ox5br72D_Xh88YTwytDn9B_8bZDAEXu__M70zYUYp_rtk4Xh0DblPC3f_ygvya4-UPS0051jbJELzA01aKbASDBa1KuzLpbmuK1NeDS-BkZ703MlU9CqT5v5GQL801MWZ85UCAwEAAaOCBJIwggSOMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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_D90nsX9dNeMEROR-3mF-w5R8A8iq4ZfHbQbtBrIGJnQoGhHpbItIox0cOCH9GhDmvlEesTxLvmiLl3pdRs70eK90tbUxYsQDNN4tsfl3m3B_-Jk0Z12D2-vckHNA6jB1q620KCtft5LW2gLJmS80-AhisqwYMsx6N_aw69y5XNbtBDVyAgCI7zlxtLRZmQtkrE1rPDjvXy6aC6UgdnWx__LK9KqedcOuXWaQ_xJ9LaUUb2wC39Orm3cmx_Hrt72kMh9ebwnnoaRZNa31wA6zJerb5-oruoIMyiHfTTykazrioLX6feYqUmMI6CpAN_nGyQAlSg5uO8pYDiaCc&s=EMnWD740pFfbyo_GJVE1izKncL4z_R56lY_MzKVb_9E8oN8rczmUA0xOunXoSz_OyYOC2Zxl270TYO04K62V2JneQHAOb_aja6hSraQqT1DTH_56gNWPyEFVpJ_pcqA9lB6SAjYcKNvXyn3koWCgIkxeeHsiwrm2SoOWXKLFKqm9VkG2_06KSSXy0GvX7h0gzXb6lWMgcKv7ucGo3vheQYHn52KVYk5_DGeS0nUof02XjTc7gZZnBir4GS_PmtErdOWJipd2HLQqMYNW5ADjI1PTc-qjCxAtqq9LGVcRyNhXD8IIlJ3RjoqMufUTloqeFB1UN2Q8GE57SX8C0LH21w&h=cGjeypAt6zaaQf2k2nhhUMoE60neU-7sCY9frbMrQAc response: body: string: '{"status":"InProgress","error":{"code":"None","message":null}}' @@ -541,7 +574,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:35:05 GMT + - Thu, 01 May 2025 07:30:07 GMT expires: - '-1' pragma: @@ -552,8 +585,12 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/adc9b7d9-7090-49cb-8b90-e196fdbd7605 + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: B68F84C6CD41408D824C5EEDE8C11C8A Ref B: MAA201060516047 Ref C: 2024-04-22T03:35:06Z' + - 'Ref A: 29C765BBA37B43BCA9DEBE07AF139238 Ref B: SYD03EDGE1111 Ref C: 2025-05-01T07:30:06Z' status: code: 200 message: OK @@ -571,9 +608,9 @@ interactions: ParameterSetName: - --name --resource-group --set User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/12f53389-4a91-4289-8b6a-8f5bb7eb4a52?api-version=2021-06-01&t=638493537059208184&c=MIIHrTCCBpWgAwIBAgITfwLBjXw4zjrTc5t5NAAEAsGNfDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDIwHhcNMjQwMzA0MDE1ODIwWhcNMjUwMjI3MDE1ODIwWjCBjDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdSZWRtb25kMR4wHAYDVQQKExVNaWNyb3NvZnQgQ29ycG9yYXRpb24xPjA8BgNVBAMTNWFzeW5jb3BlcmF0aW9uc2lnbmluZ2NlcnRpZmljYXRlLm1hbmFnZW1lbnQuYXp1cmUuY29tMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvtNWzX7Z4RXasqNpidaHzNujkmKIyeVQ0-WDwUq-xuI9MngwGfjp7c7s5Xb8FEMqNdZ1xARSX0cBqqPaGRNWlUq2dptWsjU2XASz899FGoiPCAP0Hw1IzLGB5egvgqEb0tCLMFDKHps1ibdq1zbzi7_t6RAzAiBv_Y0HV0WGZ80NUuUhFFUdf94u96e-8r6L7dz9zEXWHApvUxiDHDGAKil_Vll-2CU3hoBQYCEkwSHgBwBBs9_wCw27ArDoCA1tO2_8aMdCvk4KfT8pZ7Qxj12bxHYzURqOlVVjmkCF9mTAoAagk9JTqwWwqjpUNl2v4QcVNmeI6T51P82qPWqbzQIDAQABo4IETTCCBEkwJwYJKwYBBAGCNxUKBBowGDAKBggrBgEFBQcDATAKBggrBgEFBQcDAjA9BgkrBgEEAYI3FQcEMDAuBiYrBgEEAYI3FQiGkOMNhNW0eITxiz6Fm90Wzp0SgWCC9fYrg_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_u3fJMA4GA1UdDwEB_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_TvdS1UGS1bLXbc7WCmjz1SY2cbMWSy7F1JLL2cdtJQunrfzR8hinuMeynkkpEAWzLv-QEzW5c6bJ9MOBQKfcP-JVyIpUJTWKeWGEPwiH986PrB3MvzN6AaYRL6CdZPVlNl9TwhL8Uom3OFDx0m0mLdYvyfeTEW_Ifuil7NDR_sTJXNqBOg38-06i2DKZdwNcx92E3UsgW_avrTtx_jeUivpCTrRXRgXa814xZxBcvZTeyOe9yzKJxcM6_QIGW97JT9oBXaCceQ2KQgaD0FQLAWSANWbHqNf6Wzz3Osu0t0UO57HorMxIM1ZHA2wKetsyhuX8yzeGvnoQ&s=hGxj0NO6RbLmZ8feLLH06KYCdPb9JjKVf7-NyiAgmhmQxvqq5iPEzrwqYPaJqCubw04m5ZPklWDDifo8h8fB-ObfSaaWauTnc_A9x_dM72S-l-JvsBBlzT6BvWgI9SkTWPeCO2bouhl4UnWwyDCcDd1vOSF9ONKgY8J5Wo4BASBvqxg0jXxX19LncxvDM2kEnOvAt3Ej8jWEOo9y2-gshighmpXViCCm0JqFaMqTDi2uuCBOC51vzpGSyupl5sQ0I4JMR55_ncT63n-yeyzUw82K_9ExrGWjNWsdNBWsDVCHjz42OWeIMUeTLPKwZ7XHhjnvLnob8JRIf3ABadIinA&h=ZCMG6CWkATg70i7obv0TapaMXdb1nyS6MOjWGBTjRJI + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdooroperationresults/c7ba0752-aba2-43d1-bb92-f41615bc3ace?api-version=2021-06-01&t=638816814065167089&c=MIIHpTCCBo2gAwIBAgITfwV1XFBM14xxqYIqEgAEBXVcUDANBgkqhkiG9w0BAQsFADBEMRMwEQYKCZImiZPyLGQBGRYDR0JMMRMwEQYKCZImiZPyLGQBGRYDQU1FMRgwFgYDVQQDEw9BTUUgSW5mcmEgQ0EgMDIwHhcNMjUwNDIwMTQ1OTM3WhcNMjUxMDE3MTQ1OTM3WjBAMT4wPAYDVQQDEzVhc3luY29wZXJhdGlvbnNpZ25pbmdjZXJ0aWZpY2F0ZS5tYW5hZ2VtZW50LmF6dXJlLmNvbTCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBANlxIFJqNN_OufUB10c86078n914r2WPITqQ7XIuNjZ3kKFyJfNTPH9FCgXYcFiZyl31-F519KwpAfPU6ZaDGIAFAGVh7uwm0NddEAeZQMryzM0oLIhpawnErtAgi6xebrBkm0o-m6f_MCJGLUai_vdl1aFF-tvHldU0S1BX9f1UEIxoQxYWtSOf1UldgltKscFsAHqF-g4qmkAIrV0Ox5br72D_Xh88YTwytDn9B_8bZDAEXu__M70zYUYp_rtk4Xh0DblPC3f_ygvya4-UPS0051jbJELzA01aKbASDBa1KuzLpbmuK1NeDS-BkZ703MlU9CqT5v5GQL801MWZ85UCAwEAAaOCBJIwggSOMCcGCSsGAQQBgjcVCgQaMBgwCgYIKwYBBQUHAwEwCgYIKwYBBQUHAwIwPQYJKwYBBAGCNxUHBDAwLgYmKwYBBAGCNxUIhpDjDYTVtHiE8Ys-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_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_D90nsX9dNeMEROR-3mF-w5R8A8iq4ZfHbQbtBrIGJnQoGhHpbItIox0cOCH9GhDmvlEesTxLvmiLl3pdRs70eK90tbUxYsQDNN4tsfl3m3B_-Jk0Z12D2-vckHNA6jB1q620KCtft5LW2gLJmS80-AhisqwYMsx6N_aw69y5XNbtBDVyAgCI7zlxtLRZmQtkrE1rPDjvXy6aC6UgdnWx__LK9KqedcOuXWaQ_xJ9LaUUb2wC39Orm3cmx_Hrt72kMh9ebwnnoaRZNa31wA6zJerb5-oruoIMyiHfTTykazrioLX6feYqUmMI6CpAN_nGyQAlSg5uO8pYDiaCc&s=EMnWD740pFfbyo_GJVE1izKncL4z_R56lY_MzKVb_9E8oN8rczmUA0xOunXoSz_OyYOC2Zxl270TYO04K62V2JneQHAOb_aja6hSraQqT1DTH_56gNWPyEFVpJ_pcqA9lB6SAjYcKNvXyn3koWCgIkxeeHsiwrm2SoOWXKLFKqm9VkG2_06KSSXy0GvX7h0gzXb6lWMgcKv7ucGo3vheQYHn52KVYk5_DGeS0nUof02XjTc7gZZnBir4GS_PmtErdOWJipd2HLQqMYNW5ADjI1PTc-qjCxAtqq9LGVcRyNhXD8IIlJ3RjoqMufUTloqeFB1UN2Q8GE57SX8C0LH21w&h=cGjeypAt6zaaQf2k2nhhUMoE60neU-7sCY9frbMrQAc response: body: string: '{"status":"Succeeded","error":{"code":"None","message":null}}' @@ -585,7 +622,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:35:36 GMT + - Thu, 01 May 2025 07:30:38 GMT expires: - '-1' pragma: @@ -596,8 +633,12 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/4ed94c3a-9ccf-4136-af07-22cc041d6f94 + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 68C4BB1EA46E415589D2BC73E6F93748 Ref B: MAA201060516047 Ref C: 2024-04-22T03:35:36Z' + - 'Ref A: C0CE758F29A048E89DC5AF8B98AE5739 Ref B: SYD03EDGE1111 Ref C: 2025-05-01T07:30:37Z' status: code: 200 message: OK @@ -615,12 +656,12 @@ interactions: ParameterSetName: - --name --resource-group --set User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontDoors/cli000004?api-version=2021-06-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"d972eb52-21a0-443d-a6c6-f2cc8a48f2b7","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002"},"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004","type":"Microsoft.Network/frontdoors","name":"cli000004","location":"Global","tags":{},"properties":{"routingRules":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/RoutingRules/DefaultRoutingRule","name":"DefaultRoutingRule","type":"Microsoft.Network/Frontdoors/RoutingRules","properties":{"routeConfiguration":{"customForwardingPath":null,"forwardingProtocol":"MatchRequest","cacheConfiguration":null,"backendPool":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/backendPools/DefaultBackendPool"},"@odata.type":"#Microsoft.Azure.FrontDoor.Models.FrontdoorForwardingConfiguration"},"rulesEngine":null,"resourceState":"Enabled","frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/frontendEndpoints/DefaultFrontendEndpoint"}],"acceptedProtocols":["Http"],"patternsToMatch":["/*"],"enabledState":"Enabled","webApplicationFirewallPolicyLink":null}}],"rulesEngines":[],"frontdoorId":"3d97360f-166e-4a79-9626-f6ed896061d1","extendedProperties":{},"resourceState":"Enabled","loadBalancingSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/LoadBalancingSettings/DefaultLoadBalancingSettings","name":"DefaultLoadBalancingSettings","type":"Microsoft.Network/Frontdoors/LoadBalancingSettings","properties":{"resourceState":"Enabled","sampleSize":4,"successfulSamplesRequired":2,"additionalLatencyMilliseconds":0}}],"healthProbeSettings":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/HealthProbeSettings/DefaultProbeSettings","name":"DefaultProbeSettings","type":"Microsoft.Network/Frontdoors/HealthProbeSettings","properties":{"resourceState":"Enabled","path":"/","protocol":"Https","intervalInSeconds":30,"enabledState":"Enabled","healthProbeMethod":"Head"}}],"backendPools":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/BackendPools/DefaultBackendPool","name":"DefaultBackendPool","type":"Microsoft.Network/Frontdoors/BackendPools","properties":{"backends":[{"address":"www.example.com","httpPort":80,"httpsPort":443,"priority":1,"weight":50,"backendHostHeader":"www.example.com","enabledState":"Enabled","privateLinkAlias":null,"privateLinkResourceId":null,"privateLinkLocation":null,"privateEndpointStatus":null,"privateLinkApprovalMessage":null}],"resourceState":"Enabled","loadBalancingSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/loadBalancingSettings/DefaultLoadBalancingSettings"},"healthProbeSettings":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/frontdoors/cli000004/healthProbeSettings/DefaultProbeSettings"}}}],"frontendEndpoints":[{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/Frontdoors/cli000004/FrontendEndpoints/DefaultFrontendEndpoint","name":"DefaultFrontendEndpoint","type":"Microsoft.Network/Frontdoors/FrontendEndpoints","properties":{"resourceState":"Enabled","hostName":"cli000004.azurefd.net","sessionAffinityEnabledState":"Disabled","sessionAffinityTtlSeconds":0,"webApplicationFirewallPolicyLink":{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002"},"customHttpsProvisioningState":null,"customHttpsProvisioningSubstate":null,"customHttpsConfiguration":null}}],"backendPoolsSettings":{"enforceCertificateNameCheck":"Enabled","sendRecvTimeoutSeconds":30},"enabledState":"Enabled","cName":"cli000004.azurefd.net","friendlyName":"cli000004","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -629,7 +670,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:35:38 GMT + - Thu, 01 May 2025 07:30:39 GMT expires: - '-1' pragma: @@ -640,191 +681,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 50793042C143458CAE95A7BAAC202982 Ref B: MAA201060516047 Ref C: 2024-04-22T03:35:37Z' - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:35:39 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:35:39 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033539Z-15b4f94784886qqfg68f1hg7e0000000041g0000000063eg - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:35:50 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:35:50 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033550Z-158fbddb65dmdsvg5rkd84yzsw0000000300000000003196 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:36:01 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:36:01 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033600Z-158fbddb65d9frjpgp2cwxz35w00000004m000000000616k - x-cache: - - CONFIG_NOCACHE + - 'Ref A: 869C0260B3B44FCF8450D06D27D7A859 Ref B: SYD03EDGE1111 Ref C: 2025-05-01T07:30:38Z' status: code: 200 message: OK @@ -840,1713 +700,30 @@ interactions: Content-Length: - '17' User-Agent: - - python-requests/2.31.0 + - python-requests/2.32.3 method: POST uri: http://cli000004.azurefd.net/ response: body: - string: "\n\n\n \n \n Page not found\n\ - \n \n \n \n \n \n\n \ - \ \n\n \n \n \n \n\n \n
\n \n

