@robinmordasiewicz/f5xc-terraform-mcp 2.6.1 → 2.6.2

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (289) hide show
  1. package/dist/docs/data-sources/addon_subscription.md +85 -2
  2. package/dist/docs/data-sources/address_allocator.md +85 -2
  3. package/dist/docs/data-sources/advertise_policy.md +85 -2
  4. package/dist/docs/data-sources/alert_policy.md +85 -2
  5. package/dist/docs/data-sources/alert_receiver.md +85 -2
  6. package/dist/docs/data-sources/allowed_tenant.md +85 -2
  7. package/dist/docs/data-sources/api_crawler.md +85 -2
  8. package/dist/docs/data-sources/api_credential.md +85 -2
  9. package/dist/docs/data-sources/api_definition.md +85 -2
  10. package/dist/docs/data-sources/api_discovery.md +85 -2
  11. package/dist/docs/data-sources/api_testing.md +85 -2
  12. package/dist/docs/data-sources/apm.md +85 -2
  13. package/dist/docs/data-sources/app_api_group.md +85 -2
  14. package/dist/docs/data-sources/app_firewall.md +85 -2
  15. package/dist/docs/data-sources/app_setting.md +85 -2
  16. package/dist/docs/data-sources/app_type.md +85 -2
  17. package/dist/docs/data-sources/authentication.md +85 -2
  18. package/dist/docs/data-sources/aws_tgw_site.md +85 -2
  19. package/dist/docs/data-sources/aws_vpc_site.md +85 -2
  20. package/dist/docs/data-sources/azure_vnet_site.md +85 -2
  21. package/dist/docs/data-sources/bgp.md +85 -2
  22. package/dist/docs/data-sources/bgp_asn_set.md +85 -2
  23. package/dist/docs/data-sources/bgp_routing_policy.md +85 -2
  24. package/dist/docs/data-sources/bigip_irule.md +85 -2
  25. package/dist/docs/data-sources/bot_defense_app_infrastructure.md +85 -2
  26. package/dist/docs/data-sources/cdn_cache_rule.md +85 -2
  27. package/dist/docs/data-sources/cdn_loadbalancer.md +85 -2
  28. package/dist/docs/data-sources/certificate.md +85 -2
  29. package/dist/docs/data-sources/certificate_chain.md +85 -2
  30. package/dist/docs/data-sources/child_tenant.md +85 -2
  31. package/dist/docs/data-sources/child_tenant_manager.md +85 -2
  32. package/dist/docs/data-sources/cloud_connect.md +85 -2
  33. package/dist/docs/data-sources/cloud_credentials.md +85 -2
  34. package/dist/docs/data-sources/cloud_elastic_ip.md +85 -2
  35. package/dist/docs/data-sources/cloud_link.md +85 -2
  36. package/dist/docs/data-sources/cluster.md +85 -2
  37. package/dist/docs/data-sources/cminstance.md +85 -2
  38. package/dist/docs/data-sources/code_base_integration.md +85 -2
  39. package/dist/docs/data-sources/contact.md +85 -2
  40. package/dist/docs/data-sources/container_registry.md +85 -2
  41. package/dist/docs/data-sources/crl.md +85 -2
  42. package/dist/docs/data-sources/customer_support.md +85 -2
  43. package/dist/docs/data-sources/data_group.md +85 -2
  44. package/dist/docs/data-sources/data_type.md +85 -2
  45. package/dist/docs/data-sources/dc_cluster_group.md +85 -2
  46. package/dist/docs/data-sources/discovery.md +85 -2
  47. package/dist/docs/data-sources/dns_compliance_checks.md +85 -2
  48. package/dist/docs/data-sources/dns_domain.md +85 -2
  49. package/dist/docs/data-sources/dns_lb_health_check.md +85 -2
  50. package/dist/docs/data-sources/dns_lb_pool.md +85 -2
  51. package/dist/docs/data-sources/dns_load_balancer.md +85 -2
  52. package/dist/docs/data-sources/dns_zone.md +85 -2
  53. package/dist/docs/data-sources/endpoint.md +85 -2
  54. package/dist/docs/data-sources/enhanced_firewall_policy.md +85 -2
  55. package/dist/docs/data-sources/external_connector.md +85 -2
  56. package/dist/docs/data-sources/fast_acl.md +85 -2
  57. package/dist/docs/data-sources/fast_acl_rule.md +85 -2
  58. package/dist/docs/data-sources/filter_set.md +85 -2
  59. package/dist/docs/data-sources/fleet.md +85 -2
  60. package/dist/docs/data-sources/forward_proxy_policy.md +85 -2
  61. package/dist/docs/data-sources/forwarding_class.md +85 -2
  62. package/dist/docs/data-sources/gcp_vpc_site.md +85 -2
  63. package/dist/docs/data-sources/geo_location_set.md +85 -2
  64. package/dist/docs/data-sources/global_log_receiver.md +85 -2
  65. package/dist/docs/data-sources/healthcheck.md +85 -2
  66. package/dist/docs/data-sources/http_loadbalancer.md +85 -2
  67. package/dist/docs/data-sources/ike1.md +85 -2
  68. package/dist/docs/data-sources/ike2.md +85 -2
  69. package/dist/docs/data-sources/ike_phase1_profile.md +85 -2
  70. package/dist/docs/data-sources/ike_phase2_profile.md +85 -2
  71. package/dist/docs/data-sources/infraprotect_asn.md +85 -2
  72. package/dist/docs/data-sources/infraprotect_asn_prefix.md +85 -2
  73. package/dist/docs/data-sources/infraprotect_deny_list_rule.md +85 -2
  74. package/dist/docs/data-sources/infraprotect_firewall_rule.md +85 -2
  75. package/dist/docs/data-sources/infraprotect_firewall_rule_group.md +85 -2
  76. package/dist/docs/data-sources/infraprotect_internet_prefix_advertisement.md +85 -2
  77. package/dist/docs/data-sources/infraprotect_tunnel.md +85 -2
  78. package/dist/docs/data-sources/ip_prefix_set.md +85 -2
  79. package/dist/docs/data-sources/irule.md +85 -2
  80. package/dist/docs/data-sources/k8s_cluster.md +85 -2
  81. package/dist/docs/data-sources/k8s_cluster_role.md +85 -2
  82. package/dist/docs/data-sources/k8s_cluster_role_binding.md +85 -2
  83. package/dist/docs/data-sources/k8s_pod_security_admission.md +85 -2
  84. package/dist/docs/data-sources/k8s_pod_security_policy.md +85 -2
  85. package/dist/docs/data-sources/log_receiver.md +85 -2
  86. package/dist/docs/data-sources/malicious_user_mitigation.md +85 -2
  87. package/dist/docs/data-sources/managed_tenant.md +85 -2
  88. package/dist/docs/data-sources/namespace.md +85 -2
  89. package/dist/docs/data-sources/nat_policy.md +85 -2
  90. package/dist/docs/data-sources/network_connector.md +85 -2
  91. package/dist/docs/data-sources/network_firewall.md +85 -2
  92. package/dist/docs/data-sources/network_interface.md +85 -2
  93. package/dist/docs/data-sources/network_policy.md +85 -2
  94. package/dist/docs/data-sources/network_policy_rule.md +85 -2
  95. package/dist/docs/data-sources/network_policy_view.md +85 -2
  96. package/dist/docs/data-sources/nfv_service.md +85 -2
  97. package/dist/docs/data-sources/oidc_provider.md +85 -2
  98. package/dist/docs/data-sources/origin_pool.md +85 -2
  99. package/dist/docs/data-sources/policer.md +85 -2
  100. package/dist/docs/data-sources/policy_based_routing.md +85 -2
  101. package/dist/docs/data-sources/protocol_inspection.md +85 -2
  102. package/dist/docs/data-sources/protocol_policer.md +85 -2
  103. package/dist/docs/data-sources/proxy.md +85 -2
  104. package/dist/docs/data-sources/quota.md +85 -2
  105. package/dist/docs/data-sources/rate_limiter.md +85 -2
  106. package/dist/docs/data-sources/rate_limiter_policy.md +85 -2
  107. package/dist/docs/data-sources/registration.md +85 -2
  108. package/dist/docs/data-sources/report_config.md +85 -2
  109. package/dist/docs/data-sources/role.md +85 -2
  110. package/dist/docs/data-sources/route.md +85 -2
  111. package/dist/docs/data-sources/secret_management_access.md +85 -2
  112. package/dist/docs/data-sources/secret_policy.md +85 -2
  113. package/dist/docs/data-sources/secret_policy_rule.md +85 -2
  114. package/dist/docs/data-sources/securemesh_site.md +85 -2
  115. package/dist/docs/data-sources/securemesh_site_v2.md +85 -2
  116. package/dist/docs/data-sources/segment.md +85 -2
  117. package/dist/docs/data-sources/sensitive_data_policy.md +85 -2
  118. package/dist/docs/data-sources/service_policy.md +85 -2
