diff --git a/internal/services/network/application_gateway_resource_test.go b/internal/services/network/application_gateway_resource_test.go index 73cc02823e89..d27ddd265eb1 100644 --- a/internal/services/network/application_gateway_resource_test.go +++ b/internal/services/network/application_gateway_resource_test.go @@ -1433,7 +1433,7 @@ resource "azurerm_web_application_firewall_policy" "test" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } policy_settings { @@ -2923,7 +2923,7 @@ resource "azurerm_web_application_firewall_policy" "testfwp" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } } @@ -3024,7 +3024,7 @@ resource "azurerm_web_application_firewall_policy" "testfwp" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } } @@ -3042,7 +3042,7 @@ resource "azurerm_web_application_firewall_policy" "testfwp_listener" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } } @@ -3146,7 +3146,7 @@ resource "azurerm_web_application_firewall_policy" "testfwp" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } } @@ -3164,7 +3164,7 @@ resource "azurerm_web_application_firewall_policy" "testfwp_path_rule" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } } diff --git a/internal/services/network/web_application_firewall_policy_resource_test.go b/internal/services/network/web_application_firewall_policy_resource_test.go index f765f0ec7264..76587dd9e2e4 100644 --- a/internal/services/network/web_application_firewall_policy_resource_test.go +++ b/internal/services/network/web_application_firewall_policy_resource_test.go @@ -437,7 +437,7 @@ resource "azurerm_web_application_firewall_policy" "test" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" } } @@ -883,7 +883,7 @@ resource "azurerm_web_application_firewall_policy" "test" { managed_rules { managed_rule_set { type = "OWASP" - version = "3.1" + version = "3.2" rule_group_override { disabled_rules = [