pulumi-gcp 7.23.0a1715621482__py3-none-any.whl → 7.23.0a1715808346__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +24 -0
- pulumi_gcp/bigquery/table.py +47 -0
- pulumi_gcp/bigtable/__init__.py +1 -0
- pulumi_gcp/bigtable/_inputs.py +101 -0
- pulumi_gcp/bigtable/authorized_view.py +440 -0
- pulumi_gcp/bigtable/outputs.py +119 -0
- pulumi_gcp/certificateauthority/certificate_template.py +70 -0
- pulumi_gcp/cloudbuildv2/repository.py +2 -2
- pulumi_gcp/clouddeploy/_inputs.py +96 -0
- pulumi_gcp/clouddeploy/custom_target_type.py +46 -0
- pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
- pulumi_gcp/clouddeploy/outputs.py +96 -1
- pulumi_gcp/clouddeploy/target.py +54 -7
- pulumi_gcp/compute/_inputs.py +689 -0
- pulumi_gcp/compute/firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/outputs.py +684 -0
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/region_security_policy_rule.py +230 -1
- pulumi_gcp/container/_inputs.py +67 -3
- pulumi_gcp/container/outputs.py +93 -4
- pulumi_gcp/dataflow/flex_template_job.py +7 -7
- pulumi_gcp/dataflow/job.py +7 -7
- pulumi_gcp/iam/_inputs.py +191 -2
- pulumi_gcp/iam/outputs.py +197 -2
- pulumi_gcp/iam/workforce_pool_provider.py +245 -0
- pulumi_gcp/integrationconnectors/__init__.py +1 -0
- pulumi_gcp/integrationconnectors/managed_zone.py +753 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/regional_endpoint.py +946 -0
- pulumi_gcp/networksecurity/firewall_endpoint.py +34 -0
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +24 -0
- pulumi_gcp/networksecurity/security_profile.py +16 -0
- pulumi_gcp/networksecurity/security_profile_group.py +18 -0
- pulumi_gcp/networksecurity/tls_inspection_policy.py +16 -0
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/pulumi-plugin.json +2 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/RECORD +42 -39
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/top_level.txt +0 -0
pulumi_gcp/compute/_inputs.py
CHANGED
@@ -311,6 +311,16 @@ __all__ = [
|
|
311
311
|
'RegionSecurityPolicyRuleMatchConfigArgs',
|
312
312
|
'RegionSecurityPolicyRuleNetworkMatchArgs',
|
313
313
|
'RegionSecurityPolicyRuleNetworkMatchUserDefinedFieldArgs',
|
314
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigArgs',
|
315
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs',
|
316
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs',
|
317
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs',
|
318
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs',
|
319
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs',
|
320
|
+
'RegionSecurityPolicyRuleRateLimitOptionsArgs',
|
321
|
+
'RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs',
|
322
|
+
'RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs',
|
323
|
+
'RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs',
|
314
324
|
'RegionSecurityPolicyUserDefinedFieldArgs',
|
315
325
|
'RegionUrlMapDefaultRouteActionArgs',
|
316
326
|
'RegionUrlMapDefaultRouteActionCorsPolicyArgs',
|
@@ -22156,6 +22166,685 @@ class RegionSecurityPolicyRuleNetworkMatchUserDefinedFieldArgs:
|
|
22156
22166
|
pulumi.set(self, "values", value)
|
22157
22167
|
|
22158
22168
|
|
22169
|
+
@pulumi.input_type
|
22170
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigArgs:
|
22171
|
+
def __init__(__self__, *,
|
22172
|
+
exclusions: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs']]]] = None):
|
22173
|
+
"""
|
22174
|
+
:param pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs']]] exclusions: An exclusion to apply during preconfigured WAF evaluation.
|
22175
|
+
Structure is documented below.
|
22176
|
+
"""
|
22177
|
+
if exclusions is not None:
|
22178
|
+
pulumi.set(__self__, "exclusions", exclusions)
|
22179
|
+
|
22180
|
+
@property
|
22181
|
+
@pulumi.getter
|
22182
|
+
def exclusions(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs']]]]:
|
22183
|
+
"""
|
22184
|
+
An exclusion to apply during preconfigured WAF evaluation.
|
22185
|
+
Structure is documented below.