  119. package/dist/docs/data-sources/service_policy_rule.md +85 -2
  120. package/dist/docs/data-sources/site_mesh_group.md +85 -2
  121. package/dist/docs/data-sources/srv6_network_slice.md +85 -2
  122. package/dist/docs/data-sources/subnet.md +85 -2
  123. package/dist/docs/data-sources/tcp_loadbalancer.md +85 -2
  124. package/dist/docs/data-sources/tenant_configuration.md +85 -2
  125. package/dist/docs/data-sources/tenant_profile.md +85 -2
  126. package/dist/docs/data-sources/ticket_tracking_system.md +85 -2
  127. package/dist/docs/data-sources/token.md +85 -2
  128. package/dist/docs/data-sources/tpm_api_key.md +85 -2
  129. package/dist/docs/data-sources/tpm_category.md +85 -2
  130. package/dist/docs/data-sources/tpm_manager.md +85 -2
  131. package/dist/docs/data-sources/trusted_ca_list.md +85 -2
  132. package/dist/docs/data-sources/tunnel.md +85 -2
  133. package/dist/docs/data-sources/udp_loadbalancer.md +85 -2
  134. package/dist/docs/data-sources/usb_policy.md +85 -2
  135. package/dist/docs/data-sources/user_identification.md +85 -2
  136. package/dist/docs/data-sources/virtual_host.md +85 -2
  137. package/dist/docs/data-sources/virtual_k8s.md +85 -2
  138. package/dist/docs/data-sources/virtual_network.md +85 -2
  139. package/dist/docs/data-sources/virtual_site.md +85 -2
  140. package/dist/docs/data-sources/voltshare_admin_policy.md +85 -2
  141. package/dist/docs/data-sources/voltstack_site.md +85 -2
  142. package/dist/docs/data-sources/waf_exclusion_policy.md +85 -2
  143. package/dist/docs/data-sources/workload.md +85 -2
  144. package/dist/docs/data-sources/workload_flavor.md +85 -2
  145. package/dist/docs/resources/addon_subscription.md +87 -10
  146. package/dist/docs/resources/address_allocator.md +86 -3
  147. package/dist/docs/resources/advertise_policy.md +112 -57
  148. package/dist/docs/resources/alert_policy.md +91 -8
  149. package/dist/docs/resources/alert_receiver.md +94 -55
  150. package/dist/docs/resources/allowed_tenant.md +87 -10
  151. package/dist/docs/resources/api_crawler.md +86 -3
  152. package/dist/docs/resources/api_credential.md +88 -5
  153. package/dist/docs/resources/api_definition.md +89 -6
  154. package/dist/docs/resources/api_discovery.md +86 -3
  155. package/dist/docs/resources/api_testing.md +95 -52
  156. package/dist/docs/resources/apm.md +156 -519
  157. package/dist/docs/resources/app_api_group.md +90 -25
  158. package/dist/docs/resources/app_firewall.md +87 -6
  159. package/dist/docs/resources/app_setting.md +97 -66
  160. package/dist/docs/resources/app_type.md +86 -3
  161. package/dist/docs/resources/authentication.md +90 -27
  162. package/dist/docs/resources/aws_tgw_site.md +125 -222
  163. package/dist/docs/resources/aws_vpc_site.md +149 -352
  164. package/dist/docs/resources/azure_vnet_site.md +233 -860
  165. package/dist/docs/resources/bgp.md +103 -32
  166. package/dist/docs/resources/bgp_asn_set.md +86 -3
  167. package/dist/docs/resources/bgp_routing_policy.md +86 -3
  168. package/dist/docs/resources/bigip_irule.md +86 -3
  169. package/dist/docs/resources/bot_defense_app_infrastructure.md +86 -3
  170. package/dist/docs/resources/cdn_cache_rule.md +97 -120
  171. package/dist/docs/resources/cdn_loadbalancer.md +325 -1620
  172. package/dist/docs/resources/certificate.md +87 -10
  173. package/dist/docs/resources/certificate_chain.md +86 -3
  174. package/dist/docs/resources/child_tenant.md +88 -17
  175. package/dist/docs/resources/child_tenant_manager.md +88 -17
  176. package/dist/docs/resources/cloud_connect.md +98 -63
  177. package/dist/docs/resources/cloud_credentials.md +92 -39
  178. package/dist/docs/resources/cloud_elastic_ip.md +91 -8
  179. package/dist/docs/resources/cloud_link.md +90 -29
  180. package/dist/docs/resources/cluster.md +109 -66
  181. package/dist/docs/resources/cminstance.md +86 -3
  182. package/dist/docs/resources/code_base_integration.md +100 -87
  183. package/dist/docs/resources/contact.md +86 -3
  184. package/dist/docs/resources/container_registry.md +86 -3
  185. package/dist/docs/resources/crl.md +86 -3
  186. package/dist/docs/resources/customer_support.md +91 -8
  187. package/dist/docs/resources/data_group.md +86 -3
  188. package/dist/docs/resources/data_type.md +88 -9
  189. package/dist/docs/resources/dc_cluster_group.md +86 -3
  190. package/dist/docs/resources/discovery.md +115 -104
  191. package/dist/docs/resources/dns_compliance_checks.md +86 -3
  192. package/dist/docs/resources/dns_domain.md +86 -3
  193. package/dist/docs/resources/dns_lb_health_check.md +86 -3
  194. package/dist/docs/resources/dns_lb_pool.md +87 -10
  195. package/dist/docs/resources/dns_load_balancer.md +95 -40
  196. package/dist/docs/resources/dns_zone.md +111 -926
  197. package/dist/docs/resources/endpoint.md +101 -18
  198. package/dist/docs/resources/enhanced_firewall_policy.md +89 -32
  199. package/dist/docs/resources/external_connector.md +94 -29
  200. package/dist/docs/resources/fast_acl.md +100 -101
  201. package/dist/docs/resources/fast_acl_rule.md +101 -18
  202. package/dist/docs/resources/filter_set.md +86 -3
  203. package/dist/docs/resources/fleet.md +170 -541
  204. package/dist/docs/resources/forward_proxy_policy.md +90 -31
  205. package/dist/docs/resources/forwarding_class.md +87 -10
  206. package/dist/docs/resources/gcp_vpc_site.md +141 -328
  207. package/dist/docs/resources/geo_location_set.md +86 -3
  208. package/dist/docs/resources/global_log_receiver.md +116 -181
  209. package/dist/docs/resources/healthcheck.md +86 -3
  210. package/dist/docs/resources/http_loadbalancer.md +523 -2778
  211. package/dist/docs/resources/ike1.md +86 -3
  212. package/dist/docs/resources/ike2.md +86 -3
  213. package/dist/docs/resources/ike_phase1_profile.md +86 -3
  214. package/dist/docs/resources/ike_phase2_profile.md +86 -3
  215. package/dist/docs/resources/infraprotect_asn.md +86 -3
  216. package/dist/docs/resources/infraprotect_asn_prefix.md +87 -10
  217. package/dist/docs/resources/infraprotect_deny_list_rule.md +86 -3
  218. package/dist/docs/resources/infraprotect_firewall_rule.md +86 -3
  219. package/dist/docs/resources/infraprotect_firewall_rule_group.md +86 -3
  220. package/dist/docs/resources/infraprotect_internet_prefix_advertisement.md +86 -3
  221. package/dist/docs/resources/infraprotect_tunnel.md +90 -29
  222. package/dist/docs/resources/ip_prefix_set.md +86 -3
  223. package/dist/docs/resources/irule.md +86 -3
  224. package/dist/docs/resources/k8s_cluster.md +93 -58
  225. package/dist/docs/resources/k8s_cluster_role.md +87 -8
  226. package/dist/docs/resources/k8s_cluster_role_binding.md +87 -10
  227. package/dist/docs/resources/k8s_pod_security_admission.md +86 -3
  228. package/dist/docs/resources/k8s_pod_security_policy.md +87 -8
  229. package/dist/docs/resources/log_receiver.md +88 -15
  230. package/dist/docs/resources/malicious_user_mitigation.md +86 -3
  231. package/dist/docs/resources/managed_tenant.md +89 -12
  232. package/dist/docs/resources/namespace.md +86 -3
  233. package/dist/docs/resources/nat_policy.md +126 -43
  234. package/dist/docs/resources/network_connector.md +94 -51
  235. package/dist/docs/resources/network_firewall.md +90 -31
  236. package/dist/docs/resources/network_interface.md +93 -46
  237. package/dist/docs/resources/network_policy.md +96 -13
  238. package/dist/docs/resources/network_policy_rule.md +91 -8