Page not found

\n\n \ - \
\n Oops! We weren't able to\ - \ find your Azure Front Door Service\n configuration. If it's a new\ - \ configuration that you recently created,\n it might not be ready\ - \ yet. You should check again in a few minutes. If\n the problem\ - \ persists, please contact Azure support.\n
\n
    \n\ - \
  • \n Try again\n
  • \n\n \ - \
  • \n Contact support\n
  • \n\n \ - \
  • \n Documentation\n
  • \n
\n\ - \
\n \n \n \n \n
\n
\n\ - \
\n \n\n" + string: "\nAccess Denied\n\n

Access + Denied

\n \nYou don't have permission to access \"http://www.example.com/\" + on this server.

\nReference #18.2d58d617.1746084640.650aad6\n

https://errors.edgesuite.net/18.2d58d617.1746084640.650aad6

\n\n\n" headers: cache-control: - - no-store - connection: - - close + - max-age=0 content-length: - - '3450' + - '367' content-type: - text/html date: - - Mon, 22 Apr 2024 03:36:11 GMT - transfer-encoding: - - chunked - vary: - - Accept-Encoding - x-azure-ref: - - 20240422T033611Z-15b4f9478489lgcjh3egrqk3ts00000004800000000052xg - x-cache: - - CONFIG_NOCACHE - status: - code: 404 - message: Not Found -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:36:22 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:36:22 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033621Z-158fbddb65dwj7s2dbv95ghm9s00000002u0000000006z00 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:36:32 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:36:32 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033632Z-r1869b9b46cn8b9xx9bp3y443s0000000450000000009c5t - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:36:43 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:36:43 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033643Z-158fbddb65dv6gxduunquwkbfw00000004m0000000007mxz - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:36:54 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:36:53 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033653Z-r1869b9b46cz2mkl7axu1pkpp400000003zg000000016ssr - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:37:04 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:37:04 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT + - Thu, 01 May 2025 07:30:40 GMT + mime-version: + - '1.0' x-azure-ref: - - 20240422T033704Z-r1869b9b46ct5bcdtgg8bwuww400000003wg00000000r03w - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:37:15 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:37:15 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033714Z-158fbddb65dkbt890d1hbuaaq800000002qg000000006rh9 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:37:25 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:37:25 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033725Z-r1869b9b46c6gplr1hnx7cxnms0000000430000000016zw0 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:37:36 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:37:36 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033736Z-r1869b9b46cmcg4ws7tx0w5n98000000044g000000018ads - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:37:47 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:37:47 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033747Z-r1869b9b46crhm4thrcnm9ahqc000000041g000000004uvd - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:37:57 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:37:57 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033757Z-158fbddb65dc7b4zkukp7u2xvc0000000240000000005eq6 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:38:08 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:38:08 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033808Z-15b4f9478488ph8wk3hc344ex000000004900000000017dw - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:38:19 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:38:19 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033818Z-15b4f947848nzv4jrm9ef5zyw0000000010g000000002qk7 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:38:29 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:38:29 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033829Z-15b4f9478485p92znm2005vn9c000000044g000000006h16 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:38:40 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:38:40 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033840Z-158fbddb65df6xmp78afy8fm2s00000001p000000000516h - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:38:51 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:38:51 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033850Z-r1869b9b46chwnzxm1paxp7da00000000480000000003zhk - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:39:01 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:39:01 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033901Z-r1869b9b46cmcg4ws7tx0w5n9800000004a0000000002xz7 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:39:12 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:39:12 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033911Z-r1869b9b46cz2mkl7axu1pkpp40000000450000000002exe - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:39:23 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:39:23 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033922Z-r1869b9b46cz2mkl7axu1pkpp40000000400000000015724 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:39:33 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:39:33 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033933Z-158fbddb65dwj7s2dbv95ghm9s00000002vg000000006fgb - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:39:44 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:39:44 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033944Z-158fbddb65dc7b4zkukp7u2xvc000000024g000000004m6m - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:39:54 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:39:54 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T033954Z-r1869b9b46cz9tdx6gyuh69kb8000000044g000000019sa7 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:40:05 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:40:05 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T034005Z-15b4f947848x4xblzz4xggw7t0000000047g000000000p7t - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:40:16 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:40:16 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T034015Z-15b4f947848nfrflpd3k619wyw00000004400000000045b8 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:40:26 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:40:26 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T034026Z-r1869b9b46cbz8pnfx60nrnch0000000046g000000017d2d - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:40:37 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:40:37 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T034037Z-r1869b9b46chwnzxm1paxp7da0000000042g00000000xuh3 - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK -- request: - body: '''key'':''something''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '17' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\ - \n\n\n \n \n Service unavailable\n\n\n\n \ - \
\n
\n

The request\ - \ is blocked.

\n
\n
\n \ - \ 20240422T034047Z-158fbddb65dtjfbw7rkefdxmxs00000004hg000000004x5r\ - \ \n
\n
\n\n\n" - headers: - cache-control: - - no-store - connection: - - close - content-length: - - '1261' - content-type: - - text/html - date: - - Mon, 22 Apr 2024 03:40:47 GMT - x-azure-ref: - - 20240422T034047Z-158fbddb65dtjfbw7rkefdxmxs00000004hg000000004x5r + - 20250501T073040Z-r16b66fb6c5r6lmnhC1SYD0d2s000000029g0000000054d7 x-cache: - CONFIG_NOCACHE status: code: 403 message: Forbidden -- request: - body: '''key'':''value''' - headers: - Accept: - - '*/*' - Accept-Encoding: - - gzip, deflate - Connection: - - keep-alive - Content-Length: - - '13' - User-Agent: - - python-requests/2.31.0 - method: POST - uri: http://cli000004.azurefd.net/ - response: - body: - string: "\n\n\n Example Domain\n\ - \n \n \n \n \ - \ \n\n\n\n
\n

Example Domain

\n

This\ - \ domain is for use in illustrative examples in documents. You may use this\n\ - \ domain in literature without prior coordination or asking for permission.

\n\ - \

More information...