|
22186
|
+
"""
|
22187
|
+
return pulumi.get(self, "exclusions")
|
22188
|
+
|
22189
|
+
@exclusions.setter
|
22190
|
+
def exclusions(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs']]]]):
|
22191
|
+
pulumi.set(self, "exclusions", value)
|
22192
|
+
|
22193
|
+
|
22194
|
+
@pulumi.input_type
|
22195
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs:
|
22196
|
+
def __init__(__self__, *,
|
22197
|
+
target_rule_set: pulumi.Input[str],
|
22198
|
+
request_cookies: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs']]]] = None,
|
22199
|
+
request_headers: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs']]]] = None,
|
22200
|
+
request_query_params: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs']]]] = None,
|
22201
|
+
request_uris: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs']]]] = None,
|
22202
|
+
target_rule_ids: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]] = None):
|
22203
|
+
"""
|
22204
|
+
:param pulumi.Input[str] target_rule_set: Target WAF rule set to apply the preconfigured WAF exclusion.
|
22205
|
+
:param pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs']]] request_cookies: Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22206
|
+
Structure is documented below.
|
22207
|
+
:param pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs']]] request_headers: Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22208
|
+
Structure is documented below.
|
22209
|
+
:param pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs']]] request_query_params: Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22210
|
+
Note that the parameter can be in the query string or in the POST body.
|
22211
|
+
Structure is documented below.
|
22212
|
+
:param pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs']]] request_uris: Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation.
|
22213
|
+
When specifying this field, the query or fragment part should be excluded.
|
22214
|
+
Structure is documented below.
|
22215
|
+
:param pulumi.Input[Sequence[pulumi.Input[str]]] target_rule_ids: A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion.
|
22216
|
+
If omitted, it refers to all the rule IDs under the WAF rule set.
|
22217
|
+
"""
|
22218
|
+
pulumi.set(__self__, "target_rule_set", target_rule_set)
|
22219
|
+
if request_cookies is not None:
|
22220
|
+
pulumi.set(__self__, "request_cookies", request_cookies)
|
22221
|
+
if request_headers is not None:
|
22222
|
+
pulumi.set(__self__, "request_headers", request_headers)
|
22223
|
+
if request_query_params is not None:
|
22224
|
+
pulumi.set(__self__, "request_query_params", request_query_params)
|
22225
|
+
if request_uris is not None:
|
22226
|
+
pulumi.set(__self__, "request_uris", request_uris)
|
22227
|
+
if target_rule_ids is not None:
|
22228
|
+
pulumi.set(__self__, "target_rule_ids", target_rule_ids)
|
22229
|
+
|
22230
|
+
@property
|
22231
|
+
@pulumi.getter(name="targetRuleSet")
|
22232
|
+
def target_rule_set(self) -> pulumi.Input[str]:
|
22233
|
+
"""
|
22234
|
+
Target WAF rule set to apply the preconfigured WAF exclusion.
|
22235
|
+
"""
|
22236
|
+
return pulumi.get(self, "target_rule_set")
|
22237
|
+
|
22238
|
+
@target_rule_set.setter
|
22239
|
+
def target_rule_set(self, value: pulumi.Input[str]):
|
22240
|
+
pulumi.set(self, "target_rule_set", value)
|
22241
|
+
|
22242
|
+
@property
|
22243
|
+
@pulumi.getter(name="requestCookies")
|
22244
|
+
def request_cookies(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs']]]]:
|
22245
|
+
"""
|
22246
|
+
Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22247
|
+
Structure is documented below.
|
22248
|
+
"""
|
22249
|
+
return pulumi.get(self, "request_cookies")
|
22250
|
+
|
22251
|
+
@request_cookies.setter
|
22252
|
+
def request_cookies(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs']]]]):
|
22253
|
+
pulumi.set(self, "request_cookies", value)
|
22254
|
+
|
22255
|
+
@property
|
22256
|
+
@pulumi.getter(name="requestHeaders")
|
22257
|
+
def request_headers(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs']]]]:
|
22258
|
+
"""
|
22259
|
+
Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22260
|
+
Structure is documented below.
|
22261
|
+
"""
|
22262
|
+
return pulumi.get(self, "request_headers")
|
22263
|
+
|
22264
|
+
@request_headers.setter
|
22265
|
+
def request_headers(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs']]]]):
|
22266
|
+
pulumi.set(self, "request_headers", value)
|
22267
|
+
|
22268
|
+
@property
|
22269
|
+
@pulumi.getter(name="requestQueryParams")
|
22270
|
+
def request_query_params(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs']]]]:
|
22271
|
+
"""
|
22272
|
+
Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22273
|
+
Note that the parameter can be in the query string or in the POST body.