  239. package/dist/docs/resources/network_policy_view.md +96 -13
  240. package/dist/docs/resources/nfv_service.md +153 -446
  241. package/dist/docs/resources/oidc_provider.md +86 -3
  242. package/dist/docs/resources/origin_pool.md +108 -145
  243. package/dist/docs/resources/policer.md +86 -3
  244. package/dist/docs/resources/policy_based_routing.md +100 -89
  245. package/dist/docs/resources/protocol_inspection.md +87 -10
  246. package/dist/docs/resources/protocol_policer.md +91 -8
  247. package/dist/docs/resources/proxy.md +154 -571
  248. package/dist/docs/resources/quota.md +86 -3
  249. package/dist/docs/resources/rate_limiter.md +91 -8
  250. package/dist/docs/resources/rate_limiter_policy.md +100 -23
  251. package/dist/docs/resources/registration.md +86 -3
  252. package/dist/docs/resources/report_config.md +87 -10
  253. package/dist/docs/resources/role.md +86 -3
  254. package/dist/docs/resources/route.md +113 -82
  255. package/dist/docs/resources/secret_management_access.md +127 -156
  256. package/dist/docs/resources/secret_policy.md +87 -4
  257. package/dist/docs/resources/secret_policy_rule.md +86 -3
  258. package/dist/docs/resources/securemesh_site.md +137 -380
  259. package/dist/docs/resources/securemesh_site_v2.md +289 -1204
  260. package/dist/docs/resources/segment.md +86 -3
  261. package/dist/docs/resources/sensitive_data_policy.md +87 -10
  262. package/dist/docs/resources/service_policy.md +115 -122
  263. package/dist/docs/resources/service_policy_rule.md +110 -59
  264. package/dist/docs/resources/site_mesh_group.md +92 -15
  265. package/dist/docs/resources/srv6_network_slice.md +86 -3
  266. package/dist/docs/resources/subnet.md +89 -20
  267. package/dist/docs/resources/tcp_loadbalancer.md +114 -185
  268. package/dist/docs/resources/tenant_configuration.md +86 -3
  269. package/dist/docs/resources/tenant_profile.md +87 -10
  270. package/dist/docs/resources/ticket_tracking_system.md +86 -3
  271. package/dist/docs/resources/token.md +86 -3
  272. package/dist/docs/resources/tpm_api_key.md +91 -8
  273. package/dist/docs/resources/tpm_category.md +91 -8
  274. package/dist/docs/resources/tpm_manager.md +86 -3
  275. package/dist/docs/resources/trusted_ca_list.md +86 -3
  276. package/dist/docs/resources/tunnel.md +91 -8
  277. package/dist/docs/resources/udp_loadbalancer.md +97 -80
  278. package/dist/docs/resources/usb_policy.md +86 -3
  279. package/dist/docs/resources/user_identification.md +86 -3
  280. package/dist/docs/resources/virtual_host.md +152 -177
  281. package/dist/docs/resources/virtual_k8s.md +92 -15
  282. package/dist/docs/resources/virtual_network.md +91 -8
  283. package/dist/docs/resources/virtual_site.md +86 -3
  284. package/dist/docs/resources/voltshare_admin_policy.md +86 -11
  285. package/dist/docs/resources/voltstack_site.md +380 -1365
  286. package/dist/docs/resources/waf_exclusion_policy.md +91 -28
  287. package/dist/docs/resources/workload.md +1189 -4148
  288. package/dist/docs/resources/workload_flavor.md +86 -3
  289. package/package.json +1 -1
@@ -2,12 +2,12 @@
2
2
  page_title: "f5xc_service_policy Resource - terraform-provider-f5xc"
3
3
  subcategory: "Security"
4
4
  description: |-
5
- [Category: Security] [Namespace: required] [DependsOn: namespace] Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
5
+ Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
6
6
  ---
7
7
 
8
8
  # f5xc_service_policy (Resource)
9
9
 
10
- [Category: Security] [Namespace: required] [DependsOn: namespace] Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
10
+ Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
11
11
 
12
12
  ~> **Note** Please refer to [Service Policy API docs](https://docs.cloud.f5.com/docs-v2/api/service-policy) to learn more.
13
13
 
@@ -15,7 +15,7 @@ description: |-
15
15
 
16
16
  ```terraform
17
17
  # Service Policy Resource Example
18
- # [Category: Security] [Namespace: required] [DependsOn: namespace] Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
18
+ # Manages service_policy creates a new object in the storage backend for metadata.namespace. in F5 Distributed Cloud.
19
19
 
20
20
  # Basic Service Policy configuration
21
21
  resource "f5xc_service_policy" "example" {
@@ -111,7 +111,7 @@ An [`allow_list`](#allow-list) block supports the following:
111
111
 
112
112
  <a id="allow-list-prefix-list"></a>&#x2022; [`prefix_list`](#allow-list-prefix-list) - Optional Block<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#allow-list-prefix-list) below.
113
113
 
114
- <a id="allow-list-tls-fingerprint-classes"></a>&#x2022; [`tls_fingerprint_classes`](#allow-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>Possible values are `TLS_FINGERPRINT_NONE`, `ANY_MALICIOUS_FINGERPRINT`, `ADWARE`, `ADWIND`, `DRIDEX`, `GOOTKIT`, `GOZI`, `JBIFROST`, `QUAKBOT`, `RANSOMWARE`, `TROLDESH`, `TOFSEE`, `TORRENTLOCKER`, `TRICKBOT`<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS Fingerprint Classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
114
+ <a id="allow-list-tls-fingerprint-classes"></a>&#x2022; [`tls_fingerprint_classes`](#allow-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>See [TLS Fingerprints](#common-tls-fingerprints)<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS Fingerprint Classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
115
115
 
116
116
  <a id="allow-list-tls-fingerprint-values"></a>&#x2022; [`tls_fingerprint_values`](#allow-list-tls-fingerprint-values) - Optional List<br>TLS Fingerprint Values. A list of exact TLS JA3 fingerprints to match the input TLS JA3 fingerprint against
117
117
 
@@ -123,23 +123,11 @@ An [`asn_list`](#allow-list-asn-list) block (within [`allow_list`](#allow-list))
123
123
 
124
124
  #### Allow List Asn Set
125
125
 
126
- An [`asn_set`](#allow-list-asn-set) block (within [`allow_list`](#allow-list)) supports the following:
127
-
128
- <a id="allow-list-asn-set-name"></a>&#x2022; [`name`](#allow-list-asn-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
129
-
130
- <a id="allow-list-asn-set-namespace"></a>&#x2022; [`namespace`](#allow-list-asn-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
131
-
132
- <a id="allow-list-asn-set-tenant"></a>&#x2022; [`tenant`](#allow-list-asn-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
126
+ <a id="objref-a23f21"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
133
127
 
134
128
  #### Allow List IP Prefix Set
135
129
 
136
- An [`ip_prefix_set`](#allow-list-ip-prefix-set) block (within [`allow_list`](#allow-list)) supports the following:
137
-
138
- <a id="allow-list-ip-prefix-set-name"></a>&#x2022; [`name`](#allow-list-ip-prefix-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
139
-
140
- <a id="allow-list-ip-prefix-set-namespace"></a>&#x2022; [`namespace`](#allow-list-ip-prefix-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
141
-
142
- <a id="allow-list-ip-prefix-set-tenant"></a>&#x2022; [`tenant`](#allow-list-ip-prefix-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
130
+ <a id="objref-c28920"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
143
131
 
144
132
  #### Allow List Prefix List
145
133
 
@@ -167,7 +155,7 @@ A [`deny_list`](#deny-list) block supports the following:
167
155
 
168
156
  <a id="deny-list-prefix-list"></a>&#x2022; [`prefix_list`](#deny-list-prefix-list) - Optional Block<br>IPv4 Prefix List. List of IPv4 prefixes that represent an endpoint<br>See [Prefix List](#deny-list-prefix-list) below.