\n\ -
\n\n\n" - headers: - accept-ranges: - - bytes - cache-control: - - max-age=604800 - connection: - - keep-alive - content-length: - - '1256' - content-type: - - text/html; charset=UTF-8 - date: - - Mon, 22 Apr 2024 03:40:48 GMT - etag: - - '"3147526947"' - expires: - - Mon, 29 Apr 2024 03:40:48 GMT - last-modified: - - Thu, 17 Oct 2019 07:18:26 GMT - x-azure-ref: - - 20240422T034047Z-15b4f9478487vmzr3r64sg19xs0000000430000000008e1b - x-cache: - - CONFIG_NOCACHE - status: - code: 200 - message: OK version: 1 diff --git a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_managed_rules.yaml b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_managed_rules.yaml index 69e8b42ec8a..5ca519f44ed 100644 --- a/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_managed_rules.yaml +++ b/src/front-door/azext_front_door/tests/latest/recordings/test_waf_policy_managed_rules.yaml @@ -13,21 +13,21 @@ interactions: ParameterSetName: - --resource-group --name --sku User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001?api-version=2022-09-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"product":"azurecli","cause":"automation","test":"test_waf_policy_managed_rules","date":"2024-04-22T03:41:25Z","module":"front-door"},"properties":{"provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001","name":"clitest.rg000001","type":"Microsoft.Resources/resourceGroups","location":"westus","tags":{"owner":"jingnanxu"},"properties":{"provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '371' + - '258' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:30 GMT + - Thu, 01 May 2025 07:32:39 GMT expires: - '-1' pragma: @@ -38,13 +38,16 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: FF62B5193F5046A59F058521B06B6500 Ref B: MAA201060516045 Ref C: 2024-04-22T03:41:30Z' + - 'Ref A: 5594ADEDAF2844B4B4EC9EEDA8C384CA Ref B: SYD03EDGE1415 Ref C: 2025-05-01T07:32:39Z' status: code: 200 message: OK - request: - body: '{"location": "westus", "sku": {"name": "Premium_AzureFrontDoor"}}' + body: '{"location": "global", "properties": {"policySettings": {"enabledState": + "Enabled"}}, "sku": {"name": "Premium_AzureFrontDoor"}}' headers: Accept: - application/json @@ -55,27 +58,27 @@ interactions: Connection: - keep-alive Content-Length: - - '65' + - '128' Content-Type: - application/json ParameterSetName: - --resource-group --name --sku User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 + uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2025-03-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"captchaExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache content-length: - - '760' + - '792' content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:34 GMT + - Thu, 01 May 2025 07:32:44 GMT expires: - '-1' pragma: @@ -86,10 +89,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/0f132294-4c2d-4b73-895c-2c3692adb374 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 9B276F40EED44C4CA02EAFAD6F8FAA42 Ref B: MAA201060515011 Ref C: 2024-04-22T03:41:31Z' + - 'Ref A: 4B9C40DA927E42248F8F839B7CD7DAEC Ref B: SYD03EDGE1016 Ref C: 2025-05-01T07:32:40Z' status: code: 201 message: Created @@ -107,12 +114,12 @@ interactions: ParameterSetName: - -g --policy-name --type --version User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -121,7 +128,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:36 GMT + - Thu, 01 May 2025 07:32:46 GMT expires: - '-1' pragma: @@ -132,13 +139,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: EEDDC25A654245528A1E41347E96574D Ref B: MAA201060515021 Ref C: 2024-04-22T03:41:35Z' + - 'Ref A: C40CFEDB987345E4A401C079DD513064 Ref B: SYD03EDGE0910 Ref C: 2025-05-01T07:32:44Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": @@ -159,12 +168,12 @@ interactions: ParameterSetName: - -g --policy-name --type --version User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -173,7 +182,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:38 GMT + - Thu, 01 May 2025 07:32:47 GMT expires: - '-1' pragma: @@ -184,10 +193,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/282895a4-f63c-41fe-8ac4-df44cea68586 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: 5CC401318D4243298BADA09D2DB001BA Ref B: MAA201060515021 Ref C: 2024-04-22T03:41:37Z' + - 'Ref A: 7457090FA11244B3BA645B0FDCAE6C13 Ref B: SYD03EDGE0910 Ref C: 2025-05-01T07:32:46Z' status: code: 200 message: OK @@ -205,12 +218,12 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --action --disabled User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -219,7 +232,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:41 GMT + - Thu, 01 May 2025 07:32:47 GMT expires: - '-1' pragma: @@ -230,13 +243,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: E6DE9919831745D581924FED85A44F3C Ref B: MAA201060515027 Ref C: 2024-04-22T03:41:39Z' + - 'Ref A: 38F82FF3D3F14E4694D773A15446E243 Ref B: SYD03EDGE0816 Ref C: 2025-05-01T07:32:47Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": @@ -259,12 +274,12 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id --action --disabled User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Disabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Disabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -273,7 +288,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:42 GMT + - Thu, 01 May 2025 07:32:48 GMT expires: - '-1' pragma: @@ -284,10 +299,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiaeast/c2cd0615-ebbf-4fc1-81a4-82f4a70d0dcd + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: D94D4063C85046A083E63ABE9F273F22 Ref B: MAA201060515027 Ref C: 2024-04-22T03:41:41Z' + - 'Ref A: 6CA30C13E4554D6EB18B32978A7E03BC Ref B: SYD03EDGE0816 Ref C: 2025-05-01T07:32:48Z' status: code: 200 message: OK @@ -305,12 +324,12 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Disabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[{"ruleGroupName":"SQLI","rules":[{"ruleId":"942100","enabledState":"Disabled","action":"Block","exclusions":[]}],"exclusions":[]}],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -319,7 +338,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:44 GMT + - Thu, 01 May 2025 07:32:51 GMT expires: - '-1' pragma: @@ -330,13 +349,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 98AB0E8497D44FA7AFBB24D0F85580A1 Ref B: MAA201060516017 Ref C: 2024-04-22T03:41:44Z' + - 'Ref A: AFB3E9A5F8944CDCBA0591C1B0B82B97 Ref B: SYD03EDGE1918 Ref C: 2025-05-01T07:32:50Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": @@ -358,12 +379,12 @@ interactions: ParameterSetName: - -g --policy-name --type --rule-group-id --rule-id User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -372,7 +393,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:46 GMT + - Thu, 01 May 2025 07:32:53 GMT expires: - '-1' pragma: @@ -383,10 +404,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiasoutheast/5570f5b8-5674-4bc9-8b11-d4c6b677f450 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1198' + - '799' x-msedge-ref: - - 'Ref A: 205D4F9D1CC347E691EB9F3650046860 Ref B: MAA201060516017 Ref C: 2024-04-22T03:41:45Z' + - 'Ref A: 029E926874F44A2DBC4B6BB895543C17 Ref B: SYD03EDGE1918 Ref C: 2025-05-01T07:32:51Z' status: code: 200 message: OK @@ -404,12 +429,12 @@ interactions: ParameterSetName: - -g --policy-name User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -418,7 +443,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:49 GMT + - Thu, 01 May 2025 07:32:55 GMT expires: - '-1' pragma: @@ -429,8 +454,10 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 0BAE11DE30E94F15833EFB3C4744A788 Ref B: MAA201060514023 Ref C: 2024-04-22T03:41:47Z' + - 'Ref A: 34B0C86A8C1F4A54912538AF2A207EC3 Ref B: SYD03EDGE1422 Ref C: 2025-05-01T07:32:53Z' status: code: 200 message: OK @@ -448,12 +475,12 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetAction":null,"ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -462,7 +489,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:51 GMT + - Thu, 01 May 2025 07:32:56 GMT expires: - '-1' pragma: @@ -473,13 +500,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: 38CFE6F35647448B8CF3EDCF35AB6D08 Ref B: MAA201060515011 Ref C: 2024-04-22T03:41:50Z' + - 'Ref A: 213F130DEEEA44488A4BA15C53A413EE Ref B: SYD03EDGE1422 Ref C: 2025-05-01T07:32:55Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": []}}}' @@ -499,12 +528,12 @@ interactions: ParameterSetName: - -g --policy-name --type User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -513,7 +542,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:53 GMT + - Thu, 01 May 2025 07:32:58 GMT expires: - '-1' pragma: @@ -524,10 +553,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/07355684-4758-411a-bcb4-7ce87e512144 + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' + - '799' x-msedge-ref: - - 'Ref A: CBEA4E0D2C6A413AB3D1669C2E03BE17 Ref B: MAA201060515011 Ref C: 2024-04-22T03:41:51Z' + - 'Ref A: D6C46986CA954531B7B5DCEAD682A25C Ref B: SYD03EDGE1422 Ref C: 2025-05-01T07:32:56Z' status: code: 200 message: OK @@ -545,12 +578,12 @@ interactions: ParameterSetName: - -g --policy-name --type --version --action User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: GET uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -559,7 +592,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:54 GMT + - Thu, 01 May 2025 07:32:59 GMT expires: - '-1' pragma: @@ -570,13 +603,15 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-ratelimit-remaining-subscription-global-reads: + - '16499' x-msedge-ref: - - 'Ref A: E8187AFD318B49B783682F60911223AC Ref B: MAA201060516011 Ref C: 2024-04-22T03:41:54Z' + - 'Ref A: 9436F719968040F2A370600675FC5E9E Ref B: SYD03EDGE1506 Ref C: 2025-05-01T07:32:59Z' status: code: 200 message: OK - request: - body: '{"location": "WestUs", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, + body: '{"location": "Global", "tags": {}, "sku": {"name": "Premium_AzureFrontDoor"}, "properties": {"policySettings": {"enabledState": "Enabled", "mode": "Prevention", "requestBodyCheck": "Enabled", "javascriptChallengeExpirationInMinutes": 30}, "customRules": {"rules": []}, "managedRules": {"managedRuleSets": [{"ruleSetType": @@ -597,12 +632,12 @@ interactions: ParameterSetName: - -g --policy-name --type --version --action User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) + - AZURECLI/2.71.0 azsdk-python-core/1.31.0 Python/3.12.10 (Windows-11-10.0.26100-SP0) method: PUT uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/clitest.rg000001/providers/Microsoft.Network/FrontDoorWebApplicationFirewallPolicies/cli000002?api-version=2024-02-01 response: body: - string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"WestUs","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"Microsoft_DefaultRuleSet","ruleSetVersion":"2.0","ruleSetAction":"Block","ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' + string: '{"id":"/subscriptions/00000000-0000-0000-0000-000000000000/resourcegroups/clitest.rg000001/providers/Microsoft.Network/frontdoorwebapplicationfirewallpolicies/cli000002","type":"Microsoft.Network/frontdoorwebapplicationfirewallpolicies","name":"cli000002","location":"Global","tags":{},"sku":{"name":"Premium_AzureFrontDoor"},"properties":{"policySettings":{"enabledState":"Enabled","mode":"Prevention","redirectUrl":null,"customBlockResponseStatusCode":null,"customBlockResponseBody":null,"requestBodyCheck":"Enabled","javascriptChallengeExpirationInMinutes":30,"logScrubbing":null},"customRules":{"rules":[]},"managedRules":{"managedRuleSets":[{"ruleSetType":"Microsoft_DefaultRuleSet","ruleSetVersion":"2.0","ruleSetAction":"Block","ruleGroupOverrides":[],"exclusions":[]}]},"frontendEndpointLinks":[],"securityPolicyLinks":[],"resourceState":"Enabled","provisioningState":"Succeeded"}}' headers: cache-control: - no-cache @@ -611,7 +646,7 @@ interactions: content-type: - application/json; charset=utf-8 date: - - Mon, 22 Apr 2024 03:41:56 GMT + - Thu, 01 May 2025 07:33:02 GMT expires: - '-1' pragma: @@ -622,1035 +657,14 @@ interactions: - CONFIG_NOCACHE x-content-type-options: - nosniff + x-ms-operation-identifier: + - tenantId=72f988bf-86f1-41af-91ab-2d7cd011db47,objectId=2e396a67-4dc1-43ae-afcc-c6747d291866/australiacentral2/07350f7f-890e-476c-b7c9-dd9ee967786c + x-ms-ratelimit-remaining-subscription-global-writes: + - '11999' x-ms-ratelimit-remaining-subscription-writes: - - '1199' - x-msedge-ref: - - 'Ref A: 36C784BBE44640A2AC2618C0A9E408AB Ref B: MAA201060516011 Ref C: 2024-04-22T03:41:55Z' - status: - code: 200 - message: OK -- request: - body: null - headers: - Accept: - - application/json - Accept-Encoding: - - gzip, deflate - CommandName: - - network front-door waf-policy managed-rule-definition list - Connection: - - keep-alive - User-Agent: - - AZURECLI/2.59.0 azsdk-python-core/1.28.0 Python/3.11.9 (Windows-10-10.0.22631-SP0) - method: GET - uri: https://management.azure.com/subscriptions/00000000-0000-0000-0000-000000000000/providers/Microsoft.Network/FrontDoorWebApplicationFirewallManagedRuleSets?api-version=2024-02-01 - response: - body: - string: '{"value":[{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/Microsoft_DefaultRuleSet_2.0","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"Microsoft_DefaultRuleSet_2.0","properties":{"ruleSetType":"Microsoft_DefaultRuleSet","ruleSetVersion":"2.0","ruleSetId":"8125d145-ddc5-4d90-9bc3-24c5f2de69a2","ruleGroups":[{"ruleGroupName":"MS-ThreatIntel-WebShells","description":"Web - shell attacks","rules":[{"ruleId":"99005002","description":"Web Shell Interaction - Attempt (POST)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005003","description":"Web - Shell Upload Attempt (POST) - CHOPPER PHP","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005004","description":"Web - Shell Upload Attempt (POST) - CHOPPER ASPX","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005006","description":"Spring4Shell - Interaction Attempt","defaultAction":"AnomalyScoring","defaultState":"Disabled"}]},{"ruleGroupName":"MS-ThreatIntel-AppSec","description":"Path - traversal evasion","rules":[{"ruleId":"99030001","description":"Path Traversal - Evasion in Headers (/.././../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99030002","description":"Path - Traversal Evasion in Request Body (/.././../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-SQLI","description":"SQL - injection","rules":[{"ruleId":"99031001","description":"SQL Injection Attack: - Common Injection Testing Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99031002","description":"SQL - Comment Sequence Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-CVEs","description":"Rest - API exploitation","rules":[{"ruleId":"99001001","description":"Attempted F5 - tmui (CVE-2020-5902) REST API Exploitation with known credentials","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001014","description":"Attempted - Spring Cloud routing-expression injection (CVE-2022-22963)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"99001015","description":"Attempted - Spring Framework unsafe class object exploitation (CVE-2022-22965)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"99001016","description":"Attempted - Spring Cloud Gateway Actuator injection (CVE-2022-22947)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"99001017","description":"Attempted - Apache Struts file upload exploitation (CVE-2023-50164)","defaultAction":"AnomalyScoring","defaultState":"Disabled"}]},{"ruleGroupName":"PROTOCOL-ATTACK","description":"Protocol - attack","rules":[{"ruleId":"921110","description":"HTTP Request Smuggling - Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921120","description":"HTTP - Response Splitting Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921130","description":"HTTP - Response Splitting Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921140","description":"HTTP - Header Injection Attack via headers","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921150","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921160","description":"HTTP - Header Injection Attack via payload (CR/LF and header-name detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921151","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"LFI","description":"Local - file inclusion","rules":[{"ruleId":"930100","description":"Path Traversal - Attack (/../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"930110","description":"Path - Traversal Attack (/../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"930120","description":"OS - File Access Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"930130","description":"Restricted - File Access Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"RFI","description":"Remote - file inclusion","rules":[{"ruleId":"931100","description":"Possible Remote - File Inclusion (RFI) Attack: URL Parameter using IP Address","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"931110","description":"Possible - Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used - w/URL Payload","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"931120","description":"Possible - Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark - Character (?)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"931130","description":"Possible - Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"RCE","description":"Remote - Command Execution attacks","rules":[{"ruleId":"932100","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932105","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932110","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932115","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932120","description":"Remote - Command Execution: Windows PowerShell Command Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932130","description":"Remote - Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) - Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932140","description":"Remote - Command Execution: Windows FOR/IF Command Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932150","description":"Remote - Command Execution: Direct Unix Command Execution","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932160","description":"Remote - Command Execution: Unix Shell Code Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932170","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932171","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932180","description":"Restricted - File Upload Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"PHP","description":"PHP - attacks","rules":[{"ruleId":"933100","description":"PHP Injection Attack: - PHP Open Tag Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933110","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933120","description":"PHP - Injection Attack: Configuration Directive Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933130","description":"PHP - Injection Attack: Variables Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933140","description":"PHP - Injection Attack: I/O Stream Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933150","description":"PHP - Injection Attack: High-Risk PHP Function Name Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933151","description":"PHP - Injection Attack: Medium-Risk PHP Function Name Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933160","description":"PHP - Injection Attack: High-Risk PHP Function Call Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933170","description":"PHP - Injection Attack: Serialized Object Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933180","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933200","description":"PHP - Injection Attack: Wrapper scheme detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933210","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"XSS","description":"Cross-site - scripting","rules":[{"ruleId":"941100","description":"XSS Attack Detected - via libinjection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941101","description":"XSS - Attack Detected via libinjection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941110","description":"XSS - Filter - Category 1: Script Tag Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941120","description":"XSS - Filter - Category 2: Event Handler Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941130","description":"XSS - Filter - Category 3: Attribute Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941140","description":"XSS - Filter - Category 4: Javascript URI Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941150","description":"XSS - Filter - Category 5: Disallowed HTML