|
22274
|
+
Structure is documented below.
|
22275
|
+
"""
|
22276
|
+
return pulumi.get(self, "request_query_params")
|
22277
|
+
|
22278
|
+
@request_query_params.setter
|
22279
|
+
def request_query_params(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs']]]]):
|
22280
|
+
pulumi.set(self, "request_query_params", value)
|
22281
|
+
|
22282
|
+
@property
|
22283
|
+
@pulumi.getter(name="requestUris")
|
22284
|
+
def request_uris(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs']]]]:
|
22285
|
+
"""
|
22286
|
+
Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation.
|
22287
|
+
When specifying this field, the query or fragment part should be excluded.
|
22288
|
+
Structure is documented below.
|
22289
|
+
"""
|
22290
|
+
return pulumi.get(self, "request_uris")
|
22291
|
+
|
22292
|
+
@request_uris.setter
|
22293
|
+
def request_uris(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs']]]]):
|
22294
|
+
pulumi.set(self, "request_uris", value)
|
22295
|
+
|
22296
|
+
@property
|
22297
|
+
@pulumi.getter(name="targetRuleIds")
|
22298
|
+
def target_rule_ids(self) -> Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]:
|
22299
|
+
"""
|
22300
|
+
A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion.
|
22301
|
+
If omitted, it refers to all the rule IDs under the WAF rule set.
|
22302
|
+
"""
|
22303
|
+
return pulumi.get(self, "target_rule_ids")
|
22304
|
+
|
22305
|
+
@target_rule_ids.setter
|
22306
|
+
def target_rule_ids(self, value: Optional[pulumi.Input[Sequence[pulumi.Input[str]]]]):
|
22307
|
+
pulumi.set(self, "target_rule_ids", value)
|
22308
|
+
|
22309
|
+
|
22310
|
+
@pulumi.input_type
|
22311
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs:
|
22312
|
+
def __init__(__self__, *,
|
22313
|
+
operator: pulumi.Input[str],
|
22314
|
+
value: Optional[pulumi.Input[str]] = None):
|
22315
|
+
"""
|
22316
|
+
:param pulumi.Input[str] operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22317
|
+
Available options:
|
22318
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22319
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22320
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22321
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22322
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22323
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22324
|
+
:param pulumi.Input[str] value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22325
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22326
|
+
"""
|
22327
|
+
pulumi.set(__self__, "operator", operator)
|
22328
|
+
if value is not None:
|
22329
|
+
pulumi.set(__self__, "value", value)
|
22330
|
+
|
22331
|
+
@property
|
22332
|
+
@pulumi.getter
|
22333
|
+
def operator(self) -> pulumi.Input[str]:
|
22334
|
+
"""
|
22335
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22336
|
+
Available options:
|
22337
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22338
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22339
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22340
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22341
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22342
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22343
|
+
"""
|
22344
|
+
return pulumi.get(self, "operator")
|
22345
|
+
|
22346
|
+
@operator.setter
|
22347
|
+
def operator(self, value: pulumi.Input[str]):
|
22348
|
+
pulumi.set(self, "operator", value)
|
22349
|
+
|
22350
|
+
@property
|
22351
|
+
@pulumi.getter
|
22352
|
+
def value(self) -> Optional[pulumi.Input[str]]:
|
22353
|
+
"""
|
22354
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22355
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22356
|
+
"""
|
22357
|
+
return pulumi.get(self, "value")
|
22358
|
+
|
22359
|
+
@value.setter
|
22360
|
+
def value(self, value: Optional[pulumi.Input[str]]):
|
22361
|
+
pulumi.set(self, "value", value)
|
22362
|
+
|
22363
|
+
|
22364
|
+
@pulumi.input_type
|
22365
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs:
|
22366
|
+
def __init__(__self__, *,
|
22367
|
+
operator: pulumi.Input[str],
|
22368
|
+
value: Optional[pulumi.Input[str]] = None):
|
22369
|
+
"""
|
22370
|
+
:param pulumi.Input[str] operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22371
|
+
Available options:
|
22372
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22373
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22374
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22375
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22376
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22377
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22378
|
+
:param pulumi.Input[str] value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22379
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22380
|
+
"""
|
22381
|
+
pulumi.set(__self__, "operator", operator)
|
22382
|
+
if value is not None:
|
22383
|
+
pulumi.set(__self__, "value", value)
|
22384
|
+
|
22385
|
+
@property
|
22386
|
+
@pulumi.getter
|
22387
|
+
def operator(self) -> pulumi.Input[str]:
|
22388
|
+
"""
|
22389
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22390