169
157
 
170
- <a id="deny-list-tls-fingerprint-classes"></a>&#x2022; [`tls_fingerprint_classes`](#deny-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>Possible values are `TLS_FINGERPRINT_NONE`, `ANY_MALICIOUS_FINGERPRINT`, `ADWARE`, `ADWIND`, `DRIDEX`, `GOOTKIT`, `GOZI`, `JBIFROST`, `QUAKBOT`, `RANSOMWARE`, `TROLDESH`, `TOFSEE`, `TORRENTLOCKER`, `TRICKBOT`<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS Fingerprint Classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
158
+ <a id="deny-list-tls-fingerprint-classes"></a>&#x2022; [`tls_fingerprint_classes`](#deny-list-tls-fingerprint-classes) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>See [TLS Fingerprints](#common-tls-fingerprints)<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS Fingerprint Classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
171
159
 
172
160
  <a id="deny-list-tls-fingerprint-values"></a>&#x2022; [`tls_fingerprint_values`](#deny-list-tls-fingerprint-values) - Optional List<br>TLS Fingerprint Values. A list of exact TLS JA3 fingerprints to match the input TLS JA3 fingerprint against
173
161
 
@@ -179,23 +167,11 @@ An [`asn_list`](#deny-list-asn-list) block (within [`deny_list`](#deny-list)) su
179
167
 
180
168
  #### Deny List Asn Set
181
169
 
182
- An [`asn_set`](#deny-list-asn-set) block (within [`deny_list`](#deny-list)) supports the following:
183
-
184
- <a id="deny-list-asn-set-name"></a>&#x2022; [`name`](#deny-list-asn-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
185
-
186
- <a id="deny-list-asn-set-namespace"></a>&#x2022; [`namespace`](#deny-list-asn-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
187
-
188
- <a id="deny-list-asn-set-tenant"></a>&#x2022; [`tenant`](#deny-list-asn-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
170
+ <a id="objref-39491c"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
189
171
 
190
172
  #### Deny List IP Prefix Set
191
173
 
192
- An [`ip_prefix_set`](#deny-list-ip-prefix-set) block (within [`deny_list`](#deny-list)) supports the following:
193
-
194
- <a id="deny-list-ip-prefix-set-name"></a>&#x2022; [`name`](#deny-list-ip-prefix-set-name) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
195
-
196
- <a id="deny-list-ip-prefix-set-namespace"></a>&#x2022; [`namespace`](#deny-list-ip-prefix-set-namespace) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
197
-
198
- <a id="deny-list-ip-prefix-set-tenant"></a>&#x2022; [`tenant`](#deny-list-ip-prefix-set-tenant) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
174
+ <a id="objref-9600e1"></a>Uses standard [Object Reference](#common-object-reference) fields (name, namespace, tenant).
199
175
 
200
176
  #### Deny List Prefix List
201
177
 
@@ -325,7 +301,7 @@ An [`item`](#rule-list-rules-spec-arg-matchers-item) block (within [`rule_list.r
325
301
 
326
302
  <a id="values-8f2f21"></a>&#x2022; [`regex_values`](#values-8f2f21) - Optional List<br>Regex Values. A list of regular expressions to match the input against
327
303
 
328
- <a id="transformers-0078cd"></a>&#x2022; [`transformers`](#transformers-0078cd) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
304
+ <a id="transformers-0078cd"></a>&#x2022; [`transformers`](#transformers-0078cd) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
329
305
 
330
306
  #### Rule List Rules Spec Asn List
331
307
 
@@ -341,17 +317,7 @@ An [`asn_matcher`](#rule-list-rules-spec-asn-matcher) block (within [`rule_list.
341
317
 
342
318
  #### Rule List Rules Spec Asn Matcher Asn Sets
343
319
 
344
- An [`asn_sets`](#sets-0b3475) block (within [`rule_list.rules.spec.asn_matcher`](#rule-list-rules-spec-asn-matcher)) supports the following:
345
-
346
- <a id="kind-5eb208"></a>&#x2022; [`kind`](#kind-5eb208) - Optional String<br>Kind. When a configuration object(e.g. virtual_host) refers to another(e.g route) then kind will hold the referred object's kind (e.g. 'route')
347
-
348
- <a id="name-15beb2"></a>&#x2022; [`name`](#name-15beb2) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
349
-
350
- <a id="namespace-92a7ae"></a>&#x2022; [`namespace`](#namespace-92a7ae) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
351
-
352
- <a id="tenant-98502e"></a>&#x2022; [`tenant`](#tenant-98502e) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
353
-
354
- <a id="uid-648ca9"></a>&#x2022; [`uid`](#uid-648ca9) - Optional String<br>UID. When a configuration object(e.g. virtual_host) refers to another(e.g route) then uid will hold the referred object's(e.g. route's) uid
320
+ <a id="deep-8752e9"></a>Deeply nested **Sets** block collapsed for readability.
355
321
 
356
322
  #### Rule List Rules Spec Body Matcher
357
323
 
@@ -361,7 +327,7 @@ A [`body_matcher`](#rule-list-rules-spec-body-matcher) block (within [`rule_list
361
327
 
362
328
  <a id="values-156f80"></a>&#x2022; [`regex_values`](#values-156f80) - Optional List<br>Regex Values. A list of regular expressions to match the input against
363
329
 
364
- <a id="transformers-8d4f75"></a>&#x2022; [`transformers`](#transformers-8d4f75) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
330
+ <a id="transformers-8d4f75"></a>&#x2022; [`transformers`](#transformers-8d4f75) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
365
331
 
366
332
  #### Rule List Rules Spec Bot Action
367
333
 
@@ -379,7 +345,7 @@ A [`client_name_matcher`](#matcher-ded25d) block (within [`rule_list.rules.spec`
379
345
 
380
346
  <a id="values-4b3791"></a>&#x2022; [`regex_values`](#values-4b3791) - Optional List<br>Regex Values. A list of regular expressions to match the input against
381
347
 
382
- <a id="transformers-fd5b88"></a>&#x2022; [`transformers`](#transformers-fd5b88) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
348
+ <a id="transformers-fd5b88"></a>&#x2022; [`transformers`](#transformers-fd5b88) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
383
349
 
384
350
  #### Rule List Rules Spec Client Selector
385
351
 
@@ -409,7 +375,7 @@ An [`item`](#item-ab8ab4) block (within [`rule_list.rules.spec.cookie_matchers`]
409
375
 
410
376
  <a id="values-8e4fe5"></a>&#x2022; [`regex_values`](#values-8e4fe5) - Optional List<br>Regex Values. A list of regular expressions to match the input against
411
377
 
412
- <a id="transformers-c061db"></a>&#x2022; [`transformers`](#transformers-c061db) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
378
+ <a id="transformers-c061db"></a>&#x2022; [`transformers`](#transformers-c061db) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
413
379
 
414
380
  #### Rule List Rules Spec Domain Matcher
415
381
 
@@ -419,7 +385,7 @@ A [`domain_matcher`](#rule-list-rules-spec-domain-matcher) block (within [`rule_
419
385
 
420
386
  <a id="values-e318f7"></a>&#x2022; [`regex_values`](#values-e318f7) - Optional List<br>Regex Values. A list of regular expressions to match the input against
421
387
 
422
- <a id="transformers-f69aff"></a>&#x2022; [`transformers`](#transformers-f69aff) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
388
+ <a id="transformers-f69aff"></a>&#x2022; [`transformers`](#transformers-f69aff) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
423
389
 
424
390
  #### Rule List Rules Spec Headers
425
391
 
@@ -443,7 +409,7 @@ An [`item`](#rule-list-rules-spec-headers-item) block (within [`rule_list.rules.
443
409
 
444
410
  <a id="values-0db8b4"></a>&#x2022; [`regex_values`](#values-0db8b4) - Optional List<br>Regex Values. A list of regular expressions to match the input against
445
411
 
446
- <a id="transformers-a3008a"></a>&#x2022; [`transformers`](#transformers-a3008a) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
412
+ <a id="transformers-a3008a"></a>&#x2022; [`transformers`](#transformers-a3008a) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
447
413
 
448
414
  #### Rule List Rules Spec HTTP Method
449
415
 
@@ -451,7 +417,7 @@ A [`http_method`](#rule-list-rules-spec-http-method) block (within [`rule_list.r
451
417
 
452
418
  <a id="matcher-ea16cd"></a>&#x2022; [`invert_matcher`](#matcher-ea16cd) - Optional Bool<br>Invert Method Matcher. Invert the match result
453
419
 
454
- <a id="methods-7419c4"></a>&#x2022; [`methods`](#methods-7419c4) - Optional List Defaults to `ANY`<br>Possible values are `ANY`, `GET`, `HEAD`, `POST`, `PUT`, `DELETE`, `CONNECT`, `OPTIONS`, `TRACE`, `PATCH`, `COPY`<br>[Enum: ANY|GET|HEAD|POST|PUT|DELETE|CONNECT|OPTIONS|TRACE|PATCH|COPY] Method List. List of methods values to match against
420
+ <a id="methods-7419c4"></a>&#x2022; [`methods`](#methods-7419c4) - Optional List Defaults to `ANY`<br>See [HTTP Methods](#common-http-methods)<br> Method List. List of methods values to match against
455
421
 
456
422
  #### Rule List Rules Spec IP Matcher
457
423
 
@@ -463,17 +429,7 @@ An [`ip_matcher`](#rule-list-rules-spec-ip-matcher) block (within [`rule_list.ru
463
429
 
464
430
  #### Rule List Rules Spec IP Matcher Prefix Sets
465
431
 
466
- A [`prefix_sets`](#sets-e4318a) block (within [`rule_list.rules.spec.ip_matcher`](#rule-list-rules-spec-ip-matcher)) supports the following:
467
-
468
- <a id="kind-2cf0f9"></a>&#x2022; [`kind`](#kind-2cf0f9) - Optional String<br>Kind. When a configuration object(e.g. virtual_host) refers to another(e.g route) then kind will hold the referred object's kind (e.g. 'route')
469
-
470
- <a id="name-5f1c1f"></a>&#x2022; [`name`](#name-5f1c1f) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
471
-
472
- <a id="namespace-ff5432"></a>&#x2022; [`namespace`](#namespace-ff5432) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
473
-
474
- <a id="tenant-362f28"></a>&#x2022; [`tenant`](#tenant-362f28) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
475
-
476
- <a id="uid-38c7d3"></a>&#x2022; [`uid`](#uid-38c7d3) - Optional String<br>UID. When a configuration object(e.g. virtual_host) refers to another(e.g route) then uid will hold the referred object's(e.g. route's) uid
432
+ <a id="deep-916df9"></a>Deeply nested **Sets** block collapsed for readability.