Attributes","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941160","description":"NoScript - XSS InjectionChecker: HTML Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941170","description":"NoScript - XSS InjectionChecker: Attribute Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941180","description":"Node-Validator - Blacklist Keywords","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941190","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941200","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941210","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941220","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941230","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941240","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941250","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941260","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941270","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941280","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941290","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941300","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941310","description":"US-ASCII - Malformed Encoding XSS Filter - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941320","description":"Possible - XSS Attack Detected - HTML Tag Handler","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941330","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941340","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941350","description":"UTF-7 - Encoding IE XSS - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941360","description":"JSFuck - / Hieroglyphy obfuscation detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941370","description":"JavaScript - global variable found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941380","description":"AngularJS - client side template injection detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"SQLI","description":"SQL - injection","rules":[{"ruleId":"942100","description":"SQL Injection Attack - Detected via libinjection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942110","description":"SQL - Injection Attack: Common Injection Testing Detected","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942120","description":"SQL - Injection Attack: SQL Operator Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942140","description":"SQL - Injection Attack: Common DB Names Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942150","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942160","description":"Detects - blind sqli tests using sleep() or benchmark().","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942170","description":"Detects - SQL benchmark and sleep injection attempts including conditional queries","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942180","description":"Detects - basic SQL authentication bypass attempts 1/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942190","description":"Detects - MSSQL code execution and information gathering attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942200","description":"Detects - MySQL comment-/space-obfuscated injections and backtick termination","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942210","description":"Detects - chained SQL injection attempts 1/2","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942220","description":"Looking - for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 - is the \"magic number\" crash","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942230","description":"Detects - conditional SQL injection attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942240","description":"Detects - MySQL charset switch and MSSQL DoS attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942250","description":"Detects - MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942260","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942270","description":"Looking - for basic sql injection. Common attack string for mysql, oracle and others.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942280","description":"Detects - Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942290","description":"Finds - basic MongoDB SQL injection attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942300","description":"Detects - MySQL comments, conditions and ch(a)r injections","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942310","description":"Detects - chained SQL injection attempts 2/2","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942320","description":"Detects - MySQL and PostgreSQL stored procedure/function injections","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942330","description":"Detects - classic SQL injection probings 1/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942340","description":"Detects - basic SQL authentication bypass attempts 3/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942350","description":"Detects - MySQL UDF injection and other data/structure manipulation attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942360","description":"Detects - concatenated basic SQL injection and SQLLFI attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942361","description":"Detects - basic SQL injection based on keyword alter or union","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942370","description":"Detects - classic SQL injection probings 2/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942380","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942390","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942400","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942410","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942430","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (12)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942440","description":"SQL - Comment Sequence Detected.","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942450","description":"SQL - Hex Encoding Identified","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942470","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942480","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942500","description":"MySQL - in-line comment detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942510","description":"SQLi - bypass attempt by ticks or backticks detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"FIX","description":"Session - Fixation attacks","rules":[{"ruleId":"943100","description":"Possible Session - Fixation Attack: Setting Cookie Values in HTML","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"943110","description":"Possible - Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"943120","description":"Possible - Session Fixation Attack: SessionID Parameter Name with No Referer","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"JAVA","description":"Java - attacks","rules":[{"ruleId":"944100","description":"Remote Command Execution: - Suspicious Java class detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944110","description":"Remote - Command Execution: Java process spawn (CVE-2017-9805)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944120","description":"Remote - Command Execution: Java serialization (CVE-2015-5842)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944130","description":"Suspicious - Java class detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944200","description":"Magic - bytes Detected, probable java serialization in use","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944210","description":"Magic - bytes Detected Base64 Encoded, probable java serialization in use","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944240","description":"Remote - Command Execution: Java serialization and Log4j vulnerability (CVE-2021-44228, - CVE-2021-45046)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944250","description":"Remote - Command Execution: Suspicious Java method detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"METHOD-ENFORCEMENT","description":"Method - Enforcement","rules":[{"ruleId":"911100","description":"Method is not allowed - by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"PROTOCOL-ENFORCEMENT","description":"Protocol - Enforcement","rules":[{"ruleId":"920100","description":"Invalid HTTP Request - Line","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920120","description":"Attempted - multipart/form-data bypass","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920121","description":"Attempted - multipart/form-data bypass","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920160","description":"Content-Length - HTTP header is not numeric.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920170","description":"GET - or HEAD Request with Body Content.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920171","description":"GET - or HEAD Request with Transfer-Encoding.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920180","description":"POST - without Content-Length or Transfer-Encoding headers.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920190","description":"Range: - Invalid Last Byte Value.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920200","description":"Range: - Too many fields (6 or more)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920201","description":"Range: - Too many fields for pdf request (63 or more)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920210","description":"Multiple/Conflicting - Connection Header Data Found.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920220","description":"URL - Encoding Abuse Attack Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920230","description":"Multiple - URL Encoding Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920240","description":"URL - Encoding Abuse Attack Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920260","description":"Unicode - Full/Half Width Abuse Attack Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920270","description":"Invalid - character in request (null character)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920271","description":"Invalid - character in request (non printable characters)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920280","description":"Request - Missing a Host Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920290","description":"Empty - Host Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920300","description":"Request - Missing an Accept Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920310","description":"Request - Has an Empty Accept Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920311","description":"Request - Has an Empty Accept Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920320","description":"Missing - User Agent Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920330","description":"Empty - User Agent Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920340","description":"Request - Containing Content, but Missing Content-Type header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920341","description":"Request - Containing Content Requires Content-Type header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920350","description":"Host - header is a numeric IP address","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920420","description":"Request - content type is not allowed by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920430","description":"HTTP - protocol version is not allowed by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920440","description":"URL - file extension is restricted by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920450","description":"HTTP - header is restricted by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920470","description":"Illegal - Content-Type header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920480","description":"Request - content type charset is not allowed by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"General","description":"Method - Enforcement","rules":[{"ruleId":"200002","description":"Failed to parse request - body.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"200003","description":"Multipart - request body failed strict validation","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"NODEJS","description":"Node - JS Attacks","rules":[{"ruleId":"934100","description":"Node.js Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/Microsoft_DefaultRuleSet_2.1","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"Microsoft_DefaultRuleSet_2.1","properties":{"ruleSetType":"Microsoft_DefaultRuleSet","ruleSetVersion":"2.1","ruleSetId":"8125d145-ddc5-4d90-9bc3-24c5f2de69a2","ruleGroups":[{"ruleGroupName":"MS-ThreatIntel-WebShells","description":"Web - shell attacks","rules":[{"ruleId":"99005002","description":"Web Shell Interaction - Attempt (POST)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005003","description":"Web - Shell Upload Attempt (POST) - CHOPPER PHP","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005004","description":"Web - Shell Upload Attempt (POST) - CHOPPER ASPX","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005005","description":"Web - Shell Interaction Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99005006","description":"Spring4Shell - Interaction Attempt","defaultAction":"AnomalyScoring","defaultState":"Disabled"}]},{"ruleGroupName":"MS-ThreatIntel-AppSec","description":"Path - traversal evasion","rules":[{"ruleId":"99030001","description":"Path Traversal - Evasion in Headers (/.././../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99030002","description":"Path - Traversal Evasion in Request Body (/.././../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-SQLI","description":"SQL - injection","rules":[{"ruleId":"99031001","description":"SQL Injection Attack: - Common Injection Testing Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99031002","description":"SQL - Comment Sequence Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99031003","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99031004","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-CVEs","description":"Rest - API exploitation","rules":[{"ruleId":"99001001","description":"Attempted F5 - tmui (CVE-2020-5902) REST API Exploitation with known credentials","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001002","description":"Attempted - Citrix NSC_USER directory traversal (CVE-2019-19781)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001003","description":"Attempted - Atlassian Confluence Widget Connector exploitation (CVE-2019-3396)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001004","description":"Attempted - Pulse Secure custom template exploitation (CVE-2020-8243)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001005","description":"Attempted - SharePoint type converter exploitation (CVE-2020-0932)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001006","description":"Attempted - Pulse Connect directory traversal (CVE-2019-11510)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001007","description":"Attempted - Junos OS J-Web local file inclusion (CVE-2020-1631)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001008","description":"Attempted - Fortinet path traversal (CVE-2018-13379)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001009","description":"Attempted - Apache struts ognl injection (CVE-2017-5638)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001010","description":"Attempted - Apache struts ognl injection (CVE-2017-12611)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001011","description":"Attempted - Oracle WebLogic path traversal (CVE-2020-14882)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001012","description":"Attempted - Telerik WebUI insecure deserialization exploitation (CVE-2019-18935)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001013","description":"Attempted - SharePoint insecure XML deserialization (CVE-2019-0604)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"99001014","description":"Attempted - Spring Cloud routing-expression injection (CVE-2022-22963)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"99001015","description":"Attempted - Spring Framework unsafe class object exploitation (CVE-2022-22965)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"99001016","description":"Attempted - Spring Cloud Gateway Actuator injection (CVE-2022-22947)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"99001017","description":"Attempted - Apache Struts file upload exploitation (CVE-2023-50164)","defaultAction":"AnomalyScoring","defaultState":"Disabled"}]},{"ruleGroupName":"PROTOCOL-ATTACK","description":"Protocol - attack","rules":[{"ruleId":"921110","description":"HTTP Request Smuggling - Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921120","description":"HTTP - Response Splitting Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921130","description":"HTTP - Response Splitting Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921140","description":"HTTP - Header Injection Attack via headers","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921150","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921160","description":"HTTP - Header Injection Attack via payload (CR/LF and header-name detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921151","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921190","description":"HTTP - Splitting (CR/LF in request filename detected)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"921200","description":"LDAP - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"LFI","description":"Local - file inclusion","rules":[{"ruleId":"930100","description":"Path Traversal - Attack (/../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"930110","description":"Path - Traversal Attack (/../)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"930120","description":"OS - File Access Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"930130","description":"Restricted - File Access Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"RFI","description":"Remote - file inclusion","rules":[{"ruleId":"931100","description":"Possible Remote - File Inclusion (RFI) Attack: URL Parameter using IP Address","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"931110","description":"Possible - Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used - w/URL Payload","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"931120","description":"Possible - Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark - Character (?)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"931130","description":"Possible - Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"RCE","description":"Remote - Command Execution attacks","rules":[{"ruleId":"932100","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932105","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932110","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932115","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932120","description":"Remote - Command Execution: Windows PowerShell Command Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932130","description":"Remote - Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) - Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932140","description":"Remote - Command Execution: Windows FOR/IF Command Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932150","description":"Remote - Command Execution: Direct Unix Command Execution","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932160","description":"Remote - Command Execution: Unix Shell Code Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932170","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932171","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"932180","description":"Restricted - File Upload Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"PHP","description":"PHP - attacks","rules":[{"ruleId":"933100","description":"PHP Injection Attack: - PHP Open Tag Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933110","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933120","description":"PHP - Injection Attack: Configuration Directive Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933130","description":"PHP - Injection Attack: Variables Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933140","description":"PHP - Injection Attack: I/O Stream Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933150","description":"PHP - Injection Attack: High-Risk PHP Function Name Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933151","description":"PHP - Injection Attack: Medium-Risk PHP Function Name Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933160","description":"PHP - Injection Attack: High-Risk PHP Function Call Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933170","description":"PHP - Injection Attack: Serialized Object Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933180","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933200","description":"PHP - Injection Attack: Wrapper scheme detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"933210","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"XSS","description":"Cross-site - scripting","rules":[{"ruleId":"941100","description":"XSS Attack Detected - via libinjection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941101","description":"XSS - Attack Detected via libinjection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941110","description":"XSS - Filter - Category 1: Script Tag Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941120","description":"XSS - Filter - Category 2: Event Handler Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941130","description":"XSS - Filter - Category 3: Attribute Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941140","description":"XSS - Filter - Category 4: Javascript URI Vector","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941150","description":"XSS - Filter - Category 5: Disallowed HTML Attributes","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941160","description":"NoScript - XSS InjectionChecker: HTML Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941170","description":"NoScript - XSS InjectionChecker: Attribute Injection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941180","description":"Node-Validator - Blacklist Keywords","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941190","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941200","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941210","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941220","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941230","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941240","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941250","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941260","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941270","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941280","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941290","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941300","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941310","description":"US-ASCII - Malformed Encoding XSS Filter - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941320","description":"Possible - XSS Attack Detected - HTML Tag Handler","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941330","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941340","description":"IE - XSS Filters - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941350","description":"UTF-7 - Encoding IE XSS - Attack Detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941360","description":"JSFuck - / Hieroglyphy obfuscation detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941370","description":"JavaScript - global variable found","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"941380","description":"AngularJS - client side template injection detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"SQLI","description":"SQL - injection","rules":[{"ruleId":"942100","description":"SQL Injection Attack - Detected via libinjection","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942110","description":"SQL - Injection Attack: Common Injection Testing Detected","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942120","description":"SQL - Injection Attack: SQL Operator Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942140","description":"SQL - Injection Attack: Common DB Names Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942150","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942160","description":"Detects - blind sqli tests using sleep() or benchmark().","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942170","description":"Detects - SQL benchmark and sleep injection attempts including conditional queries","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942180","description":"Detects - basic SQL authentication bypass attempts 1/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942190","description":"Detects - MSSQL code execution and information gathering attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942200","description":"Detects - MySQL comment-/space-obfuscated injections and backtick termination","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942210","description":"Detects - chained SQL injection attempts 1/2","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942220","description":"Looking - for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 - is the \"magic number\" crash","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942230","description":"Detects - conditional SQL injection attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942240","description":"Detects - MySQL charset switch and MSSQL DoS attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942250","description":"Detects - MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942260","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942270","description":"Looking - for basic sql injection. Common attack string for mysql, oracle and others.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942280","description":"Detects - Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942290","description":"Finds - basic MongoDB SQL injection attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942300","description":"Detects - MySQL comments, conditions and ch(a)r injections","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942310","description":"Detects - chained SQL injection attempts 2/2","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942320","description":"Detects - MySQL and PostgreSQL stored procedure/function injections","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942330","description":"Detects - classic SQL injection probings 1/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942340","description":"Detects - basic SQL authentication bypass attempts 3/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942350","description":"Detects - MySQL UDF injection and other data/structure manipulation attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942360","description":"Detects - concatenated basic SQL injection and SQLLFI attempts","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942361","description":"Detects - basic SQL injection based on keyword alter or union","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942370","description":"Detects - classic SQL injection probings 2/3","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942380","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942390","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942400","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942410","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942430","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (12)","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942440","description":"SQL - Comment Sequence Detected.","defaultAction":"AnomalyScoring","defaultState":"Disabled"},{"ruleId":"942450","description":"SQL - Hex Encoding Identified","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942470","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942480","description":"SQL - Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942500","description":"MySQL - in-line comment detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"942510","description":"SQLi - bypass attempt by ticks or backticks detected.","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"FIX","description":"Session - Fixation attacks","rules":[{"ruleId":"943100","description":"Possible Session - Fixation Attack: Setting Cookie Values in HTML","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"943110","description":"Possible - Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"943120","description":"Possible - Session Fixation Attack: SessionID Parameter Name with No Referer","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"JAVA","description":"Java - attacks","rules":[{"ruleId":"944100","description":"Remote Command Execution: - Suspicious Java class detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944110","description":"Remote - Command Execution: Java process spawn (CVE-2017-9805)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944120","description":"Remote - Command Execution: Java serialization (CVE-2015-5842)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944130","description":"Suspicious - Java class detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944200","description":"Magic - bytes Detected, probable java serialization in use","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944210","description":"Magic - bytes Detected Base64 Encoded, probable java serialization in use","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944240","description":"Remote - Command Execution: Java serialization and Log4j vulnerability (CVE-2021-44228, - CVE-2021-45046)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"944250","description":"Remote - Command Execution: Suspicious Java method detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"METHOD-ENFORCEMENT","description":"Method - Enforcement","rules":[{"ruleId":"911100","description":"Method is not allowed - by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"PROTOCOL-ENFORCEMENT","description":"Protocol - Enforcement","rules":[{"ruleId":"920100","description":"Invalid HTTP Request - Line","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920120","description":"Attempted - multipart/form-data bypass","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920121","description":"Attempted - multipart/form-data bypass","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920160","description":"Content-Length - HTTP header is not numeric.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920170","description":"GET - or HEAD Request with Body Content.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920171","description":"GET - or HEAD Request with Transfer-Encoding.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920180","description":"POST - without Content-Length or Transfer-Encoding headers.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920190","description":"Range: - Invalid Last Byte Value.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920200","description":"Range: - Too many fields (6 or more)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920201","description":"Range: - Too many fields for pdf request (63 or more)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920210","description":"Multiple/Conflicting - Connection Header Data Found.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920220","description":"URL - Encoding Abuse Attack Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920230","description":"Multiple - URL Encoding Detected","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920240","description":"URL - Encoding Abuse Attack Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920260","description":"Unicode - Full/Half Width Abuse Attack Attempt","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920270","description":"Invalid - character in request (null character)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920271","description":"Invalid - character in request (non printable characters)","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920280","description":"Request - Missing a Host Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920290","description":"Empty - Host Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920300","description":"Request - Missing an Accept Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920310","description":"Request - Has an Empty Accept Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920311","description":"Request - Has an Empty Accept Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920320","description":"Missing - User Agent Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920330","description":"Empty - User Agent Header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920340","description":"Request - Containing Content, but Missing Content-Type header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920341","description":"Request - Containing Content Requires Content-Type header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920350","description":"Host - header is a numeric IP address","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920420","description":"Request - content type is not allowed by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920430","description":"HTTP - protocol version is not allowed by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920440","description":"URL - file extension is restricted by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920450","description":"HTTP - header is restricted by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920470","description":"Illegal - Content-Type header","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920480","description":"Request - content type charset is not allowed by policy","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920181","description":"Content-Length - and Transfer-Encoding headers present","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"920500","description":"Attempt - to access a backup or working file","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"General","description":"Method - Enforcement","rules":[{"ruleId":"200002","description":"Failed to parse request - body.","defaultAction":"AnomalyScoring","defaultState":"Enabled"},{"ruleId":"200003","description":"Multipart - request body failed strict validation","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]},{"ruleGroupName":"NODEJS","description":"Node - JS Attacks","rules":[{"ruleId":"934100","description":"Node.js Injection Attack","defaultAction":"AnomalyScoring","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/Microsoft_BotManagerRuleSet_1.1","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"Microsoft_BotManagerRuleSet_1.1","properties":{"ruleSetType":"Microsoft_BotManagerRuleSet","ruleSetVersion":"1.1","ruleSetId":"e44514af-018d-49e9-8070-c9edac0f3a0d","ruleGroups":[{"ruleGroupName":"BadBots","description":"Bad - bots","rules":[{"ruleId":"Bot100100","description":"Malicious bots detected - by threat intelligence","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"Bot100200","description":"Malicious - bots that have falsified their identity","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"Bot100300","description":"High - risk bots detected by threat intelligence","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"GoodBots","description":"Good - bots","rules":[{"ruleId":"Bot200100","description":"Search engine crawlers","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200200","description":"Verified - misc bots","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200300","description":"Verified - link checker bots","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200400","description":"Verified - social media bots","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200500","description":"Verified - content fetchers","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200600","description":"Verified - feed fetchers","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200700","description":"Verified - Advertising bots","defaultAction":"Allow","defaultState":"Enabled"}]},{"ruleGroupName":"UnknownBots","description":"Unknown - bots","rules":[{"ruleId":"Bot300100","description":"Unspecified identity","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300200","description":"Tools - and frameworks for web crawling and attacks","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300300","description":"General - purpose HTTP clients and SDKs","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300400","description":"Service - agents","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300500","description":"Site - health monitoring services","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300600","description":"Unknown - bots detected by threat intelligence","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300700","description":"Other - bots","defaultAction":"Log","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/Microsoft_DefaultRuleSet_1.2","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"Microsoft_DefaultRuleSet_1.2","properties":{"ruleSetType":"Microsoft_DefaultRuleSet","ruleSetVersion":"1.2","ruleSetId":"8125d145-ddc5-4d90-9bc3-24c5f2de69a2","ruleGroups":[{"ruleGroupName":"MS-ThreatIntel-WebShells","description":"Web - shell attacks","rules":[{"ruleId":"99005002","description":"Web Shell Interaction - Attempt (POST)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005003","description":"Web - Shell Upload Attempt (POST) - CHOPPER PHP","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005004","description":"Web - Shell Upload Attempt (POST) - CHOPPER ASPX","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005005","description":"Web - Shell Interaction Attempt","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005006","description":"Spring4Shell - Interaction Attempt","defaultAction":"Block","defaultState":"Disabled"}]},{"ruleGroupName":"MS-ThreatIntel-AppSec","description":"Path - traversal evasion","rules":[{"ruleId":"99030001","description":"Path Traversal - Evasion in Headers (/.././../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99030002","description":"Path - Traversal Evasion in Request Body (/.././../)","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-SQLI","description":"SQL - injection","rules":[{"ruleId":"99031001","description":"SQL Injection Attack: - Common Injection Testing Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99031002","description":"SQL - Comment Sequence Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99031003","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99031004","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-CVEs","description":"Rest - API exploitation","rules":[{"ruleId":"99001001","description":"Attempted F5 - tmui (CVE-2020-5902) REST API Exploitation with known credentials","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001002","description":"Attempted - Citrix NSC_USER directory traversal (CVE-2019-19781)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001003","description":"Attempted - Atlassian Confluence Widget Connector exploitation (CVE-2019-3396)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001004","description":"Attempted - Pulse Secure custom template exploitation (CVE-2020-8243)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001005","description":"Attempted - SharePoint type converter exploitation (CVE-2020-0932)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001006","description":"Attempted - Pulse Connect directory traversal (CVE-2019-11510)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001007","description":"Attempted - Junos OS J-Web local file inclusion (CVE-2020-1631)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001008","description":"Attempted - Fortinet path traversal (CVE-2018-13379)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001009","description":"Attempted - Apache struts ognl injection (CVE-2017-5638)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001010","description":"Attempted - Apache struts ognl injection (CVE-2017-12611)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001011","description":"Attempted - Oracle WebLogic path traversal (CVE-2020-14882)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001012","description":"Attempted - Telerik WebUI insecure deserialization exploitation (CVE-2019-18935)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001013","description":"Attempted - SharePoint insecure XML deserialization (CVE-2019-0604)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001014","description":"Attempted - Spring Cloud routing-expression injection (CVE-2022-22963)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001015","description":"Attempted - Spring Framework unsafe class object exploitation (CVE-2022-22965)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001016","description":"Attempted - Spring Cloud Gateway Actuator injection (CVE-2022-22947)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001017","description":"Attempted - Apache Struts file upload exploitation (CVE-2023-50164)","defaultAction":"Block","defaultState":"Disabled"}]},{"ruleGroupName":"PROTOCOL-ATTACK","description":"Protocol - attack","rules":[{"ruleId":"921110","description":"HTTP Request Smuggling - Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921120","description":"HTTP - Response Splitting Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921130","description":"HTTP - Response Splitting Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921140","description":"HTTP - Header Injection Attack via headers","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921150","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921160","description":"HTTP - Header Injection Attack via payload (CR/LF and header-name detected)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921151","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"LFI","description":"Local - file inclusion","rules":[{"ruleId":"930100","description":"Path Traversal - Attack (/../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930110","description":"Path - Traversal Attack (/../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930120","description":"OS - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930130","description":"Restricted - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RFI","description":"Remote - file inclusion","rules":[{"ruleId":"931100","description":"Possible Remote - File Inclusion (RFI) Attack: URL Parameter using IP Address","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931110","description":"Possible - Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used - w/URL Payload","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931120","description":"Possible - Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark - Character (?)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931130","description":"Possible - Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RCE","description":"Remote - Command Execution attacks","rules":[{"ruleId":"932100","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932105","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932110","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932115","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932120","description":"Remote - Command Execution: Windows PowerShell Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932130","description":"Remote - Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) - Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932140","description":"Remote - Command Execution: Windows FOR/IF Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932150","description":"Remote - Command Execution: Direct Unix Command Execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932160","description":"Remote - Command Execution: Unix Shell Code Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932170","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932171","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932180","description":"Restricted - File Upload Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"PHP","description":"PHP - attacks","rules":[{"ruleId":"933100","description":"PHP Injection Attack: - PHP Open Tag Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933110","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933120","description":"PHP - Injection Attack: Configuration Directive Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933130","description":"PHP - Injection Attack: Variables Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933140","description":"PHP - Injection Attack: I/O Stream Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933150","description":"PHP - Injection Attack: High-Risk PHP Function Name Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933151","description":"PHP - Injection Attack: Medium-Risk PHP Function Name Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933160","description":"PHP - Injection Attack: High-Risk PHP Function Call Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933170","description":"PHP - Injection Attack: Serialized Object Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933180","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"XSS","description":"Cross-site - scripting","rules":[{"ruleId":"941100","description":"XSS Attack Detected - via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941101","description":"XSS - Attack Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941110","description":"XSS - Filter - Category 1: Script Tag Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941120","description":"XSS - Filter - Category 2: Event Handler Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941130","description":"XSS - Filter - Category 3: Attribute Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941140","description":"XSS - Filter - Category 4: Javascript URI Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941150","description":"XSS - Filter - Category 5: Disallowed HTML Attributes","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941160","description":"NoScript - XSS InjectionChecker: HTML Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941170","description":"NoScript - XSS InjectionChecker: Attribute Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941180","description":"Node-Validator - Blacklist Keywords","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941190","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941200","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941210","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941220","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941230","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941240","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941250","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941260","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941270","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941280","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941290","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941300","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941310","description":"US-ASCII - Malformed Encoding XSS Filter - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941320","description":"Possible - XSS Attack Detected - HTML Tag Handler","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941330","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941340","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941350","description":"UTF-7 - Encoding IE XSS - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"SQLI","description":"SQL - injection","rules":[{"ruleId":"942100","description":"SQL Injection Attack - Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942110","description":"SQL - Injection Attack: Common Injection Testing Detected","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942120","description":"SQL - Injection Attack: SQL Operator Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942140","description":"SQL - Injection Attack: Common DB Names Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942150","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942160","description":"Detects - blind sqli tests using sleep() or benchmark().","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942170","description":"Detects - SQL benchmark and sleep injection attempts including conditional queries","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942180","description":"Detects - basic SQL authentication bypass attempts 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942190","description":"Detects - MSSQL code execution and information gathering attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942200","description":"Detects - MySQL comment-/space-obfuscated injections and backtick termination","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942210","description":"Detects - chained SQL injection attempts 1/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942220","description":"Looking - for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 - is the \"magic number\" crash","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942230","description":"Detects - conditional SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942240","description":"Detects - MySQL charset switch and MSSQL DoS attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942250","description":"Detects - MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942260","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942270","description":"Looking - for basic sql injection. Common attack string for mysql, oracle and others.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942280","description":"Detects - Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942290","description":"Finds - basic MongoDB SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942300","description":"Detects - MySQL comments, conditions and ch(a)r injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942310","description":"Detects - chained SQL injection attempts 2/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942320","description":"Detects - MySQL and PostgreSQL stored procedure/function injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942330","description":"Detects - classic SQL injection probings 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942340","description":"Detects - basic SQL authentication bypass attempts 3/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942350","description":"Detects - MySQL UDF injection and other data/structure manipulation attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942360","description":"Detects - concatenated basic SQL injection and SQLLFI attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942361","description":"Detects - basic SQL injection based on keyword alter or union","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942370","description":"Detects - classic SQL injection probings 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942380","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942390","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942400","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942410","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942430","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (12)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942440","description":"SQL - Comment Sequence Detected.","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942450","description":"SQL - Hex Encoding Identified","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942470","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942480","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"FIX","description":"Session - Fixation attacks","rules":[{"ruleId":"943100","description":"Possible Session - Fixation Attack: Setting Cookie Values in HTML","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"943110","description":"Possible - Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"943120","description":"Possible - Session Fixation Attack: SessionID Parameter Name with No Referer","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"JAVA","description":"Java - attacks","rules":[{"ruleId":"944100","description":"Remote Command Execution: - Suspicious Java class detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944110","description":"Remote - Command Execution: Java process spawn (CVE-2017-9805)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944120","description":"Remote - Command Execution: Java serialization (CVE-2015-5842)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944130","description":"Suspicious - Java class detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944200","description":"Magic - bytes Detected, probable java serialization in use","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944210","description":"Magic - bytes Detected Base64 Encoded, probable java serialization in use","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944240","description":"Remote - Command Execution: Java serialization and Log4j vulnerability (CVE-2021-44228, - CVE-2021-45046)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944250","description":"Remote - Command Execution: Suspicious Java method detected","defaultAction":"Block","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/Microsoft_DefaultRuleSet_1.1","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"Microsoft_DefaultRuleSet_1.1","properties":{"ruleSetType":"Microsoft_DefaultRuleSet","ruleSetVersion":"1.1","ruleSetId":"8125d145-ddc5-4d90-9bc3-24c5f2de69a2","ruleGroups":[{"ruleGroupName":"MS-ThreatIntel-WebShells","description":"Web - shell attacks","rules":[{"ruleId":"99005002","description":"Web Shell Interaction - Attempt (POST)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005003","description":"Web - Shell Upload Attempt (POST) - CHOPPER PHP","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005004","description":"Web - Shell Upload Attempt (POST) - CHOPPER ASPX","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99005006","description":"Spring4Shell - Interaction Attempt","defaultAction":"Block","defaultState":"Disabled"}]},{"ruleGroupName":"MS-ThreatIntel-AppSec","description":"Path - traversal evasion","rules":[{"ruleId":"99030001","description":"Path Traversal - Evasion in Headers (/.././../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99030002","description":"Path - Traversal Evasion in Request Body (/.././../)","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-SQLI","description":"SQL - injection","rules":[{"ruleId":"99031001","description":"SQL Injection Attack: - Common Injection Testing Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99031002","description":"SQL - Comment Sequence Detected.","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"MS-ThreatIntel-CVEs","description":"Rest - API exploitation","rules":[{"ruleId":"99001001","description":"Attempted F5 - tmui (CVE-2020-5902) REST API Exploitation with known credentials","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"99001014","description":"Attempted - Spring Cloud routing-expression injection (CVE-2022-22963)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001015","description":"Attempted - Spring Framework unsafe class object exploitation (CVE-2022-22965)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001016","description":"Attempted - Spring Cloud Gateway Actuator injection (CVE-2022-22947)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001017","description":"Attempted - Apache Struts file upload exploitation (CVE-2023-50164)","defaultAction":"Block","defaultState":"Disabled"}]},{"ruleGroupName":"PROTOCOL-ATTACK","description":"Protocol - attack","rules":[{"ruleId":"921110","description":"HTTP Request Smuggling - Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921120","description":"HTTP - Response Splitting Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921130","description":"HTTP - Response Splitting Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921140","description":"HTTP - Header Injection Attack via headers","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921150","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921160","description":"HTTP - Header Injection Attack via payload (CR/LF and header-name detected)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921151","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"LFI","description":"Local - file inclusion","rules":[{"ruleId":"930100","description":"Path Traversal - Attack (/../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930110","description":"Path - Traversal Attack (/../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930120","description":"OS - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930130","description":"Restricted - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RFI","description":"Remote - file inclusion","rules":[{"ruleId":"931100","description":"Possible Remote - File Inclusion (RFI) Attack: URL Parameter using IP Address","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931110","description":"Possible - Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used - w/URL Payload","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931120","description":"Possible - Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark - Character (?)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931130","description":"Possible - Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RCE","description":"Remote - Command Execution attacks","rules":[{"ruleId":"932100","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932105","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932110","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932115","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932120","description":"Remote - Command Execution: Windows PowerShell Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932130","description":"Remote - Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) - Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932140","description":"Remote - Command Execution: Windows FOR/IF Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932150","description":"Remote - Command Execution: Direct Unix Command Execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932160","description":"Remote - Command Execution: Unix Shell Code Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932170","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932171","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932180","description":"Restricted - File Upload Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"PHP","description":"PHP - attacks","rules":[{"ruleId":"933100","description":"PHP Injection Attack: - PHP Open Tag Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933110","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933120","description":"PHP - Injection Attack: Configuration Directive Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933130","description":"PHP - Injection Attack: Variables Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933140","description":"PHP - Injection Attack: I/O Stream Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933150","description":"PHP - Injection Attack: High-Risk PHP Function Name Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933151","description":"PHP - Injection Attack: Medium-Risk PHP Function Name Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933160","description":"PHP - Injection Attack: High-Risk PHP Function Call Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933170","description":"PHP - Injection Attack: Serialized Object Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933180","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"XSS","description":"Cross-site - scripting","rules":[{"ruleId":"941100","description":"XSS Attack Detected - via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941101","description":"XSS - Attack Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941110","description":"XSS - Filter - Category 1: Script Tag Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941120","description":"XSS - Filter - Category 2: Event Handler Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941130","description":"XSS - Filter - Category 3: Attribute Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941140","description":"XSS - Filter - Category 4: Javascript URI Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941150","description":"XSS - Filter - Category 5: Disallowed HTML Attributes","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941160","description":"NoScript - XSS InjectionChecker: HTML Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941170","description":"NoScript - XSS InjectionChecker: Attribute Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941180","description":"Node-Validator - Blacklist Keywords","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941190","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941200","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941210","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941220","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941230","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941240","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941250","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941260","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941270","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941280","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941290","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941300","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941310","description":"US-ASCII - Malformed Encoding XSS Filter - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941320","description":"Possible - XSS Attack Detected - HTML Tag Handler","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941330","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941340","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941350","description":"UTF-7 - Encoding IE XSS - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"SQLI","description":"SQL - injection","rules":[{"ruleId":"942100","description":"SQL Injection Attack - Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942110","description":"SQL - Injection Attack: Common Injection Testing Detected","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942120","description":"SQL - Injection Attack: SQL Operator Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942140","description":"SQL - Injection Attack: Common DB Names Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942150","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942160","description":"Detects - blind sqli tests using sleep() or benchmark().","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942170","description":"Detects - SQL benchmark and sleep injection attempts including conditional queries","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942180","description":"Detects - basic SQL authentication bypass attempts 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942190","description":"Detects - MSSQL code execution and information gathering attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942200","description":"Detects - MySQL comment-/space-obfuscated injections and backtick termination","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942210","description":"Detects - chained SQL injection attempts 1/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942220","description":"Looking - for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 - is the \"magic number\" crash","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942230","description":"Detects - conditional SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942240","description":"Detects - MySQL charset switch and MSSQL DoS attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942250","description":"Detects - MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942260","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942270","description":"Looking - for basic sql injection. Common attack string for mysql, oracle and others.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942280","description":"Detects - Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942290","description":"Finds - basic MongoDB SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942300","description":"Detects - MySQL comments, conditions and ch(a)r injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942310","description":"Detects - chained SQL injection attempts 2/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942320","description":"Detects - MySQL and PostgreSQL stored procedure/function injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942330","description":"Detects - classic SQL injection probings 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942340","description":"Detects - basic SQL authentication bypass attempts 3/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942350","description":"Detects - MySQL UDF injection and other data/structure manipulation attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942360","description":"Detects - concatenated basic SQL injection and SQLLFI attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942361","description":"Detects - basic SQL injection based on keyword alter or union","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942370","description":"Detects - classic SQL injection probings 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942380","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942390","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942400","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942410","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942430","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (12)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942440","description":"SQL - Comment Sequence Detected.","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"942450","description":"SQL - Hex Encoding Identified","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942470","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942480","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"FIX","description":"Session - Fixation attacks","rules":[{"ruleId":"943100","description":"Possible Session - Fixation Attack: Setting Cookie Values in HTML","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"943110","description":"Possible - Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"943120","description":"Possible - Session Fixation Attack: SessionID Parameter Name with No Referer","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"JAVA","description":"Java - attacks","rules":[{"ruleId":"944100","description":"Remote Command Execution: - Suspicious Java class detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944110","description":"Remote - Command Execution: Java process spawn (CVE-2017-9805)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944120","description":"Remote - Command Execution: Java serialization (CVE-2015-5842)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944130","description":"Suspicious - Java class detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944200","description":"Magic - bytes Detected, probable java serialization in use","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944210","description":"Magic - bytes Detected Base64 Encoded, probable java serialization in use","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944240","description":"Remote - Command Execution: Java serialization and Log4j vulnerability (CVE-2021-44228, - CVE-2021-45046)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944250","description":"Remote - Command Execution: Suspicious Java method detected","defaultAction":"Block","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/Microsoft_BotManagerRuleSet_1.0","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"Microsoft_BotManagerRuleSet_1.0","properties":{"ruleSetType":"Microsoft_BotManagerRuleSet","ruleSetVersion":"1.0","ruleSetId":"e44514af-018d-49e9-8070-c9edac0f3a0d","ruleGroups":[{"ruleGroupName":"BadBots","description":"Bad - bots","rules":[{"ruleId":"Bot100100","description":"Malicious bots detected - by threat intelligence","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"Bot100200","description":"Malicious - bots that have falsified their identity","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"GoodBots","description":"Good - bots","rules":[{"ruleId":"Bot200100","description":"Search engine crawlers","defaultAction":"Allow","defaultState":"Enabled"},{"ruleId":"Bot200200","description":"Unverified - search engine crawlers","defaultAction":"Log","defaultState":"Enabled"}]},{"ruleGroupName":"UnknownBots","description":"Unknown - bots","rules":[{"ruleId":"Bot300100","description":"Unspecified identity","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300200","description":"Tools - and frameworks for web crawling and attacks","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300300","description":"General - purpose HTTP clients and SDKs","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300400","description":"Service - agents","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300500","description":"Site - health monitoring services","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300600","description":"Unknown - bots detected by threat intelligence","defaultAction":"Log","defaultState":"Enabled"},{"ruleId":"Bot300700","description":"Other - bots","defaultAction":"Log","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/DefaultRuleSet_1.0","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"DefaultRuleSet_1.0","properties":{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"1.0","ruleSetId":"8125d145-ddc5-4d90-9bc3-24c5f2de69a2","ruleGroups":[{"ruleGroupName":"MS-ThreatIntel-WebShells","description":"Web - shell attacks","rules":[{"ruleId":"99005006","description":"Spring4Shell Interaction - Attempt","defaultAction":"Block","defaultState":"Disabled"}]},{"ruleGroupName":"MS-ThreatIntel-CVEs","description":"Rest - API exploitation","rules":[{"ruleId":"99001014","description":"Attempted Spring - Cloud routing-expression injection (CVE-2022-22963)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001015","description":"Attempted - Spring Framework unsafe class object exploitation (CVE-2022-22965)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001016","description":"Attempted - Spring Cloud Gateway Actuator injection (CVE-2022-22947)","defaultAction":"Block","defaultState":"Disabled"},{"ruleId":"99001017","description":"Attempted - Apache Struts file upload exploitation (CVE-2023-50164)","defaultAction":"Block","defaultState":"Disabled"}]},{"ruleGroupName":"PROTOCOL-ATTACK","description":"Protocol - attack","rules":[{"ruleId":"921110","description":"HTTP Request Smuggling - Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921120","description":"HTTP - Response Splitting Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921130","description":"HTTP - Response Splitting Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921140","description":"HTTP - Header Injection Attack via headers","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921150","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921160","description":"HTTP - Header Injection Attack via payload (CR/LF and header-name detected)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"921151","description":"HTTP - Header Injection Attack via payload (CR/LF detected)","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"LFI","description":"Local - file inclusion","rules":[{"ruleId":"930100","description":"Path Traversal - Attack (/../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930110","description":"Path - Traversal Attack (/../)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930120","description":"OS - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930130","description":"Restricted - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RFI","description":"Remote - file inclusion","rules":[{"ruleId":"931100","description":"Possible Remote - File Inclusion (RFI) Attack: URL Parameter using IP Address","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931110","description":"Possible - Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used - w/URL Payload","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931120","description":"Possible - Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark - Character (?)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931130","description":"Possible - Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RCE","description":"Remote - Command Execution attacks","rules":[{"ruleId":"932100","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932105","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932110","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932115","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932120","description":"Remote - Command Execution: Windows PowerShell Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932130","description":"Remote - Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) - Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932140","description":"Remote - Command Execution: Windows FOR/IF Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932150","description":"Remote - Command Execution: Direct Unix Command Execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932160","description":"Remote - Command Execution: Unix Shell Code Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932170","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932171","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932180","description":"Restricted - File Upload Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"PHP","description":"PHP - attacks","rules":[{"ruleId":"933100","description":"PHP Injection Attack: - PHP Open Tag Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933110","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933120","description":"PHP - Injection Attack: Configuration Directive Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933130","description":"PHP - Injection Attack: Variables Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933140","description":"PHP - Injection Attack: I/O Stream Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933150","description":"PHP - Injection Attack: High-Risk PHP Function Name Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933151","description":"PHP - Injection Attack: Medium-Risk PHP Function Name Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933160","description":"PHP - Injection Attack: High-Risk PHP Function Call Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933170","description":"PHP - Injection Attack: Serialized Object Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933180","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"XSS","description":"Cross-site - scripting","rules":[{"ruleId":"941100","description":"XSS Attack Detected - via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941101","description":"XSS - Attack Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941110","description":"XSS - Filter - Category 1: Script Tag Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941120","description":"XSS - Filter - Category 2: Event Handler Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941130","description":"XSS - Filter - Category 3: Attribute Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941140","description":"XSS - Filter - Category 4: Javascript URI Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941150","description":"XSS - Filter - Category 5: Disallowed HTML Attributes","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941160","description":"NoScript - XSS InjectionChecker: HTML Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941170","description":"NoScript - XSS InjectionChecker: Attribute Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941180","description":"Node-Validator - Blacklist Keywords","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941190","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941200","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941210","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941220","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941230","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941240","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941250","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941260","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941270","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941280","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941290","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941300","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941310","description":"US-ASCII - Malformed Encoding XSS Filter - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941320","description":"Possible - XSS Attack Detected - HTML Tag Handler","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941330","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941340","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941350","description":"UTF-7 - Encoding IE XSS - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"SQLI","description":"SQL - injection","rules":[{"ruleId":"942100","description":"SQL Injection Attack - Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942110","description":"SQL - Injection Attack: Common Injection Testing Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942120","description":"SQL - Injection Attack: SQL Operator Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942140","description":"SQL - Injection Attack: Common DB Names Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942150","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942160","description":"Detects - blind sqli tests using sleep() or benchmark().","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942170","description":"Detects - SQL benchmark and sleep injection attempts including conditional queries","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942180","description":"Detects - basic SQL authentication bypass attempts 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942190","description":"Detects - MSSQL code execution and information gathering attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942200","description":"Detects - MySQL comment-/space-obfuscated injections and backtick termination","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942210","description":"Detects - chained SQL injection attempts 1/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942220","description":"Looking - for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 - is the \"magic number\" crash","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942230","description":"Detects - conditional SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942240","description":"Detects - MySQL charset switch and MSSQL DoS attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942250","description":"Detects - MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942260","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942270","description":"Looking - for basic sql injection. Common attack string for mysql, oracle and others.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942280","description":"Detects - Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942290","description":"Finds - basic MongoDB SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942300","description":"Detects - MySQL comments, conditions and ch(a)r injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942310","description":"Detects - chained SQL injection attempts 2/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942320","description":"Detects - MySQL and PostgreSQL stored procedure/function injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942330","description":"Detects - classic SQL injection probings 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942340","description":"Detects - basic SQL authentication bypass attempts 3/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942350","description":"Detects - MySQL UDF injection and other data/structure manipulation attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942360","description":"Detects - concatenated basic SQL injection and SQLLFI attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942361","description":"Detects - basic SQL injection based on keyword alter or union","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942370","description":"Detects - classic SQL injection probings 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942380","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942390","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942400","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942410","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942430","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (12)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942440","description":"SQL - Comment Sequence Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942450","description":"SQL - Hex Encoding Identified","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942470","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942480","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"FIX","description":"Session - Fixation attacks","rules":[{"ruleId":"943100","description":"Possible Session - Fixation Attack: Setting Cookie Values in HTML","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"943110","description":"Possible - Session Fixation Attack: SessionID Parameter Name with Off-Domain Referer","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"943120","description":"Possible - Session Fixation Attack: SessionID Parameter Name with No Referer","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"JAVA","description":"Java - attacks","rules":[{"ruleId":"944100","description":"Remote Command Execution: - Suspicious Java class detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944110","description":"Remote - Command Execution: Java process spawn (CVE-2017-9805)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944120","description":"Remote - Command Execution: Java serialization (CVE-2015-5842)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944130","description":"Suspicious - Java class detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944200","description":"Magic - bytes Detected, probable java serialization in use","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944210","description":"Magic - bytes Detected Base64 Encoded, probable java serialization in use","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944240","description":"Remote - Command Execution: Java serialization and Log4j vulnerability (CVE-2021-44228, - CVE-2021-45046)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944250","description":"Remote - Command Execution: Suspicious Java method detected","defaultAction":"Block","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/DefaultRuleSet_preview-0.1","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"DefaultRuleSet_preview-0.1","properties":{"ruleSetType":"DefaultRuleSet","ruleSetVersion":"preview-0.1","ruleSetId":"8125d145-ddc5-4d90-9bc3-24c5f2de69a2","ruleGroups":[{"ruleGroupName":"LFI","description":"Local - file inclusion","rules":[{"ruleId":"930100","description":"Path Traversal - Attack (/../) using Encoded Payloads","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930110","description":"Path - Traversal Attack (/../) using Decoded Payloads","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"930130","description":"Restricted - File Access Attempt","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RFI","description":"Remote - file inclusion","rules":[{"ruleId":"931100","description":"Possible Remote - File Inclusion (RFI) Attack: URL Parameter using IP Address","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931110","description":"Possible - Remote File Inclusion (RFI) Attack: Common RFI Vulnerable Parameter Name used - w/URL Payload","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931120","description":"Possible - Remote File Inclusion (RFI) Attack: URL Payload Used w/Trailing Question Mark - Character (?)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"931130","description":"Possible - Remote File Inclusion (RFI) Attack: Off-Domain Reference/Link","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"RCE","description":"Remote - Command Execution attacks","rules":[{"ruleId":"932100","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932105","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932106","description":"Remote - Command Execution: Unix Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932110","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932115","description":"Remote - Command Execution: Windows Command Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932130","description":"Remote - Command Execution: Unix Shell Expression or Confluence Vulnerability (CVE-2022-26134) - Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932140","description":"Remote - Command Execution: Windows FOR/IF Command Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932150","description":"Remote - Command Execution: Direct Unix Command Execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932170","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932171","description":"Remote - Command Execution: Shellshock (CVE-2014-6271)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"932190","description":"Remote - Command Execution: Wildcard","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"PHP","description":"PHP - attacks","rules":[{"ruleId":"933100","description":"PHP Injection Attack: - Opening/Closing Tag Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933110","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933111","description":"PHP - Injection Attack: PHP Script File Upload Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933131","description":"PHP - Injection Attack: Variables Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933140","description":"PHP - Injection Attack: I/O Stream Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933160","description":"PHP - Injection Attack: High-Risk PHP Function Call Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933161","description":"PHP - Injection Attack: Low-Value PHP Function Call Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933170","description":"PHP - Injection Attack: Serialized Object Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933180","description":"PHP - Injection Attack: Variable Function Call Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933190","description":"PHP - Injection Attack: PHP Closing Tag Found","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933200","description":"PHP - Injection Attack: Abusing of PHP wrappers could lead to RCE","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"933210","description":"PHP - Injection Attack: Variable Function Call Found (bypass 933180)","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"XSS","description":"Cross-site - scripting","rules":[{"ruleId":"941100","description":"XSS Attack Detected - via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941101","description":"XSS - Attack Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941110","description":"XSS - Filter - Category 1: Script Tag Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941120","description":"XSS - Filter - Category 2: Event Handler Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941130","description":"XSS - Filter - Category 3: Attribute Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941140","description":"XSS - Filter - Category 4: Javascript URI Vector","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941150","description":"XSS - Filter - Category 5: Disallowed HTML Attributes","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941160","description":"NoScript - XSS InjectionChecker: HTML Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941170","description":"NoScript - XSS InjectionChecker: Attribute Injection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941180","description":"Node-Validator - Blacklist Keywords","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941190","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941200","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941210","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941220","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941230","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941240","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941250","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941260","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941270","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941280","description":"IE - XSS Filters - Attack Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941290","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941300","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941310","description":"US-ASCII - Malformed Encoding XSS Filter - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941320","description":"Possible - XSS Attack Detected - HTML Tag Handler","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941330","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941340","description":"IE - XSS Filters - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941350","description":"UTF-7 - Encoding IE XSS - Attack Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"941360","description":"JSFuck - / Hieroglyphy obfuscation detected","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"SQLI","description":"SQL - injection","rules":[{"ruleId":"942100","description":"SQL Injection Attack - Detected via libinjection","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942110","description":"SQL - Injection Attack: Common Injection Testing Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942120","description":"SQL - Injection Attack: SQL Operator Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942140","description":"SQL - Injection Attack: Common DB Names Detected","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942160","description":"Detects - blind sqli tests using sleep() or benchmark().","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942170","description":"Detects - SQL benchmark and sleep injection attempts including conditional queries","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942180","description":"Detects - basic SQL authentication bypass attempts 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942190","description":"Detects - MSSQL code execution and information gathering attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942200","description":"Detects - MySQL comment-/space-obfuscated injections and backtick termination","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942210","description":"Detects - chained SQL injection attempts 1/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942220","description":"Looking - for integer overflow attacks, these are taken from skipfish, except 3.0.00738585072007e-308 - is the \"magic number\" crash","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942230","description":"Detects - conditional SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942240","description":"Detects - MySQL charset switch and MSSQL DoS attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942250","description":"Detects - MATCH AGAINST, MERGE and EXECUTE IMMEDIATE injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942251","description":"Detects - HAVING injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942260","description":"Detects - basic SQL authentication bypass attempts 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942270","description":"Looking - for basic sql injection. Common attack string for mysql, oracle and others.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942280","description":"Detects - Postgres pg_sleep injection, waitfor delay attacks and database shutdown attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942290","description":"Finds - basic MongoDB SQL injection attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942300","description":"Detects - MySQL comments, conditions and ch(a)r injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942310","description":"Detects - chained SQL injection attempts 2/2","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942320","description":"Detects - MySQL and PostgreSQL stored procedure/function injections","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942330","description":"Detects - classic SQL injection probings 1/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942340","description":"Detects - basic SQL authentication bypass attempts 3/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942350","description":"Detects - MySQL UDF injection and other data/structure manipulation attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942360","description":"Detects - concatenated basic SQL injection and SQLLFI attempts","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942361","description":"Detects - basic SQL injection based on keyword alter or union","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942370","description":"Detects - classic SQL injection probings 2/3","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942380","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942390","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942400","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942410","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942430","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (12)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942431","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (6)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942432","description":"Restricted - SQL Character Anomaly Detection (args): # of special characters exceeded (2)","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942440","description":"SQL - Comment Sequence Detected.","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942450","description":"SQL - Hex Encoding Identified","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942470","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942480","description":"SQL - Injection Attack","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"942490","description":"Detects - classic SQL injection probings 3/3","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"FIX","description":"Session - Fixation attacks","rules":[{"ruleId":"943100","description":"Possible Session - Fixation Attack: Setting Cookie Values in HTML","defaultAction":"Block","defaultState":"Enabled"}]},{"ruleGroupName":"JAVA","description":"Java - attacks","rules":[{"ruleId":"944100","description":"Java: possible payload - execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944110","description":"Java: - possible payload execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944120","description":"Java: - possible payload execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944200","description":"Java: - deserialization that could lead to payload execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944210","description":"Java: - base64 attack that could lead to payload execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944240","description":"Java: - possible payload execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944250","description":"Java: - possible payload execution","defaultAction":"Block","defaultState":"Enabled"},{"ruleId":"944300","description":"Java: - base64 attack that could lead to payload execution","defaultAction":"Block","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}},{"id":"/providers/Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets/BotProtection_preview-0.1","type":"Microsoft.Network/frontdoorwebapplicationfirewallmanagedrulesets","name":"BotProtection_preview-0.1","properties":{"ruleSetType":"BotProtection","ruleSetVersion":"preview-0.1","ruleSetId":"e44514af-018d-49e9-8070-c9edac0f3a0d","ruleGroups":[{"ruleGroupName":"KnownBadBots","description":"","rules":[{"ruleId":"Bot00001","description":"Malicious - Bots","defaultAction":"Block","defaultState":"Enabled"}]}],"provisioningState":"Succeeded"}}]}' - headers: - cache-control: - - no-cache - content-length: - - '130824' - content-type: - - application/json; charset=utf-8 - date: - - Mon, 22 Apr 2024 03:41:58 GMT - expires: - - '-1' - pragma: - - no-cache - strict-transport-security: - - max-age=31536000; includeSubDomains - x-cache: - - CONFIG_NOCACHE - x-content-type-options: - - nosniff + - '799' x-msedge-ref: - - 'Ref A: ACB7B8F9958B49E6967893757B303E28 Ref B: MAA201060513011 Ref C: 2024-04-22T03:41:58Z' + - 'Ref A: 1CB42F29561C490491646FB61C06A983 Ref B: SYD03EDGE1506 Ref C: 2025-05-01T07:33:00Z' status: code: 200 message: OK diff --git a/src/front-door/azext_front_door/tests/latest/test_waf_scenarios.py b/src/front-door/azext_front_door/tests/latest/test_waf_scenarios.py index d937766140d..d36fd13e442 100644 --- a/src/front-door/azext_front_door/tests/latest/test_waf_scenarios.py +++ b/src/front-door/azext_front_door/tests/latest/test_waf_scenarios.py @@ -11,6 +11,18 @@ class WafTests(WafScenarioMixin, ScenarioTest): + # @live_only() # --defer seems not work with VCR.py well + @ResourceGroupPreparer(location='westus', additional_tags={'owner': 'jingnanxu'}) + def test_waf_captcha(self, resource_group): + blockpolicy = self.create_random_name(prefix='cli', length=24) + cmd = 'az network front-door waf-policy create -g {resource_group} -n {blockpolicy} --captcha-expiration-in-minutes 5 --mode prevention --sku Premium_AzureFrontDoor'.format(**locals()) + result = self.cmd(cmd).get_output_in_json() + self.assertEqual(result['name'], blockpolicy) + self.assertEqual(result['policySettings']['captchaExpirationInMinutes'], 5) + cmd = 'az network front-door waf-policy update -g {resource_group} -n {blockpolicy} --captcha-expiration-in-minutes 12'.format(**locals()) + result = self.cmd(cmd).get_output_in_json() + self.assertEqual(result['policySettings']['captchaExpirationInMinutes'], 12) + @live_only() # --defer seems not work with VCR.py well @ResourceGroupPreparer(location='westus', additional_tags={'owner': 'jingnanxu'}) def test_waf_log_scrubbing(self, resource_group): @@ -26,7 +38,7 @@ def test_waf_log_scrubbing(self, resource_group): options = '--log-scrubbing \"{{scrubbing-rules:[{{match-variable:QueryStringArgNames,selector-match-operator:EqualsAny}}],state:Enabled}}\"' cmd = 'az network front-door waf-policy update -g {resource_group} -n {blockpolicy}'.format(**locals()) result = self.cmd(cmd + ' ' + options).get_output_in_json() - self.assertEqual(result['policySettings']['logScrubbing']['state'], "Enabled") + self.assertEqual(result['policySettings']['scrubbingRules'][0]['state'], "Enabled") @live_only() # --defer seems not work with VCR.py well @ResourceGroupPreparer(location='westus', additional_tags={'owner': 'jingnanxu'}) @@ -225,7 +237,7 @@ def test_waf_policy_custom_rule_matching(self, resource_group): ruleName = self.create_random_name(prefix='cli', length=24) frontdoorName = self.create_random_name(prefix='cli', length=24) - cmd = 'az network front-door waf-policy create --resource-group {resource_group} --name {policyName}'.format(**locals()) + cmd = 'az network front-door waf-policy create --resource-group {resource_group} --name {policyName} --sku Classic_AzureFrontDoor'.format(**locals()) result = self.cmd(cmd).get_output_in_json() self.assertIn('customRules', result) @@ -269,9 +281,6 @@ def test_waf_policy_custom_rule_matching(self, resource_group): elapsed_seconds += 10 self.assertEqual(r.status_code, 403) - r = requests.post('http://{hostName}/'.format(**locals()), data="'key':'value'") - self.assertEqual(r.status_code, 200) - @ResourceGroupPreparer(location='westus', additional_tags={'owner': 'jingnanxu'}) def test_waf_policy_managed_rules(self, resource_group): # multi-line comment below @@ -337,12 +346,6 @@ def test_waf_policy_managed_rules(self, resource_group): self.assertEqual(result['managedRules']['managedRuleSets'][0]['ruleSetVersion'], version) self.assertEqual(result['managedRules']['managedRuleSets'][0]['ruleSetAction'], action) - cmd = 'az network front-door waf-policy managed-rule-definition list' - result = self.cmd(cmd).get_output_in_json() - defaultRuleSet = [ruleSet for ruleSet in result if ruleSet['ruleSetType'] == type][0] - sqlGroup = [group for group in defaultRuleSet['ruleGroups'] if group['ruleGroupName'] == rulegroupid][0] - rule = [rule for rule in sqlGroup['rules'] if rule['ruleId'] == ruleid][0] - self.assertEqual(rule['ruleId'], ruleid) @ResourceGroupPreparer(location='westus', additional_tags={'owner': 'jingnanxu'}) @live_only() # --defer seems not work with VCR.py well @@ -512,7 +515,7 @@ def test_waf_exclusions(self, resource_group): self.assertIn('customRules', result) self.assertIn('managedRules', result) self.assertIn('id', result) - self.assertEqual(result['sku']['name'], "Classic_AzureFrontDoor") + self.assertEqual(result['sku']['name'], "Premium_AzureFrontDoor") type = "DefaultRuleSet" version = "1.0" diff --git a/src/front-door/setup.py b/src/front-door/setup.py index c183a7eb149..552ffc44be2 100644 --- a/src/front-door/setup.py +++ b/src/front-door/setup.py @@ -8,7 +8,7 @@ from codecs import open from setuptools import setup, find_packages -VERSION = "1.2.1" +VERSION = "1.3.0" CLASSIFIERS = [ 'Development Status :: 4 - Beta',