|
+
Available options:
|
22391
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22392
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22393
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22394
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22395
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22396
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22397
|
+
"""
|
22398
|
+
return pulumi.get(self, "operator")
|
22399
|
+
|
22400
|
+
@operator.setter
|
22401
|
+
def operator(self, value: pulumi.Input[str]):
|
22402
|
+
pulumi.set(self, "operator", value)
|
22403
|
+
|
22404
|
+
@property
|
22405
|
+
@pulumi.getter
|
22406
|
+
def value(self) -> Optional[pulumi.Input[str]]:
|
22407
|
+
"""
|
22408
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22409
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22410
|
+
"""
|
22411
|
+
return pulumi.get(self, "value")
|
22412
|
+
|
22413
|
+
@value.setter
|
22414
|
+
def value(self, value: Optional[pulumi.Input[str]]):
|
22415
|
+
pulumi.set(self, "value", value)
|
22416
|
+
|
22417
|
+
|
22418
|
+
@pulumi.input_type
|
22419
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs:
|
22420
|
+
def __init__(__self__, *,
|
22421
|
+
operator: pulumi.Input[str],
|
22422
|
+
value: Optional[pulumi.Input[str]] = None):
|
22423
|
+
"""
|
22424
|
+
:param pulumi.Input[str] operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22425
|
+
Available options:
|
22426
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22427
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22428
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22429
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22430
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22431
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22432
|
+
:param pulumi.Input[str] value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22433
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22434
|
+
"""
|
22435
|
+
pulumi.set(__self__, "operator", operator)
|
22436
|
+
if value is not None:
|
22437
|
+
pulumi.set(__self__, "value", value)
|
22438
|
+
|
22439
|
+
@property
|
22440
|
+
@pulumi.getter
|
22441
|
+
def operator(self) -> pulumi.Input[str]:
|
22442
|
+
"""
|
22443
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22444
|
+
Available options:
|
22445
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22446
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22447
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22448
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22449
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22450
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22451
|
+
"""
|
22452
|
+
return pulumi.get(self, "operator")
|
22453
|
+
|
22454
|
+
@operator.setter
|
22455
|
+
def operator(self, value: pulumi.Input[str]):
|
22456
|
+
pulumi.set(self, "operator", value)
|
22457
|
+
|
22458
|
+
@property
|
22459
|
+
@pulumi.getter
|
22460
|
+
def value(self) -> Optional[pulumi.Input[str]]:
|
22461
|
+
"""
|
22462
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22463
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22464
|
+
"""
|
22465
|
+
return pulumi.get(self, "value")
|
22466
|
+
|
22467
|
+
@value.setter
|
22468
|
+
def value(self, value: Optional[pulumi.Input[str]]):
|
22469
|
+
pulumi.set(self, "value", value)
|
22470
|
+
|
22471
|
+
|
22472
|
+
@pulumi.input_type
|
22473
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs:
|
22474
|
+
def __init__(__self__, *,
|
22475
|
+
operator: pulumi.Input[str],
|
22476
|
+
value: Optional[pulumi.Input[str]] = None):
|
22477
|
+
"""
|
22478
|
+
:param pulumi.Input[str] operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22479
|
+
Available options:
|
22480
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22481
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22482
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22483
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22484
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22485
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22486
|
+
:param pulumi.Input[str] value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22487
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22488
|
+
"""
|
22489
|
+
pulumi.set(__self__, "operator", operator)
|
22490
|
+
if value is not None:
|
22491
|
+
pulumi.set(__self__, "value", value)
|
22492
|
+
|
22493
|
+
@property
|
22494
|
+
@pulumi.getter
|
22495
|
+
def operator(self) -> pulumi.Input[str]:
|
22496
|
+
"""
|
22497
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22498
|
+
Available options:
|
22499
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22500
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22501
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22502
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22503
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22504
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22505
|
+
"""
|
22506
|
+
return pulumi.get(self, "operator")
|
22507
|
+
|
22508
|
+
@operator.setter
|
22509
|
+