477
433
 
478
434
  #### Rule List Rules Spec IP Prefix List
479
435
 
@@ -485,9 +441,7 @@ An [`ip_prefix_list`](#rule-list-rules-spec-ip-prefix-list) block (within [`rule
485
441
 
486
442
  #### Rule List Rules Spec IP Threat Category List
487
443
 
488
- An [`ip_threat_category_list`](#list-f2b1f3) block (within [`rule_list.rules.spec`](#rule-list-rules-spec)) supports the following:
489
-
490
- <a id="categories-ff2d46"></a>&#x2022; [`ip_threat_categories`](#categories-ff2d46) - Optional List Defaults to `SPAM_SOURCES`<br>Possible values are `SPAM_SOURCES`, `WINDOWS_EXPLOITS`, `WEB_ATTACKS`, `BOTNETS`, `SCANNERS`, `REPUTATION`, `PHISHING`, `PROXY`, `MOBILE_THREATS`, `TOR_PROXY`, `DENIAL_OF_SERVICE`, `NETWORK`<br>[Enum: SPAM_SOURCES|WINDOWS_EXPLOITS|WEB_ATTACKS|BOTNETS|SCANNERS|REPUTATION|PHISHING|PROXY|MOBILE_THREATS|TOR_PROXY|DENIAL_OF_SERVICE|NETWORK] List of IP Threat Categories to choose. The IP threat categories is obtained from the list and is used to auto-generate equivalent label selection expressions
444
+ <a id="deep-990965"></a>Deeply nested **List** block collapsed for readability.
491
445
 
492
446
  #### Rule List Rules Spec Ja4 TLS Fingerprint
493
447
 
@@ -517,7 +471,7 @@ An [`item`](#rule-list-rules-spec-jwt-claims-item) block (within [`rule_list.rul
517
471
 
518
472
  <a id="values-abf135"></a>&#x2022; [`regex_values`](#values-abf135) - Optional List<br>Regex Values. A list of regular expressions to match the input against
519
473
 
520
- <a id="transformers-365d8a"></a>&#x2022; [`transformers`](#transformers-365d8a) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
474
+ <a id="transformers-365d8a"></a>&#x2022; [`transformers`](#transformers-365d8a) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
521
475
 
522
476
  #### Rule List Rules Spec Label Matcher
523
477
 
@@ -547,7 +501,7 @@ A [`path`](#rule-list-rules-spec-path) block (within [`rule_list.rules.spec`](#r
547
501
 
548
502
  <a id="rule-list-rules-spec-path-suffix-values"></a>&#x2022; [`suffix_values`](#rule-list-rules-spec-path-suffix-values) - Optional List<br>Suffix Values. A list of path suffix values to match the input HTTP path against
549
503
 
550
- <a id="rule-list-rules-spec-path-transformers"></a>&#x2022; [`transformers`](#rule-list-rules-spec-path-transformers) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
504
+ <a id="rule-list-rules-spec-path-transformers"></a>&#x2022; [`transformers`](#rule-list-rules-spec-path-transformers) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
551
505
 
552
506
  #### Rule List Rules Spec Port Matcher
553
507
 
@@ -579,7 +533,7 @@ An [`item`](#rule-list-rules-spec-query-params-item) block (within [`rule_list.r
579
533
 
580
534
  <a id="values-b50c1e"></a>&#x2022; [`regex_values`](#values-b50c1e) - Optional List<br>Regex Values. A list of regular expressions to match the input against
581
535
 
582
- <a id="transformers-499060"></a>&#x2022; [`transformers`](#transformers-499060) - Optional List Defaults to `TRANSFORMER_NONE`<br>Possible values are `LOWER_CASE`, `UPPER_CASE`, `BASE64_DECODE`, `NORMALIZE_PATH`, `REMOVE_WHITESPACE`, `URL_DECODE`, `TRIM_LEFT`, `TRIM_RIGHT`, `TRIM`<br>[Enum: LOWER_CASE|UPPER_CASE|BASE64_DECODE|NORMALIZE_PATH|REMOVE_WHITESPACE|URL_DECODE|TRIM_LEFT|TRIM_RIGHT|TRIM] Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
536
+ <a id="transformers-499060"></a>&#x2022; [`transformers`](#transformers-499060) - Optional List Defaults to `TRANSFORMER_NONE`<br>See [Transformers](#common-transformers)<br> Transformers. An ordered list of transformers (starting from index 0) to be applied to the path before matching
583
537
 
584
538
  #### Rule List Rules Spec Request Constraints
585
539
 
@@ -653,41 +607,25 @@ A [`segment_policy`](#rule-list-rules-spec-segment-policy) block (within [`rule_
653
607
 
654
608
  #### Rule List Rules Spec Segment Policy Dst Segments
655
609
 
656
- A [`dst_segments`](#segments-478f34) block (within [`rule_list.rules.spec.segment_policy`](#rule-list-rules-spec-segment-policy)) supports the following:
657
-
658
- <a id="segments-c03bbe"></a>&#x2022; [`segments`](#segments-c03bbe) - Optional Block<br>Segments. Select list of segments<br>See [Segments](#segments-c03bbe) below.
610
+ <a id="deep-8c7969"></a>Deeply nested **Segments** block collapsed for readability.
659
611
 
660
612
  #### Rule List Rules Spec Segment Policy Dst Segments Segments
661
613
 
662
- A [`segments`](#segments-c03bbe) block (within [`rule_list.rules.spec.segment_policy.dst_segments`](#segments-478f34)) supports the following:
663
-
664
- <a id="name-218ae8"></a>&#x2022; [`name`](#name-218ae8) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
665
-
666
- <a id="namespace-42b54f"></a>&#x2022; [`namespace`](#namespace-42b54f) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
667
-
668
- <a id="tenant-9e07d0"></a>&#x2022; [`tenant`](#tenant-9e07d0) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
614
+ <a id="deep-8de087"></a>Deeply nested **Segments** block collapsed for readability.
669
615
 
670
616
  #### Rule List Rules Spec Segment Policy Src Segments
671
617
 
672
- A [`src_segments`](#segments-191ada) block (within [`rule_list.rules.spec.segment_policy`](#rule-list-rules-spec-segment-policy)) supports the following:
673
-
674
- <a id="segments-7a67c9"></a>&#x2022; [`segments`](#segments-7a67c9) - Optional Block<br>Segments. Select list of segments<br>See [Segments](#segments-7a67c9) below.
618
+ <a id="deep-0d1630"></a>Deeply nested **Segments** block collapsed for readability.
675
619
 
676
620
  #### Rule List Rules Spec Segment Policy Src Segments Segments
677
621
 
678
- A [`segments`](#segments-7a67c9) block (within [`rule_list.rules.spec.segment_policy.src_segments`](#segments-191ada)) supports the following:
679
-
680
- <a id="name-bb44ac"></a>&#x2022; [`name`](#name-bb44ac) - Optional String<br>Name. When a configuration object(e.g. virtual_host) refers to another(e.g route) then name will hold the referred object's(e.g. route's) name
681
-
682
- <a id="namespace-e269e8"></a>&#x2022; [`namespace`](#namespace-e269e8) - Optional String<br>Namespace. When a configuration object(e.g. virtual_host) refers to another(e.g route) then namespace will hold the referred object's(e.g. route's) namespace
683
-
684
- <a id="tenant-29af01"></a>&#x2022; [`tenant`](#tenant-29af01) - Optional String<br>Tenant. When a configuration object(e.g. virtual_host) refers to another(e.g route) then tenant will hold the referred object's(e.g. route's) tenant
622
+ <a id="deep-935983"></a>Deeply nested **Segments** block collapsed for readability.
685
623
 
686
624
  #### Rule List Rules Spec TLS Fingerprint Matcher
687
625
 
688
626
  A [`tls_fingerprint_matcher`](#matcher-95ee34) block (within [`rule_list.rules.spec`](#rule-list-rules-spec)) supports the following:
689
627
 
690
- <a id="classes-8d3695"></a>&#x2022; [`classes`](#classes-8d3695) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>Possible values are `TLS_FINGERPRINT_NONE`, `ANY_MALICIOUS_FINGERPRINT`, `ADWARE`, `ADWIND`, `DRIDEX`, `GOOTKIT`, `GOZI`, `JBIFROST`, `QUAKBOT`, `RANSOMWARE`, `TROLDESH`, `TOFSEE`, `TORRENTLOCKER`, `TRICKBOT`<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS fingerprint classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
628
+ <a id="classes-8d3695"></a>&#x2022; [`classes`](#classes-8d3695) - Optional List Defaults to `TLS_FINGERPRINT_NONE`<br>See [TLS Fingerprints](#common-tls-fingerprints)<br>[Enum: TLS_FINGERPRINT_NONE|ANY_MALICIOUS_FINGERPRINT|ADWARE|ADWIND|DRIDEX|GOOTKIT|GOZI|JBIFROST|QUAKBOT|RANSOMWARE|TROLDESH|TOFSEE|TORRENTLOCKER|TRICKBOT] TLS fingerprint classes. A list of known classes of TLS fingerprints to match the input TLS JA3 fingerprint against
691
629
 
692
630
  <a id="values-e523b3"></a>&#x2022; [`exact_values`](#values-e523b3) - Optional List<br>Exact Values. A list of exact TLS JA3 fingerprints to match the input TLS JA3 fingerprint against
693
631
 
@@ -713,51 +651,23 @@ A [`waf_action`](#rule-list-rules-spec-waf-action) block (within [`rule_list.rul
713
651
 
714
652
  #### Rule List Rules Spec WAF Action App Firewall Detection Control
715
653
 
716
- An [`app_firewall_detection_control`](#control-4fbf89) block (within [`rule_list.rules.spec.waf_action`](#rule-list-rules-spec-waf-action)) supports the following:
717
-
718
- <a id="contexts-37ecbb"></a>&#x2022; [`exclude_attack_type_contexts`](#contexts-37ecbb) - Optional Block<br>Attack Types. Attack Types to be excluded for the defined match criteria<br>See [Exclude Attack Type Contexts](#contexts-37ecbb) below.
719
-
720
- <a id="contexts-e1b02b"></a>&#x2022; [`exclude_bot_name_contexts`](#contexts-e1b02b) - Optional Block<br>Bot Names. Bot Names to be excluded for the defined match criteria<br>See [Exclude Bot Name Contexts](#contexts-e1b02b) below.
721
-
722
- <a id="contexts-2da85d"></a>&#x2022; [`exclude_signature_contexts`](#contexts-2da85d) - Optional Block<br>Signature IDs. Signature IDs to be excluded for the defined match criteria<br>See [Exclude Signature Contexts](#contexts-2da85d) below.
723
-
724
- <a id="contexts-716dd3"></a>&#x2022; [`exclude_violation_contexts`](#contexts-716dd3) - Optional Block<br>Violations. Violations to be excluded for the defined match criteria<br>See [Exclude Violation Contexts](#contexts-716dd3) below.
654
+ <a id="deep-3d8491"></a>Deeply nested **Control** block collapsed for readability.
725
655
 
726
656
  #### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Attack Type Contexts
727
657
 
728
- An [`exclude_attack_type_contexts`](#contexts-37ecbb) block (within [`rule_list.rules.spec.waf_action.app_firewall_detection_control`](#control-4fbf89)) supports the following:
729
-
730
- <a id="context-db3d53"></a>&#x2022; [`context`](#context-db3d53) - Optional String Defaults to `CONTEXT_ANY`<br>Possible values are `CONTEXT_ANY`, `CONTEXT_BODY`, `CONTEXT_REQUEST`, `CONTEXT_RESPONSE`, `CONTEXT_PARAMETER`, `CONTEXT_HEADER`, `CONTEXT_COOKIE`, `CONTEXT_URL`, `CONTEXT_URI`<br>[Enum: CONTEXT_ANY|CONTEXT_BODY|CONTEXT_REQUEST|CONTEXT_RESPONSE|CONTEXT_PARAMETER|CONTEXT_HEADER|CONTEXT_COOKIE|CONTEXT_URL|CONTEXT_URI] WAF Exclusion Context Options. The available contexts for Exclusion rules. - CONTEXT_ANY: CONTEXT_ANY Detection will be excluded for all contexts. - CONTEXT_BODY: CONTEXT_BODY Detection will be excluded for the request body. - CONTEXT_REQUEST: CONTEXT_REQUEST Detection will be excluded for the request. - CONTEXT_RESPONSE: CONTEXT_RESPONSE - CONTEXT_PARAMETER: CONTEXT_PARAMETER Detection will be excluded for the parameters. The parameter name is required in the Context name field. If the field is left empty, the detection will be excluded for all parameters. - CONTEXT_HEADER: CONTEXT_HEADER Detection will be excluded for the headers. The header name is required in the Context name field. If the field is left empty, the detection will be excluded for all headers. - CONTEXT_COOKIE: CONTEXT_COOKIE Detection will be excluded for the cookies. The cookie name is required in the Context name field. If the field is left empty, the detection will be excluded for all cookies. - CONTEXT_URL: CONTEXT_URL Detection will be excluded for the request URL. - CONTEXT_URI: CONTEXT_URI
731
-
732
- <a id="name-dcda5a"></a>&#x2022; [`context_name`](#name-dcda5a) - Optional String<br>Context Name. Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. Wildcard matching can be used by prefixing or suffixing the context name with an wildcard asterisk (*)
733
-
734
- <a id="type-0b6341"></a>&#x2022; [`exclude_attack_type`](#type-0b6341) - Optional String Defaults to `ATTACK_TYPE_NONE`<br>Possible values are `ATTACK_TYPE_NONE`, `ATTACK_TYPE_NON_BROWSER_CLIENT`, `ATTACK_TYPE_OTHER_APPLICATION_ATTACKS`, `ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE`, `ATTACK_TYPE_DETECTION_EVASION`, `ATTACK_TYPE_VULNERABILITY_SCAN`, `ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY`, `ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS`, `ATTACK_TYPE_BUFFER_OVERFLOW`, `ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION`, `ATTACK_TYPE_INFORMATION_LEAKAGE`, `ATTACK_TYPE_DIRECTORY_INDEXING`, `ATTACK_TYPE_PATH_TRAVERSAL`, `ATTACK_TYPE_XPATH_INJECTION`, `ATTACK_TYPE_LDAP_INJECTION`, `ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION`, `ATTACK_TYPE_COMMAND_EXECUTION`, `ATTACK_TYPE_SQL_INJECTION`, `ATTACK_TYPE_CROSS_SITE_SCRIPTING`, `ATTACK_TYPE_DENIAL_OF_SERVICE`, `ATTACK_TYPE_HTTP_PARSER_ATTACK`, `ATTACK_TYPE_SESSION_HIJACKING`, `ATTACK_TYPE_HTTP_RESPONSE_SPLITTING`, `ATTACK_TYPE_FORCEFUL_BROWSING`, `ATTACK_TYPE_REMOTE_FILE_INCLUDE`, `ATTACK_TYPE_MALICIOUS_FILE_UPLOAD`, `ATTACK_TYPE_GRAPHQL_PARSER_ATTACK`<br>[Enum: ATTACK_TYPE_NONE|ATTACK_TYPE_NON_BROWSER_CLIENT|ATTACK_TYPE_OTHER_APPLICATION_ATTACKS|ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE|ATTACK_TYPE_DETECTION_EVASION|ATTACK_TYPE_VULNERABILITY_SCAN|ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY|ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS|ATTACK_TYPE_BUFFER_OVERFLOW|ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION|ATTACK_TYPE_INFORMATION_LEAKAGE|ATTACK_TYPE_DIRECTORY_INDEXING|ATTACK_TYPE_PATH_TRAVERSAL|ATTACK_TYPE_XPATH_INJECTION|ATTACK_TYPE_LDAP_INJECTION|ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION|ATTACK_TYPE_COMMAND_EXECUTION|ATTACK_TYPE_SQL_INJECTION|ATTACK_TYPE_CROSS_SITE_SCRIPTING|ATTACK_TYPE_DENIAL_OF_SERVICE|ATTACK_TYPE_HTTP_PARSER_ATTACK|ATTACK_TYPE_SESSION_HIJACKING|ATTACK_TYPE_HTTP_RESPONSE_SPLITTING|ATTACK_TYPE_FORCEFUL_BROWSING|ATTACK_TYPE_REMOTE_FILE_INCLUDE|ATTACK_TYPE_MALICIOUS_FILE_UPLOAD|ATTACK_TYPE_GRAPHQL_PARSER_ATTACK] Attack Types. List of all Attack Types ATTACK_TYPE_NONE ATTACK_TYPE_NON_BROWSER_CLIENT ATTACK_TYPE_OTHER_APPLICATION_ATTACKS ATTACK_TYPE_TROJAN_BACKDOOR_SPYWARE ATTACK_TYPE_DETECTION_EVASION ATTACK_TYPE_VULNERABILITY_SCAN ATTACK_TYPE_ABUSE_OF_FUNCTIONALITY ATTACK_TYPE_AUTHENTICATION_AUTHORIZATION_ATTACKS ATTACK_TYPE_BUFFER_OVERFLOW ATTACK_TYPE_PREDICTABLE_RESOURCE_LOCATION ATTACK_TYPE_INFORMATION_LEAKAGE ATTACK_TYPE_DIRECTORY_INDEXING ATTACK_TYPE_PATH_TRAVERSAL ATTACK_TYPE_XPATH_INJECTION ATTACK_TYPE_LDAP_INJECTION ATTACK_TYPE_SERVER_SIDE_CODE_INJECTION ATTACK_TYPE_COMMAND_EXECUTION ATTACK_TYPE_SQL_INJECTION ATTACK_TYPE_CROSS_SITE_SCRIPTING ATTACK_TYPE_DENIAL_OF_SERVICE ATTACK_TYPE_HTTP_PARSER_ATTACK ATTACK_TYPE_SESSION_HIJACKING ATTACK_TYPE_HTTP_RESPONSE_SPLITTING ATTACK_TYPE_FORCEFUL_BROWSING ATTACK_TYPE_REMOTE_FILE_INCLUDE ATTACK_TYPE_MALICIOUS_FILE_UPLOAD ATTACK_TYPE_GRAPHQL_PARSER_ATTACK
658
+ <a id="deep-fc8b09"></a>Deeply nested **Contexts** block collapsed for readability.