def operator(self, value: pulumi.Input[str]):
|
22510
|
+
pulumi.set(self, "operator", value)
|
22511
|
+
|
22512
|
+
@property
|
22513
|
+
@pulumi.getter
|
22514
|
+
def value(self) -> Optional[pulumi.Input[str]]:
|
22515
|
+
"""
|
22516
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22517
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22518
|
+
"""
|
22519
|
+
return pulumi.get(self, "value")
|
22520
|
+
|
22521
|
+
@value.setter
|
22522
|
+
def value(self, value: Optional[pulumi.Input[str]]):
|
22523
|
+
pulumi.set(self, "value", value)
|
22524
|
+
|
22525
|
+
|
22526
|
+
@pulumi.input_type
|
22527
|
+
class RegionSecurityPolicyRuleRateLimitOptionsArgs:
|
22528
|
+
def __init__(__self__, *,
|
22529
|
+
ban_duration_sec: Optional[pulumi.Input[int]] = None,
|
22530
|
+
ban_threshold: Optional[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs']] = None,
|
22531
|
+
conform_action: Optional[pulumi.Input[str]] = None,
|
22532
|
+
enforce_on_key: Optional[pulumi.Input[str]] = None,
|
22533
|
+
enforce_on_key_configs: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs']]]] = None,
|
22534
|
+
enforce_on_key_name: Optional[pulumi.Input[str]] = None,
|
22535
|
+
exceed_action: Optional[pulumi.Input[str]] = None,
|
22536
|
+
rate_limit_threshold: Optional[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs']] = None):
|
22537
|
+
"""
|
22538
|
+
:param pulumi.Input[int] ban_duration_sec: Can only be specified if the action for the rule is "rate_based_ban".
|
22539
|
+
If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
|
22540
|
+
:param pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs'] ban_threshold: Can only be specified if the action for the rule is "rate_based_ban".
|
22541
|
+
If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
|
22542
|
+
Structure is documented below.
|
22543
|
+
:param pulumi.Input[str] conform_action: Action to take for requests that are under the configured rate limit threshold.
|
22544
|
+
Valid option is "allow" only.
|
22545
|
+
:param pulumi.Input[str] enforce_on_key: Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22546
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKey" is not configured.
|
22547
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22548
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22549
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22550
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22551
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22552
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22553
|
+
* REGION_CODE: The country/region from which the request originates.
|
22554
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22555
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22556
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22557
|
+
:param pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs']]] enforce_on_key_configs: If specified, any combination of values of enforceOnKeyType/enforceOnKeyName is treated as the key on which ratelimit threshold/action is enforced.
|
22558
|
+
You can specify up to 3 enforceOnKeyConfigs.
|
22559
|
+
If enforceOnKeyConfigs is specified, enforceOnKey must not be specified.
|
22560
|
+
Structure is documented below.
|
22561
|
+
:param pulumi.Input[str] enforce_on_key_name: Rate limit key name applicable only for the following key types:
|
22562
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22563
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22564
|
+
:param pulumi.Input[str] exceed_action: Action to take for requests that are above the configured rate limit threshold, to deny with a specified HTTP response code.
|
22565
|
+
Valid options are deny(STATUS), where valid values for STATUS are 403, 404, 429, and 502.
|
22566
|
+
:param pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs'] rate_limit_threshold: Threshold at which to begin ratelimiting.
|
22567
|
+
Structure is documented below.
|
22568
|
+
"""
|
22569
|
+
if ban_duration_sec is not None:
|
22570
|
+
pulumi.set(__self__, "ban_duration_sec", ban_duration_sec)
|
22571
|
+
if ban_threshold is not None:
|
22572
|
+
pulumi.set(__self__, "ban_threshold", ban_threshold)
|
22573
|
+
if conform_action is not None:
|
22574
|
+
pulumi.set(__self__, "conform_action", conform_action)
|
22575
|
+
if enforce_on_key is not None:
|
22576
|
+
pulumi.set(__self__, "enforce_on_key", enforce_on_key)
|
22577
|
+
if enforce_on_key_configs is not None:
|
22578
|
+
pulumi.set(__self__, "enforce_on_key_configs", enforce_on_key_configs)
|
22579
|
+
if enforce_on_key_name is not None:
|
22580
|
+
pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
|
22581
|
+
if exceed_action is not None:
|
22582
|
+
pulumi.set(__self__, "exceed_action", exceed_action)
|
22583
|
+
if rate_limit_threshold is not None:
|
22584
|
+
pulumi.set(__self__, "rate_limit_threshold", rate_limit_threshold)
|
22585
|
+
|
22586
|
+
@property
|
22587
|
+
@pulumi.getter(name="banDurationSec")
|
22588
|
+
def ban_duration_sec(self) -> Optional[pulumi.Input[int]]:
|
22589
|
+
"""
|
22590
|
+
Can only be specified if the action for the rule is "rate_based_ban".
|
22591
|
+
If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
|
22592
|
+
"""
|
22593
|
+
return pulumi.get(self, "ban_duration_sec")
|
22594
|
+
|
22595
|
+
@ban_duration_sec.setter
|
22596
|
+
def ban_duration_sec(self, value: Optional[pulumi.Input[int]]):
|
22597
|
+
pulumi.set(self, "ban_duration_sec", value)
|
22598
|
+
|
22599
|
+
@property
|
22600
|
+
@pulumi.getter(name="banThreshold")
|
22601
|
+
def ban_threshold(self) -> Optional[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs']]:
|
22602
|
+
"""
|
22603
|
+
Can only be specified if the action for the rule is "rate_based_ban".
|
22604
|
+
If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
|
22605
|
+
Structure is documented below.
|
22606
|
+
"""
|
22607
|
+
return pulumi.get(self, "ban_threshold")
|
22608
|
+
|
22609
|
+
@ban_threshold.setter
|
22610
|
+
def ban_threshold(self, value: Optional[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs']]):
|
22611
|
+
pulumi.set(self, "ban_threshold", value)
|
22612
|
+
|
22613
|
+
@property
|
22614
|
+
@pulumi.getter(name="conformAction")
|
22615
|
+
def conform_action(self) -> Optional[pulumi.Input[str]]:
|
22616
|
+
"""
|
22617
|
+
Action to take for requests that are under the configured rate limit threshold.
|
22618
|
+
Valid option is "allow" only.
|
22619
|
+
"""
|
22620
|
+
return pulumi.get(self, "conform_action")
|
22621
|
+
|
22622
|
+
@conform_action.setter
|
22623
|
+
def conform_action(self, value: Optional[pulumi.Input[str]]):
|
22624
|
+
pulumi.set(self, "conform_action", value)
|
22625
|
+
|
22626
|
+
@property
|
22627
|
+
@pulumi.getter(name="enforceOnKey")
|
22628
|
+
def enforce_on_key(self) -> Optional[pulumi.Input[str]]:
|
22629
|
+
"""
|
22630
|
+
Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22631
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKey" is not configured.
|
22632
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22633
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22634
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22635
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22636
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22637
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22638
|
+
* REGION_CODE: The country/region from which the request originates.
|
22639
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22640
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22641
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22642
|
+
"""
|
22643
|
+
return pulumi.get(self, "enforce_on_key")
|
22644
|
+
|
22645
|
+
@enforce_on_key.setter
|
22646
|
+
def enforce_on_key(self, value: Optional[pulumi.Input[str]]):
|
22647
|
+
pulumi.set(self, "enforce_on_key", value)
|
22648
|
+
|
22649
|
+
@property
|
22650
|
+
@pulumi.getter(name="enforceOnKeyConfigs")
|
22651
|
+
def enforce_on_key_configs(self) -> Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs']]]]:
|
22652
|
+
"""
|
22653
|
+
If specified, any combination of values of enforceOnKeyType/enforceOnKeyName is treated as the key on which ratelimit threshold/action is enforced.
|
22654
|
+
You can specify up to 3 enforceOnKeyConfigs.
|
22655
|
+
If enforceOnKeyConfigs is specified, enforceOnKey must not be specified.
|
22656
|
+
Structure is documented below.
|
22657
|
+
"""
|
22658
|
+
return pulumi.get(self, "enforce_on_key_configs")
|
22659
|
+
|
22660
|
+
@enforce_on_key_configs.setter
|
22661
|
+
def enforce_on_key_configs(self, value: Optional[pulumi.Input[Sequence[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs']]]]):
|
22662
|
+
pulumi.set(self, "enforce_on_key_configs", value)
|
22663
|
+
|
22664
|
+
@property
|
22665
|
+
@pulumi.getter(name="enforceOnKeyName")
|
22666
|
+
def enforce_on_key_name(self) -> Optional[pulumi.Input[str]]:
|
22667
|
+
"""
|
22668
|
+
Rate limit key name applicable only for the following key types:
|
22669
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22670
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22671
|
+
"""
|
22672
|
+
return pulumi.get(self, "enforce_on_key_name")
|
22673
|
+
|
22674
|
+
@enforce_on_key_name.setter
|
22675
|
+
def enforce_on_key_name(self, value: Optional[pulumi.Input[str]]):
|
22676
|
+
pulumi.set(self, "enforce_on_key_name", value)
|
22677
|
+
|
22678
|
+
@property
|
22679
|
+
@pulumi.getter(name="exceedAction")
|
22680
|
+
def exceed_action(self) -> Optional[pulumi.Input[str]]:
|
22681
|
+
"""
|
22682
|
+
Action to take for requests that are above the configured rate limit threshold, to deny with a specified HTTP response code.
|
22683
|
+
Valid options are deny(STATUS), where valid values for STATUS are 403, 404, 429, and 502.
|
22684
|
+
"""
|
22685
|
+
return pulumi.get(self, "exceed_action")
|
22686
|
+
|
22687
|
+
@exceed_action.setter
|
22688
|
+
def exceed_action(self, value: Optional[pulumi.Input[str]]):
|
22689
|
+
pulumi.set(self, "exceed_action", value)
|
22690
|
+
|
22691
|
+
@property
|
22692
|
+
@pulumi.getter(name="rateLimitThreshold")
|
22693
|
+
def rate_limit_threshold(self) -> Optional[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs']]:
|
22694
|
+
"""
|
22695
|
+
Threshold at which to begin ratelimiting.
|
22696
|
+
Structure is documented below.
|
22697
|
+
"""
|
22698
|
+
return pulumi.get(self, "rate_limit_threshold")
|
22699
|
+
|
22700
|
+
@rate_limit_threshold.setter
|
22701
|
+
def rate_limit_threshold(self, value: Optional[pulumi.Input['RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs']]):
|
22702
|
+
pulumi.set(self, "rate_limit_threshold", value)
|
22703
|
+
|
22704
|
+
|
22705
|
+
@pulumi.input_type
|
22706
|
+
class RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs:
|
22707
|
+
def __init__(__self__, *,
|
22708
|
+
count: Optional[pulumi.Input[int]] = None,
|
22709
|
+
interval_sec: Optional[pulumi.Input[int]] = None):
|
22710
|
+
"""
|
22711
|
+
:param pulumi.Input[int] count: Number of HTTP(S) requests for calculating the threshold.
|
22712
|
+
:param pulumi.Input[int] interval_sec: Interval over which the threshold is computed.
|
22713
|
+
"""
|
22714
|
+
if count is not None:
|
22715
|
+
pulumi.set(__self__, "count", count)
|
22716
|
+
if interval_sec is not None:
|
22717
|
+
pulumi.set(__self__, "interval_sec", interval_sec)
|
22718
|
+
|
22719
|
+
@property
|
22720
|
+
@pulumi.getter
|
22721
|
+
def count(self) -> Optional[pulumi.Input[int]]:
|
22722
|
+
"""
|
22723
|
+
Number of HTTP(S) requests for calculating the threshold.
|
22724
|
+
"""
|
22725
|
+
return pulumi.get(self, "count")
|
22726
|
+
|
22727
|
+
@count.setter
|
22728
|
+
def count(self, value: Optional[pulumi.Input[int]]):
|
22729
|
+
pulumi.set(self, "count", value)
|
22730
|
+
|
22731
|
+
@property
|
22732
|
+
@pulumi.getter(name="intervalSec")
|
22733
|
+
def interval_sec(self) -> Optional[pulumi.Input[int]]:
|
22734
|
+
"""
|
22735
|
+
Interval over which the threshold is computed.
|
22736
|
+
"""
|
22737
|
+
return pulumi.get(self, "interval_sec")
|
22738
|
+
|
22739
|
+
@interval_sec.setter
|
22740
|
+
def interval_sec(self, value: Optional[pulumi.Input[int]]):
|
22741
|
+
pulumi.set(self, "interval_sec", value)
|
22742
|
+
|
22743
|
+
|
22744
|
+
@pulumi.input_type
|
22745
|
+
class RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs:
|
22746
|
+
def __init__(__self__, *,
|
22747
|
+
enforce_on_key_name: Optional[pulumi.Input[str]] = None,
|
22748
|
+
enforce_on_key_type: Optional[pulumi.Input[str]] = None):
|
22749
|
+
"""
|
22750
|
+
:param pulumi.Input[str] enforce_on_key_name: Rate limit key name applicable only for the following key types:
|
22751
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22752
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22753
|
+
:param pulumi.Input[str] enforce_on_key_type: Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22754
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured.
|
22755
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22756
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22757
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22758
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22759
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22760
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22761
|
+
* REGION_CODE: The country/region from which the request originates.
|
22762
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22763
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22764
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22765
|
+
"""
|
22766
|
+
if enforce_on_key_name is not None:
|
22767
|
+
pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
|
22768
|
+
if enforce_on_key_type is not None:
|
22769
|
+
pulumi.set(__self__, "enforce_on_key_type", enforce_on_key_type)
|
22770
|
+
|
22771
|
+
@property
|
22772
|
+
@pulumi.getter(name="enforceOnKeyName")
|
22773
|
+
def enforce_on_key_name(self) -> Optional[pulumi.Input[str]]:
|
22774
|
+
"""
|
22775
|
+
Rate limit key name applicable only for the following key types:
|
22776
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22777
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22778
|
+
"""
|
22779
|
+
return pulumi.get(self, "enforce_on_key_name")
|
22780
|
+
|
22781
|
+
@enforce_on_key_name.setter
|
22782
|
+
def enforce_on_key_name(self, value: Optional[pulumi.Input[str]]):
|
22783
|
+
pulumi.set(self, "enforce_on_key_name", value)
|
22784
|
+
|
22785
|
+
@property
|
22786
|
+
@pulumi.getter(name="enforceOnKeyType")
|
22787
|
+
def enforce_on_key_type(self) -> Optional[pulumi.Input[str]]:
|
22788
|
+
"""
|
22789
|
+
Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22790
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured.
|
22791
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22792
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22793
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22794
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22795
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22796
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22797
|
+
* REGION_CODE: The country/region from which the request originates.
|
22798
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22799
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22800
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22801
|
+
"""
|
22802
|
+
return pulumi.get(self, "enforce_on_key_type")
|
22803
|
+
|
22804
|
+
@enforce_on_key_type.setter
|
22805
|
+
def enforce_on_key_type(self, value: Optional[pulumi.Input[str]]):
|
22806
|
+
pulumi.set(self, "enforce_on_key_type", value)
|
22807
|
+
|
22808
|
+
|
22809
|
+
@pulumi.input_type
|
22810
|
+
class RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs:
|
22811
|
+
def __init__(__self__, *,
|
22812
|
+
count: Optional[pulumi.Input[int]] = None,
|
22813
|
+
interval_sec: Optional[pulumi.Input[int]] = None):
|
22814
|
+
"""
|
22815
|
+
:param pulumi.Input[int] count: Number of HTTP(S) requests for calculating the threshold.
|
22816
|
+
:param pulumi.Input[int] interval_sec: Interval over which the threshold is computed.
|
22817
|
+
"""
|
22818
|
+
if count is not None:
|
22819
|
+
pulumi.set(__self__, "count", count)
|
22820
|
+
if interval_sec is not None:
|
22821
|
+
pulumi.set(__self__, "interval_sec", interval_sec)
|
22822
|
+
|
22823
|
+
@property
|
22824
|
+
@pulumi.getter
|
22825
|
+
def count(self) -> Optional[pulumi.Input[int]]:
|
22826
|
+
"""
|
22827
|
+
Number of HTTP(S) requests for calculating the threshold.
|
22828
|
+
"""
|
22829
|
+
return pulumi.get(self, "count")
|
22830
|
+
|
22831
|
+
@count.setter
|
22832
|
+
def count(self, value: Optional[pulumi.Input[int]]):
|
22833
|
+
pulumi.set(self, "count", value)
|
22834
|
+
|
22835
|
+
@property
|
22836
|
+
@pulumi.getter(name="intervalSec")
|
22837
|
+
def interval_sec(self) -> Optional[pulumi.Input[int]]:
|
22838
|
+
"""
|
22839
|
+
Interval over which the threshold is computed.
|
22840
|
+
"""
|
22841
|
+
return pulumi.get(self, "interval_sec")
|
22842
|
+
|
22843
|
+
@interval_sec.setter
|
22844
|
+
def interval_sec(self, value: Optional[pulumi.Input[int]]):
|
22845
|
+
pulumi.set(self, "interval_sec", value)
|
22846
|
+
|
22847
|
+
|
22159
22848
|
@pulumi.input_type
|
22160
22849
|
class RegionSecurityPolicyUserDefinedFieldArgs:
|
22161
22850
|
def __init__(__self__, *,
|