735
659
 
736
660
  #### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Bot Name Contexts
737
661
 
738
- An [`exclude_bot_name_contexts`](#contexts-e1b02b) block (within [`rule_list.rules.spec.waf_action.app_firewall_detection_control`](#control-4fbf89)) supports the following:
739
-
740
- <a id="name-b71242"></a>&#x2022; [`bot_name`](#name-b71242) - Optional String<br>Bot Name
662
+ <a id="deep-02ea7a"></a>Deeply nested **Contexts** block collapsed for readability.
741
663
 
742
664
  #### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Signature Contexts
743
665
 
744
- An [`exclude_signature_contexts`](#contexts-2da85d) block (within [`rule_list.rules.spec.waf_action.app_firewall_detection_control`](#control-4fbf89)) supports the following:
745
-
746
- <a id="context-1d6f79"></a>&#x2022; [`context`](#context-1d6f79) - Optional String Defaults to `CONTEXT_ANY`<br>Possible values are `CONTEXT_ANY`, `CONTEXT_BODY`, `CONTEXT_REQUEST`, `CONTEXT_RESPONSE`, `CONTEXT_PARAMETER`, `CONTEXT_HEADER`, `CONTEXT_COOKIE`, `CONTEXT_URL`, `CONTEXT_URI`<br>[Enum: CONTEXT_ANY|CONTEXT_BODY|CONTEXT_REQUEST|CONTEXT_RESPONSE|CONTEXT_PARAMETER|CONTEXT_HEADER|CONTEXT_COOKIE|CONTEXT_URL|CONTEXT_URI] WAF Exclusion Context Options. The available contexts for Exclusion rules. - CONTEXT_ANY: CONTEXT_ANY Detection will be excluded for all contexts. - CONTEXT_BODY: CONTEXT_BODY Detection will be excluded for the request body. - CONTEXT_REQUEST: CONTEXT_REQUEST Detection will be excluded for the request. - CONTEXT_RESPONSE: CONTEXT_RESPONSE - CONTEXT_PARAMETER: CONTEXT_PARAMETER Detection will be excluded for the parameters. The parameter name is required in the Context name field. If the field is left empty, the detection will be excluded for all parameters. - CONTEXT_HEADER: CONTEXT_HEADER Detection will be excluded for the headers. The header name is required in the Context name field. If the field is left empty, the detection will be excluded for all headers. - CONTEXT_COOKIE: CONTEXT_COOKIE Detection will be excluded for the cookies. The cookie name is required in the Context name field. If the field is left empty, the detection will be excluded for all cookies. - CONTEXT_URL: CONTEXT_URL Detection will be excluded for the request URL. - CONTEXT_URI: CONTEXT_URI
747
-
748
- <a id="name-2c4afd"></a>&#x2022; [`context_name`](#name-2c4afd) - Optional String<br>Context Name. Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. Wildcard matching can be used by prefixing or suffixing the context name with an wildcard asterisk (*)
749
-
750
- <a id="signature-id-c5ea27"></a>&#x2022; [`signature_id`](#signature-id-c5ea27) - Optional Number<br>SignatureID. The allowed values for signature ID are 0 and in the range of 200000001-299999999. 0 implies that all signatures will be excluded for the specified context
666
+ <a id="deep-f1d198"></a>Deeply nested **Contexts** block collapsed for readability.
751
667
 
752
668
  #### Rule List Rules Spec WAF Action App Firewall Detection Control Exclude Violation Contexts
753
669
 
754
- An [`exclude_violation_contexts`](#contexts-716dd3) block (within [`rule_list.rules.spec.waf_action.app_firewall_detection_control`](#control-4fbf89)) supports the following:
755
-
756
- <a id="context-c1896e"></a>&#x2022; [`context`](#context-c1896e) - Optional String Defaults to `CONTEXT_ANY`<br>Possible values are `CONTEXT_ANY`, `CONTEXT_BODY`, `CONTEXT_REQUEST`, `CONTEXT_RESPONSE`, `CONTEXT_PARAMETER`, `CONTEXT_HEADER`, `CONTEXT_COOKIE`, `CONTEXT_URL`, `CONTEXT_URI`<br>[Enum: CONTEXT_ANY|CONTEXT_BODY|CONTEXT_REQUEST|CONTEXT_RESPONSE|CONTEXT_PARAMETER|CONTEXT_HEADER|CONTEXT_COOKIE|CONTEXT_URL|CONTEXT_URI] WAF Exclusion Context Options. The available contexts for Exclusion rules. - CONTEXT_ANY: CONTEXT_ANY Detection will be excluded for all contexts. - CONTEXT_BODY: CONTEXT_BODY Detection will be excluded for the request body. - CONTEXT_REQUEST: CONTEXT_REQUEST Detection will be excluded for the request. - CONTEXT_RESPONSE: CONTEXT_RESPONSE - CONTEXT_PARAMETER: CONTEXT_PARAMETER Detection will be excluded for the parameters. The parameter name is required in the Context name field. If the field is left empty, the detection will be excluded for all parameters. - CONTEXT_HEADER: CONTEXT_HEADER Detection will be excluded for the headers. The header name is required in the Context name field. If the field is left empty, the detection will be excluded for all headers. - CONTEXT_COOKIE: CONTEXT_COOKIE Detection will be excluded for the cookies. The cookie name is required in the Context name field. If the field is left empty, the detection will be excluded for all cookies. - CONTEXT_URL: CONTEXT_URL Detection will be excluded for the request URL. - CONTEXT_URI: CONTEXT_URI
757
-
758
- <a id="name-4dc87b"></a>&#x2022; [`context_name`](#name-4dc87b) - Optional String<br>Context Name. Relevant only for contexts: Header, Cookie and Parameter. Name of the Context that the WAF Exclusion Rules will check. Wildcard matching can be used by prefixing or suffixing the context name with an wildcard asterisk (*)
759
-
760
- <a id="violation-dfe3e0"></a>&#x2022; [`exclude_violation`](#violation-dfe3e0) - Optional String Defaults to `VIOL_NONE`<br>Possible values are `VIOL_NONE`, `VIOL_FILETYPE`, `VIOL_METHOD`, `VIOL_MANDATORY_HEADER`, `VIOL_HTTP_RESPONSE_STATUS`, `VIOL_REQUEST_MAX_LENGTH`, `VIOL_FILE_UPLOAD`, `VIOL_FILE_UPLOAD_IN_BODY`, `VIOL_XML_MALFORMED`, `VIOL_JSON_MALFORMED`, `VIOL_ASM_COOKIE_MODIFIED`, `VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS`, `VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE`, `VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT`, `VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST`, `VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION`, `VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS`, `VIOL_EVASION_DIRECTORY_TRAVERSALS`, `VIOL_MALFORMED_REQUEST`, `VIOL_EVASION_MULTIPLE_DECODING`, `VIOL_DATA_GUARD`, `VIOL_EVASION_APACHE_WHITESPACE`, `VIOL_COOKIE_MODIFIED`, `VIOL_EVASION_IIS_UNICODE_CODEPOINTS`, `VIOL_EVASION_IIS_BACKSLASHES`, `VIOL_EVASION_PERCENT_U_DECODING`, `VIOL_EVASION_BARE_BYTE_DECODING`, `VIOL_EVASION_BAD_UNESCAPE`, `VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST`, `VIOL_ENCODING`, `VIOL_COOKIE_MALFORMED`, `VIOL_GRAPHQL_FORMAT`, `VIOL_GRAPHQL_MALFORMED`, `VIOL_GRAPHQL_INTROSPECTION_QUERY`<br>[Enum: VIOL_NONE|VIOL_FILETYPE|VIOL_METHOD|VIOL_MANDATORY_HEADER|VIOL_HTTP_RESPONSE_STATUS|VIOL_REQUEST_MAX_LENGTH|VIOL_FILE_UPLOAD|VIOL_FILE_UPLOAD_IN_BODY|VIOL_XML_MALFORMED|VIOL_JSON_MALFORMED|VIOL_ASM_COOKIE_MODIFIED|VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS|VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE|VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT|VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST|VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION|VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS|VIOL_EVASION_DIRECTORY_TRAVERSALS|VIOL_MALFORMED_REQUEST|VIOL_EVASION_MULTIPLE_DECODING|VIOL_DATA_GUARD|VIOL_EVASION_APACHE_WHITESPACE|VIOL_COOKIE_MODIFIED|VIOL_EVASION_IIS_UNICODE_CODEPOINTS|VIOL_EVASION_IIS_BACKSLASHES|VIOL_EVASION_PERCENT_U_DECODING|VIOL_EVASION_BARE_BYTE_DECODING|VIOL_EVASION_BAD_UNESCAPE|VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST|VIOL_ENCODING|VIOL_COOKIE_MALFORMED|VIOL_GRAPHQL_FORMAT|VIOL_GRAPHQL_MALFORMED|VIOL_GRAPHQL_INTROSPECTION_QUERY] App Firewall Violation Type. List of all supported Violation Types VIOL_NONE VIOL_FILETYPE VIOL_METHOD VIOL_MANDATORY_HEADER VIOL_HTTP_RESPONSE_STATUS VIOL_REQUEST_MAX_LENGTH VIOL_FILE_UPLOAD VIOL_FILE_UPLOAD_IN_BODY VIOL_XML_MALFORMED VIOL_JSON_MALFORMED VIOL_ASM_COOKIE_MODIFIED VIOL_HTTP_PROTOCOL_MULTIPLE_HOST_HEADERS VIOL_HTTP_PROTOCOL_BAD_HOST_HEADER_VALUE VIOL_HTTP_PROTOCOL_UNPARSABLE_REQUEST_CONTENT VIOL_HTTP_PROTOCOL_NULL_IN_REQUEST VIOL_HTTP_PROTOCOL_BAD_HTTP_VERSION VIOL_HTTP_PROTOCOL_CRLF_CHARACTERS_BEFORE_REQUEST_START VIOL_HTTP_PROTOCOL_NO_HOST_HEADER_IN_HTTP_1_1_REQUEST VIOL_HTTP_PROTOCOL_BAD_MULTIPART_PARAMETERS_PARSING VIOL_HTTP_PROTOCOL_SEVERAL_CONTENT_LENGTH_HEADERS VIOL_HTTP_PROTOCOL_CONTENT_LENGTH_SHOULD_BE_A_POSITIVE_NUMBER VIOL_EVASION_DIRECTORY_TRAVERSALS VIOL_MALFORMED_REQUEST VIOL_EVASION_MULTIPLE_DECODING VIOL_DATA_GUARD VIOL_EVASION_APACHE_WHITESPACE VIOL_COOKIE_MODIFIED VIOL_EVASION_IIS_UNICODE_CODEPOINTS VIOL_EVASION_IIS_BACKSLASHES VIOL_EVASION_PERCENT_U_DECODING VIOL_EVASION_BARE_BYTE_DECODING VIOL_EVASION_BAD_UNESCAPE VIOL_HTTP_PROTOCOL_BAD_MULTIPART_FORMDATA_REQUEST_PARSING VIOL_HTTP_PROTOCOL_BODY_IN_GET_OR_HEAD_REQUEST VIOL_HTTP_PROTOCOL_HIGH_ASCII_CHARACTERS_IN_HEADERS VIOL_ENCODING VIOL_COOKIE_MALFORMED VIOL_GRAPHQL_FORMAT VIOL_GRAPHQL_MALFORMED VIOL_GRAPHQL_INTROSPECTION_QUERY
670
+ <a id="deep-5122ed"></a>Deeply nested **Contexts** block collapsed for readability.
761
671
 
762
672
  #### Server Name Matcher
763
673
 
@@ -785,6 +695,89 @@ A [`timeouts`](#timeouts) block supports the following:
785
695
 
786
696
  <a id="timeouts-update"></a>&#x2022; [`update`](#timeouts-update) - Optional String (Defaults to `10 minutes`)<br>Used when updating the resource
787
697
 
698
+ ---
699
+
700
+ ## Common Types
701
+
702
+ The following type definitions are used throughout this resource. See the full definition here rather than repeated inline.
703
+
704
+ ### Object Reference {#common-object-reference}
705
+
706
+ Object references establish a direct reference from one configuration object to another in F5 Distributed Cloud. References use the format `tenant/namespace/name`.
707
+
708
+ | Field | Type | Description |
709
+ | ----- | ---- | ----------- |
710
+ | `name` | String | Name of the referenced object |
711
+ | `namespace` | String | Namespace containing the referenced object |
712
+ | `tenant` | String | Tenant of the referenced object (system-managed) |
713
+
714
+ ### Transformers {#common-transformers}
715
+
716
+ Transformers apply transformations to input values before matching. Multiple transformers can be applied in order.
717
+
718
+ | Value | Description |
719
+ | ----- | ----------- |
720
+ | `LOWER_CASE` | Convert to lowercase |
721
+ | `UPPER_CASE` | Convert to uppercase |
722
+ | `BASE64_DECODE` | Decode base64 content |
723
+ | `NORMALIZE_PATH` | Normalize URL path |
724
+ | `REMOVE_WHITESPACE` | Remove whitespace characters |
725
+ | `URL_DECODE` | Decode URL-encoded characters |
726
+ | `TRIM_LEFT` | Trim leading whitespace |
727
+ | `TRIM_RIGHT` | Trim trailing whitespace |
728
+ | `TRIM` | Trim both leading and trailing whitespace |
729
+
730
+ ### HTTP Methods {#common-http-methods}
731
+
732
+ HTTP methods used for request matching.
733
+
734
+ | Value | Description |
735
+ | ----- | ----------- |
736
+ | `ANY` | Match any HTTP method |
737
+ | `GET` | HTTP GET request |
738
+ | `HEAD` | HTTP HEAD request |
739
+ | `POST` | HTTP POST request |
740
+ | `PUT` | HTTP PUT request |
741
+ | `DELETE` | HTTP DELETE request |
742
+ | `CONNECT` | HTTP CONNECT request |
743
+ | `OPTIONS` | HTTP OPTIONS request |
744
+ | `TRACE` | HTTP TRACE request |
745
+ | `PATCH` | HTTP PATCH request |
746
+ | `COPY` | HTTP COPY request (WebDAV) |
747
+
748
+ ### TLS Fingerprints {#common-tls-fingerprints}
749
+
750
+ TLS fingerprint categories for malicious client detection.
751
+
752
+ | Value | Description |
753
+ | ----- | ----------- |
754
+ | `TLS_FINGERPRINT_NONE` | No fingerprint matching |
755
+ | `ANY_MALICIOUS_FINGERPRINT` | Match any known malicious fingerprint |
756
+ | `ADWARE` | Adware-associated fingerprints |
757
+ | `DRIDEX` | Dridex malware fingerprints |
758
+ | `GOOTKIT` | Gootkit malware fingerprints |
759
+ | `RANSOMWARE` | Ransomware-associated fingerprints |
760
+ | `TRICKBOT` | Trickbot malware fingerprints |
761
+
762
+ ### IP Threat Categories {#common-ip-threat-categories}
763
+
764
+ IP address threat categories for security filtering.
765
+
766
+ | Value | Description |
767
+ | ----- | ----------- |
768
+ | `SPAM_SOURCES` | Known spam sources |
769
+ | `WINDOWS_EXPLOITS` | Windows exploit sources |
770
+ | `WEB_ATTACKS` | Web attack sources |
771
+ | `BOTNETS` | Known botnet IPs |
772
+ | `SCANNERS` | Network scanner IPs |
773
+ | `REPUTATION` | Poor reputation IPs |
774
+ | `PHISHING` | Phishing-related IPs |
775
+ | `PROXY` | Anonymous proxy IPs |
776
+ | `MOBILE_THREATS` | Mobile threat sources |
777
+ | `TOR_PROXY` | Tor exit nodes |
778
+ | `DENIAL_OF_SERVICE` | DoS attack sources |
779
+ | `NETWORK` | Known bad network ranges |
780
+
788
781
  ## Import
789
782
 
790
783
  Import is supported using the following syntax: