pulumi-gcp 7.23.0a1715621482__py3-none-any.whl → 7.23.0a1715808346__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_gcp/__init__.py +24 -0
- pulumi_gcp/bigquery/table.py +47 -0
- pulumi_gcp/bigtable/__init__.py +1 -0
- pulumi_gcp/bigtable/_inputs.py +101 -0
- pulumi_gcp/bigtable/authorized_view.py +440 -0
- pulumi_gcp/bigtable/outputs.py +119 -0
- pulumi_gcp/certificateauthority/certificate_template.py +70 -0
- pulumi_gcp/cloudbuildv2/repository.py +2 -2
- pulumi_gcp/clouddeploy/_inputs.py +96 -0
- pulumi_gcp/clouddeploy/custom_target_type.py +46 -0
- pulumi_gcp/clouddeploy/delivery_pipeline.py +7 -7
- pulumi_gcp/clouddeploy/outputs.py +96 -1
- pulumi_gcp/clouddeploy/target.py +54 -7
- pulumi_gcp/compute/_inputs.py +689 -0
- pulumi_gcp/compute/firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/outputs.py +684 -0
- pulumi_gcp/compute/region_network_firewall_policy_rule.py +125 -10
- pulumi_gcp/compute/region_security_policy_rule.py +230 -1
- pulumi_gcp/container/_inputs.py +67 -3
- pulumi_gcp/container/outputs.py +93 -4
- pulumi_gcp/dataflow/flex_template_job.py +7 -7
- pulumi_gcp/dataflow/job.py +7 -7
- pulumi_gcp/iam/_inputs.py +191 -2
- pulumi_gcp/iam/outputs.py +197 -2
- pulumi_gcp/iam/workforce_pool_provider.py +245 -0
- pulumi_gcp/integrationconnectors/__init__.py +1 -0
- pulumi_gcp/integrationconnectors/managed_zone.py +753 -0
- pulumi_gcp/networkconnectivity/__init__.py +1 -0
- pulumi_gcp/networkconnectivity/regional_endpoint.py +946 -0
- pulumi_gcp/networksecurity/firewall_endpoint.py +34 -0
- pulumi_gcp/networksecurity/firewall_endpoint_association.py +24 -0
- pulumi_gcp/networksecurity/security_profile.py +16 -0
- pulumi_gcp/networksecurity/security_profile_group.py +18 -0
- pulumi_gcp/networksecurity/tls_inspection_policy.py +16 -0
- pulumi_gcp/orgpolicy/policy.py +2 -2
- pulumi_gcp/pubsub/subscription.py +4 -4
- pulumi_gcp/pulumi-plugin.json +2 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/METADATA +1 -1
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/RECORD +42 -39
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/WHEEL +0 -0
- {pulumi_gcp-7.23.0a1715621482.dist-info → pulumi_gcp-7.23.0a1715808346.dist-info}/top_level.txt +0 -0
pulumi_gcp/compute/outputs.py
CHANGED
@@ -312,6 +312,16 @@ __all__ = [
|
|
312
312
|
'RegionSecurityPolicyRuleMatchConfig',
|
313
313
|
'RegionSecurityPolicyRuleNetworkMatch',
|
314
314
|
'RegionSecurityPolicyRuleNetworkMatchUserDefinedField',
|
315
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfig',
|
316
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusion',
|
317
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky',
|
318
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader',
|
319
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam',
|
320
|
+
'RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri',
|
321
|
+
'RegionSecurityPolicyRuleRateLimitOptions',
|
322
|
+
'RegionSecurityPolicyRuleRateLimitOptionsBanThreshold',
|
323
|
+
'RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig',
|
324
|
+
'RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold',
|
315
325
|
'RegionSecurityPolicyUserDefinedField',
|
316
326
|
'RegionUrlMapDefaultRouteAction',
|
317
327
|
'RegionUrlMapDefaultRouteActionCorsPolicy',
|
@@ -22284,6 +22294,680 @@ class RegionSecurityPolicyRuleNetworkMatchUserDefinedField(dict):
|
|
22284
22294
|
return pulumi.get(self, "values")
|
22285
22295
|
|
22286
22296
|
|
22297
|
+
@pulumi.output_type
|
22298
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfig(dict):
|
22299
|
+
def __init__(__self__, *,
|
22300
|
+
exclusions: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusion']] = None):
|
22301
|
+
"""
|
22302
|
+
:param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionArgs'] exclusions: An exclusion to apply during preconfigured WAF evaluation.
|
22303
|
+
Structure is documented below.
|
22304
|
+
"""
|
22305
|
+
if exclusions is not None:
|
22306
|
+
pulumi.set(__self__, "exclusions", exclusions)
|
22307
|
+
|
22308
|
+
@property
|
22309
|
+
@pulumi.getter
|
22310
|
+
def exclusions(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusion']]:
|
22311
|
+
"""
|
22312
|
+
An exclusion to apply during preconfigured WAF evaluation.
|
22313
|
+
Structure is documented below.
|
22314
|
+
"""
|
22315
|
+
return pulumi.get(self, "exclusions")
|
22316
|
+
|
22317
|
+
|
22318
|
+
@pulumi.output_type
|
22319
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusion(dict):
|
22320
|
+
@staticmethod
|
22321
|
+
def __key_warning(key: str):
|
22322
|
+
suggest = None
|
22323
|
+
if key == "targetRuleSet":
|
22324
|
+
suggest = "target_rule_set"
|
22325
|
+
elif key == "requestCookies":
|
22326
|
+
suggest = "request_cookies"
|
22327
|
+
elif key == "requestHeaders":
|
22328
|
+
suggest = "request_headers"
|
22329
|
+
elif key == "requestQueryParams":
|
22330
|
+
suggest = "request_query_params"
|
22331
|
+
elif key == "requestUris":
|
22332
|
+
suggest = "request_uris"
|
22333
|
+
elif key == "targetRuleIds":
|
22334
|
+
suggest = "target_rule_ids"
|
22335
|
+
|
22336
|
+
if suggest:
|
22337
|
+
pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRulePreconfiguredWafConfigExclusion. Access the value via the '{suggest}' property getter instead.")
|
22338
|
+
|
22339
|
+
def __getitem__(self, key: str) -> Any:
|
22340
|
+
RegionSecurityPolicyRulePreconfiguredWafConfigExclusion.__key_warning(key)
|
22341
|
+
return super().__getitem__(key)
|
22342
|
+
|
22343
|
+
def get(self, key: str, default = None) -> Any:
|
22344
|
+
RegionSecurityPolicyRulePreconfiguredWafConfigExclusion.__key_warning(key)
|
22345
|
+
return super().get(key, default)
|
22346
|
+
|
22347
|
+
def __init__(__self__, *,
|
22348
|
+
target_rule_set: str,
|
22349
|
+
request_cookies: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky']] = None,
|
22350
|
+
request_headers: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader']] = None,
|
22351
|
+
request_query_params: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam']] = None,
|
22352
|
+
request_uris: Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri']] = None,
|
22353
|
+
target_rule_ids: Optional[Sequence[str]] = None):
|
22354
|
+
"""
|
22355
|
+
:param str target_rule_set: Target WAF rule set to apply the preconfigured WAF exclusion.
|
22356
|
+
:param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCookyArgs'] request_cookies: Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22357
|
+
Structure is documented below.
|
22358
|
+
:param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeaderArgs'] request_headers: Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22359
|
+
Structure is documented below.
|
22360
|
+
:param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParamArgs'] request_query_params: Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22361
|
+
Note that the parameter can be in the query string or in the POST body.
|
22362
|
+
Structure is documented below.
|
22363
|
+
:param Sequence['RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUriArgs'] request_uris: Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation.
|
22364
|
+
When specifying this field, the query or fragment part should be excluded.
|
22365
|
+
Structure is documented below.
|
22366
|
+
:param Sequence[str] target_rule_ids: A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion.
|
22367
|
+
If omitted, it refers to all the rule IDs under the WAF rule set.
|
22368
|
+
"""
|
22369
|
+
pulumi.set(__self__, "target_rule_set", target_rule_set)
|
22370
|
+
if request_cookies is not None:
|
22371
|
+
pulumi.set(__self__, "request_cookies", request_cookies)
|
22372
|
+
if request_headers is not None:
|
22373
|
+
pulumi.set(__self__, "request_headers", request_headers)
|
22374
|
+
if request_query_params is not None:
|
22375
|
+
pulumi.set(__self__, "request_query_params", request_query_params)
|
22376
|
+
if request_uris is not None:
|
22377
|
+
pulumi.set(__self__, "request_uris", request_uris)
|
22378
|
+
if target_rule_ids is not None:
|
22379
|
+
pulumi.set(__self__, "target_rule_ids", target_rule_ids)
|
22380
|
+
|
22381
|
+
@property
|
22382
|
+
@pulumi.getter(name="targetRuleSet")
|
22383
|
+
def target_rule_set(self) -> str:
|
22384
|
+
"""
|
22385
|
+
Target WAF rule set to apply the preconfigured WAF exclusion.
|
22386
|
+
"""
|
22387
|
+
return pulumi.get(self, "target_rule_set")
|
22388
|
+
|
22389
|
+
@property
|
22390
|
+
@pulumi.getter(name="requestCookies")
|
22391
|
+
def request_cookies(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky']]:
|
22392
|
+
"""
|
22393
|
+
Request cookie whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22394
|
+
Structure is documented below.
|
22395
|
+
"""
|
22396
|
+
return pulumi.get(self, "request_cookies")
|
22397
|
+
|
22398
|
+
@property
|
22399
|
+
@pulumi.getter(name="requestHeaders")
|
22400
|
+
def request_headers(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader']]:
|
22401
|
+
"""
|
22402
|
+
Request header whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22403
|
+
Structure is documented below.
|
22404
|
+
"""
|
22405
|
+
return pulumi.get(self, "request_headers")
|
22406
|
+
|
22407
|
+
@property
|
22408
|
+
@pulumi.getter(name="requestQueryParams")
|
22409
|
+
def request_query_params(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam']]:
|
22410
|
+
"""
|
22411
|
+
Request query parameter whose value will be excluded from inspection during preconfigured WAF evaluation.
|
22412
|
+
Note that the parameter can be in the query string or in the POST body.
|
22413
|
+
Structure is documented below.
|
22414
|
+
"""
|
22415
|
+
return pulumi.get(self, "request_query_params")
|
22416
|
+
|
22417
|
+
@property
|
22418
|
+
@pulumi.getter(name="requestUris")
|
22419
|
+
def request_uris(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri']]:
|
22420
|
+
"""
|
22421
|
+
Request URI from the request line to be excluded from inspection during preconfigured WAF evaluation.
|
22422
|
+
When specifying this field, the query or fragment part should be excluded.
|
22423
|
+
Structure is documented below.
|
22424
|
+
"""
|
22425
|
+
return pulumi.get(self, "request_uris")
|
22426
|
+
|
22427
|
+
@property
|
22428
|
+
@pulumi.getter(name="targetRuleIds")
|
22429
|
+
def target_rule_ids(self) -> Optional[Sequence[str]]:
|
22430
|
+
"""
|
22431
|
+
A list of target rule IDs under the WAF rule set to apply the preconfigured WAF exclusion.
|
22432
|
+
If omitted, it refers to all the rule IDs under the WAF rule set.
|
22433
|
+
"""
|
22434
|
+
return pulumi.get(self, "target_rule_ids")
|
22435
|
+
|
22436
|
+
|
22437
|
+
@pulumi.output_type
|
22438
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestCooky(dict):
|
22439
|
+
def __init__(__self__, *,
|
22440
|
+
operator: str,
|
22441
|
+
value: Optional[str] = None):
|
22442
|
+
"""
|
22443
|
+
:param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22444
|
+
Available options:
|
22445
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22446
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22447
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22448
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22449
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22450
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22451
|
+
:param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22452
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22453
|
+
"""
|
22454
|
+
pulumi.set(__self__, "operator", operator)
|
22455
|
+
if value is not None:
|
22456
|
+
pulumi.set(__self__, "value", value)
|
22457
|
+
|
22458
|
+
@property
|
22459
|
+
@pulumi.getter
|
22460
|
+
def operator(self) -> str:
|
22461
|
+
"""
|
22462
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22463
|
+
Available options:
|
22464
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22465
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22466
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22467
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22468
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22469
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22470
|
+
"""
|
22471
|
+
return pulumi.get(self, "operator")
|
22472
|
+
|
22473
|
+
@property
|
22474
|
+
@pulumi.getter
|
22475
|
+
def value(self) -> Optional[str]:
|
22476
|
+
"""
|
22477
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22478
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22479
|
+
"""
|
22480
|
+
return pulumi.get(self, "value")
|
22481
|
+
|
22482
|
+
|
22483
|
+
@pulumi.output_type
|
22484
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestHeader(dict):
|
22485
|
+
def __init__(__self__, *,
|
22486
|
+
operator: str,
|
22487
|
+
value: Optional[str] = None):
|
22488
|
+
"""
|
22489
|
+
:param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22490
|
+
Available options:
|
22491
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22492
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22493
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22494
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22495
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22496
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22497
|
+
:param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22498
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22499
|
+
"""
|
22500
|
+
pulumi.set(__self__, "operator", operator)
|
22501
|
+
if value is not None:
|
22502
|
+
pulumi.set(__self__, "value", value)
|
22503
|
+
|
22504
|
+
@property
|
22505
|
+
@pulumi.getter
|
22506
|
+
def operator(self) -> str:
|
22507
|
+
"""
|
22508
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22509
|
+
Available options:
|
22510
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22511
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22512
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22513
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22514
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22515
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22516
|
+
"""
|
22517
|
+
return pulumi.get(self, "operator")
|
22518
|
+
|
22519
|
+
@property
|
22520
|
+
@pulumi.getter
|
22521
|
+
def value(self) -> Optional[str]:
|
22522
|
+
"""
|
22523
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22524
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22525
|
+
"""
|
22526
|
+
return pulumi.get(self, "value")
|
22527
|
+
|
22528
|
+
|
22529
|
+
@pulumi.output_type
|
22530
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestQueryParam(dict):
|
22531
|
+
def __init__(__self__, *,
|
22532
|
+
operator: str,
|
22533
|
+
value: Optional[str] = None):
|
22534
|
+
"""
|
22535
|
+
:param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22536
|
+
Available options:
|
22537
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22538
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22539
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22540
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22541
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22542
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22543
|
+
:param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22544
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22545
|
+
"""
|
22546
|
+
pulumi.set(__self__, "operator", operator)
|
22547
|
+
if value is not None:
|
22548
|
+
pulumi.set(__self__, "value", value)
|
22549
|
+
|
22550
|
+
@property
|
22551
|
+
@pulumi.getter
|
22552
|
+
def operator(self) -> str:
|
22553
|
+
"""
|
22554
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22555
|
+
Available options:
|
22556
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22557
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22558
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22559
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22560
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22561
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22562
|
+
"""
|
22563
|
+
return pulumi.get(self, "operator")
|
22564
|
+
|
22565
|
+
@property
|
22566
|
+
@pulumi.getter
|
22567
|
+
def value(self) -> Optional[str]:
|
22568
|
+
"""
|
22569
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22570
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22571
|
+
"""
|
22572
|
+
return pulumi.get(self, "value")
|
22573
|
+
|
22574
|
+
|
22575
|
+
@pulumi.output_type
|
22576
|
+
class RegionSecurityPolicyRulePreconfiguredWafConfigExclusionRequestUri(dict):
|
22577
|
+
def __init__(__self__, *,
|
22578
|
+
operator: str,
|
22579
|
+
value: Optional[str] = None):
|
22580
|
+
"""
|
22581
|
+
:param str operator: You can specify an exact match or a partial match by using a field operator and a field value.
|
22582
|
+
Available options:
|
22583
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22584
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22585
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22586
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22587
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22588
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22589
|
+
:param str value: A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22590
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22591
|
+
"""
|
22592
|
+
pulumi.set(__self__, "operator", operator)
|
22593
|
+
if value is not None:
|
22594
|
+
pulumi.set(__self__, "value", value)
|
22595
|
+
|
22596
|
+
@property
|
22597
|
+
@pulumi.getter
|
22598
|
+
def operator(self) -> str:
|
22599
|
+
"""
|
22600
|
+
You can specify an exact match or a partial match by using a field operator and a field value.
|
22601
|
+
Available options:
|
22602
|
+
EQUALS: The operator matches if the field value equals the specified value.
|
22603
|
+
STARTS_WITH: The operator matches if the field value starts with the specified value.
|
22604
|
+
ENDS_WITH: The operator matches if the field value ends with the specified value.
|
22605
|
+
CONTAINS: The operator matches if the field value contains the specified value.
|
22606
|
+
EQUALS_ANY: The operator matches if the field value is any value.
|
22607
|
+
Possible values are: `CONTAINS`, `ENDS_WITH`, `EQUALS`, `EQUALS_ANY`, `STARTS_WITH`.
|
22608
|
+
"""
|
22609
|
+
return pulumi.get(self, "operator")
|
22610
|
+
|
22611
|
+
@property
|
22612
|
+
@pulumi.getter
|
22613
|
+
def value(self) -> Optional[str]:
|
22614
|
+
"""
|
22615
|
+
A request field matching the specified value will be excluded from inspection during preconfigured WAF evaluation.
|
22616
|
+
The field value must be given if the field operator is not EQUALS_ANY, and cannot be given if the field operator is EQUALS_ANY.
|
22617
|
+
"""
|
22618
|
+
return pulumi.get(self, "value")
|
22619
|
+
|
22620
|
+
|
22621
|
+
@pulumi.output_type
|
22622
|
+
class RegionSecurityPolicyRuleRateLimitOptions(dict):
|
22623
|
+
@staticmethod
|
22624
|
+
def __key_warning(key: str):
|
22625
|
+
suggest = None
|
22626
|
+
if key == "banDurationSec":
|
22627
|
+
suggest = "ban_duration_sec"
|
22628
|
+
elif key == "banThreshold":
|
22629
|
+
suggest = "ban_threshold"
|
22630
|
+
elif key == "conformAction":
|
22631
|
+
suggest = "conform_action"
|
22632
|
+
elif key == "enforceOnKey":
|
22633
|
+
suggest = "enforce_on_key"
|
22634
|
+
elif key == "enforceOnKeyConfigs":
|
22635
|
+
suggest = "enforce_on_key_configs"
|
22636
|
+
elif key == "enforceOnKeyName":
|
22637
|
+
suggest = "enforce_on_key_name"
|
22638
|
+
elif key == "exceedAction":
|
22639
|
+
suggest = "exceed_action"
|
22640
|
+
elif key == "rateLimitThreshold":
|
22641
|
+
suggest = "rate_limit_threshold"
|
22642
|
+
|
22643
|
+
if suggest:
|
22644
|
+
pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptions. Access the value via the '{suggest}' property getter instead.")
|
22645
|
+
|
22646
|
+
def __getitem__(self, key: str) -> Any:
|
22647
|
+
RegionSecurityPolicyRuleRateLimitOptions.__key_warning(key)
|
22648
|
+
return super().__getitem__(key)
|
22649
|
+
|
22650
|
+
def get(self, key: str, default = None) -> Any:
|
22651
|
+
RegionSecurityPolicyRuleRateLimitOptions.__key_warning(key)
|
22652
|
+
return super().get(key, default)
|
22653
|
+
|
22654
|
+
def __init__(__self__, *,
|
22655
|
+
ban_duration_sec: Optional[int] = None,
|
22656
|
+
ban_threshold: Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsBanThreshold'] = None,
|
22657
|
+
conform_action: Optional[str] = None,
|
22658
|
+
enforce_on_key: Optional[str] = None,
|
22659
|
+
enforce_on_key_configs: Optional[Sequence['outputs.RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig']] = None,
|
22660
|
+
enforce_on_key_name: Optional[str] = None,
|
22661
|
+
exceed_action: Optional[str] = None,
|
22662
|
+
rate_limit_threshold: Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold'] = None):
|
22663
|
+
"""
|
22664
|
+
:param int ban_duration_sec: Can only be specified if the action for the rule is "rate_based_ban".
|
22665
|
+
If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
|
22666
|
+
:param 'RegionSecurityPolicyRuleRateLimitOptionsBanThresholdArgs' ban_threshold: Can only be specified if the action for the rule is "rate_based_ban".
|
22667
|
+
If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
|
22668
|
+
Structure is documented below.
|
22669
|
+
:param str conform_action: Action to take for requests that are under the configured rate limit threshold.
|
22670
|
+
Valid option is "allow" only.
|
22671
|
+
:param str enforce_on_key: Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22672
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKey" is not configured.
|
22673
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22674
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22675
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22676
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22677
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22678
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22679
|
+
* REGION_CODE: The country/region from which the request originates.
|
22680
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22681
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22682
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22683
|
+
:param Sequence['RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfigArgs'] enforce_on_key_configs: If specified, any combination of values of enforceOnKeyType/enforceOnKeyName is treated as the key on which ratelimit threshold/action is enforced.
|
22684
|
+
You can specify up to 3 enforceOnKeyConfigs.
|
22685
|
+
If enforceOnKeyConfigs is specified, enforceOnKey must not be specified.
|
22686
|
+
Structure is documented below.
|
22687
|
+
:param str enforce_on_key_name: Rate limit key name applicable only for the following key types:
|
22688
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22689
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22690
|
+
:param str exceed_action: Action to take for requests that are above the configured rate limit threshold, to deny with a specified HTTP response code.
|
22691
|
+
Valid options are deny(STATUS), where valid values for STATUS are 403, 404, 429, and 502.
|
22692
|
+
:param 'RegionSecurityPolicyRuleRateLimitOptionsRateLimitThresholdArgs' rate_limit_threshold: Threshold at which to begin ratelimiting.
|
22693
|
+
Structure is documented below.
|
22694
|
+
"""
|
22695
|
+
if ban_duration_sec is not None:
|
22696
|
+
pulumi.set(__self__, "ban_duration_sec", ban_duration_sec)
|
22697
|
+
if ban_threshold is not None:
|
22698
|
+
pulumi.set(__self__, "ban_threshold", ban_threshold)
|
22699
|
+
if conform_action is not None:
|
22700
|
+
pulumi.set(__self__, "conform_action", conform_action)
|
22701
|
+
if enforce_on_key is not None:
|
22702
|
+
pulumi.set(__self__, "enforce_on_key", enforce_on_key)
|
22703
|
+
if enforce_on_key_configs is not None:
|
22704
|
+
pulumi.set(__self__, "enforce_on_key_configs", enforce_on_key_configs)
|
22705
|
+
if enforce_on_key_name is not None:
|
22706
|
+
pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
|
22707
|
+
if exceed_action is not None:
|
22708
|
+
pulumi.set(__self__, "exceed_action", exceed_action)
|
22709
|
+
if rate_limit_threshold is not None:
|
22710
|
+
pulumi.set(__self__, "rate_limit_threshold", rate_limit_threshold)
|
22711
|
+
|
22712
|
+
@property
|
22713
|
+
@pulumi.getter(name="banDurationSec")
|
22714
|
+
def ban_duration_sec(self) -> Optional[int]:
|
22715
|
+
"""
|
22716
|
+
Can only be specified if the action for the rule is "rate_based_ban".
|
22717
|
+
If specified, determines the time (in seconds) the traffic will continue to be banned by the rate limit after the rate falls below the threshold.
|
22718
|
+
"""
|
22719
|
+
return pulumi.get(self, "ban_duration_sec")
|
22720
|
+
|
22721
|
+
@property
|
22722
|
+
@pulumi.getter(name="banThreshold")
|
22723
|
+
def ban_threshold(self) -> Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsBanThreshold']:
|
22724
|
+
"""
|
22725
|
+
Can only be specified if the action for the rule is "rate_based_ban".
|
22726
|
+
If specified, the key will be banned for the configured 'banDurationSec' when the number of requests that exceed the 'rateLimitThreshold' also exceed this 'banThreshold'.
|
22727
|
+
Structure is documented below.
|
22728
|
+
"""
|
22729
|
+
return pulumi.get(self, "ban_threshold")
|
22730
|
+
|
22731
|
+
@property
|
22732
|
+
@pulumi.getter(name="conformAction")
|
22733
|
+
def conform_action(self) -> Optional[str]:
|
22734
|
+
"""
|
22735
|
+
Action to take for requests that are under the configured rate limit threshold.
|
22736
|
+
Valid option is "allow" only.
|
22737
|
+
"""
|
22738
|
+
return pulumi.get(self, "conform_action")
|
22739
|
+
|
22740
|
+
@property
|
22741
|
+
@pulumi.getter(name="enforceOnKey")
|
22742
|
+
def enforce_on_key(self) -> Optional[str]:
|
22743
|
+
"""
|
22744
|
+
Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22745
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKey" is not configured.
|
22746
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22747
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22748
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22749
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22750
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22751
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22752
|
+
* REGION_CODE: The country/region from which the request originates.
|
22753
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22754
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22755
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22756
|
+
"""
|
22757
|
+
return pulumi.get(self, "enforce_on_key")
|
22758
|
+
|
22759
|
+
@property
|
22760
|
+
@pulumi.getter(name="enforceOnKeyConfigs")
|
22761
|
+
def enforce_on_key_configs(self) -> Optional[Sequence['outputs.RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig']]:
|
22762
|
+
"""
|
22763
|
+
If specified, any combination of values of enforceOnKeyType/enforceOnKeyName is treated as the key on which ratelimit threshold/action is enforced.
|
22764
|
+
You can specify up to 3 enforceOnKeyConfigs.
|
22765
|
+
If enforceOnKeyConfigs is specified, enforceOnKey must not be specified.
|
22766
|
+
Structure is documented below.
|
22767
|
+
"""
|
22768
|
+
return pulumi.get(self, "enforce_on_key_configs")
|
22769
|
+
|
22770
|
+
@property
|
22771
|
+
@pulumi.getter(name="enforceOnKeyName")
|
22772
|
+
def enforce_on_key_name(self) -> Optional[str]:
|
22773
|
+
"""
|
22774
|
+
Rate limit key name applicable only for the following key types:
|
22775
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22776
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22777
|
+
"""
|
22778
|
+
return pulumi.get(self, "enforce_on_key_name")
|
22779
|
+
|
22780
|
+
@property
|
22781
|
+
@pulumi.getter(name="exceedAction")
|
22782
|
+
def exceed_action(self) -> Optional[str]:
|
22783
|
+
"""
|
22784
|
+
Action to take for requests that are above the configured rate limit threshold, to deny with a specified HTTP response code.
|
22785
|
+
Valid options are deny(STATUS), where valid values for STATUS are 403, 404, 429, and 502.
|
22786
|
+
"""
|
22787
|
+
return pulumi.get(self, "exceed_action")
|
22788
|
+
|
22789
|
+
@property
|
22790
|
+
@pulumi.getter(name="rateLimitThreshold")
|
22791
|
+
def rate_limit_threshold(self) -> Optional['outputs.RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold']:
|
22792
|
+
"""
|
22793
|
+
Threshold at which to begin ratelimiting.
|
22794
|
+
Structure is documented below.
|
22795
|
+
"""
|
22796
|
+
return pulumi.get(self, "rate_limit_threshold")
|
22797
|
+
|
22798
|
+
|
22799
|
+
@pulumi.output_type
|
22800
|
+
class RegionSecurityPolicyRuleRateLimitOptionsBanThreshold(dict):
|
22801
|
+
@staticmethod
|
22802
|
+
def __key_warning(key: str):
|
22803
|
+
suggest = None
|
22804
|
+
if key == "intervalSec":
|
22805
|
+
suggest = "interval_sec"
|
22806
|
+
|
22807
|
+
if suggest:
|
22808
|
+
pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptionsBanThreshold. Access the value via the '{suggest}' property getter instead.")
|
22809
|
+
|
22810
|
+
def __getitem__(self, key: str) -> Any:
|
22811
|
+
RegionSecurityPolicyRuleRateLimitOptionsBanThreshold.__key_warning(key)
|
22812
|
+
return super().__getitem__(key)
|
22813
|
+
|
22814
|
+
def get(self, key: str, default = None) -> Any:
|
22815
|
+
RegionSecurityPolicyRuleRateLimitOptionsBanThreshold.__key_warning(key)
|
22816
|
+
return super().get(key, default)
|
22817
|
+
|
22818
|
+
def __init__(__self__, *,
|
22819
|
+
count: Optional[int] = None,
|
22820
|
+
interval_sec: Optional[int] = None):
|
22821
|
+
"""
|
22822
|
+
:param int count: Number of HTTP(S) requests for calculating the threshold.
|
22823
|
+
:param int interval_sec: Interval over which the threshold is computed.
|
22824
|
+
"""
|
22825
|
+
if count is not None:
|
22826
|
+
pulumi.set(__self__, "count", count)
|
22827
|
+
if interval_sec is not None:
|
22828
|
+
pulumi.set(__self__, "interval_sec", interval_sec)
|
22829
|
+
|
22830
|
+
@property
|
22831
|
+
@pulumi.getter
|
22832
|
+
def count(self) -> Optional[int]:
|
22833
|
+
"""
|
22834
|
+
Number of HTTP(S) requests for calculating the threshold.
|
22835
|
+
"""
|
22836
|
+
return pulumi.get(self, "count")
|
22837
|
+
|
22838
|
+
@property
|
22839
|
+
@pulumi.getter(name="intervalSec")
|
22840
|
+
def interval_sec(self) -> Optional[int]:
|
22841
|
+
"""
|
22842
|
+
Interval over which the threshold is computed.
|
22843
|
+
"""
|
22844
|
+
return pulumi.get(self, "interval_sec")
|
22845
|
+
|
22846
|
+
|
22847
|
+
@pulumi.output_type
|
22848
|
+
class RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig(dict):
|
22849
|
+
@staticmethod
|
22850
|
+
def __key_warning(key: str):
|
22851
|
+
suggest = None
|
22852
|
+
if key == "enforceOnKeyName":
|
22853
|
+
suggest = "enforce_on_key_name"
|
22854
|
+
elif key == "enforceOnKeyType":
|
22855
|
+
suggest = "enforce_on_key_type"
|
22856
|
+
|
22857
|
+
if suggest:
|
22858
|
+
pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig. Access the value via the '{suggest}' property getter instead.")
|
22859
|
+
|
22860
|
+
def __getitem__(self, key: str) -> Any:
|
22861
|
+
RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig.__key_warning(key)
|
22862
|
+
return super().__getitem__(key)
|
22863
|
+
|
22864
|
+
def get(self, key: str, default = None) -> Any:
|
22865
|
+
RegionSecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig.__key_warning(key)
|
22866
|
+
return super().get(key, default)
|
22867
|
+
|
22868
|
+
def __init__(__self__, *,
|
22869
|
+
enforce_on_key_name: Optional[str] = None,
|
22870
|
+
enforce_on_key_type: Optional[str] = None):
|
22871
|
+
"""
|
22872
|
+
:param str enforce_on_key_name: Rate limit key name applicable only for the following key types:
|
22873
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22874
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22875
|
+
:param str enforce_on_key_type: Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22876
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured.
|
22877
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22878
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22879
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22880
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22881
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22882
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22883
|
+
* REGION_CODE: The country/region from which the request originates.
|
22884
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22885
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22886
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22887
|
+
"""
|
22888
|
+
if enforce_on_key_name is not None:
|
22889
|
+
pulumi.set(__self__, "enforce_on_key_name", enforce_on_key_name)
|
22890
|
+
if enforce_on_key_type is not None:
|
22891
|
+
pulumi.set(__self__, "enforce_on_key_type", enforce_on_key_type)
|
22892
|
+
|
22893
|
+
@property
|
22894
|
+
@pulumi.getter(name="enforceOnKeyName")
|
22895
|
+
def enforce_on_key_name(self) -> Optional[str]:
|
22896
|
+
"""
|
22897
|
+
Rate limit key name applicable only for the following key types:
|
22898
|
+
HTTP_HEADER -- Name of the HTTP header whose value is taken as the key value.
|
22899
|
+
HTTP_COOKIE -- Name of the HTTP cookie whose value is taken as the key value.
|
22900
|
+
"""
|
22901
|
+
return pulumi.get(self, "enforce_on_key_name")
|
22902
|
+
|
22903
|
+
@property
|
22904
|
+
@pulumi.getter(name="enforceOnKeyType")
|
22905
|
+
def enforce_on_key_type(self) -> Optional[str]:
|
22906
|
+
"""
|
22907
|
+
Determines the key to enforce the rateLimitThreshold on. Possible values are:
|
22908
|
+
* ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if "enforceOnKeyConfigs" is not configured.
|
22909
|
+
* IP: The source IP address of the request is the key. Each IP has this limit enforced separately.
|
22910
|
+
* HTTP_HEADER: The value of the HTTP header whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults to ALL.
|
22911
|
+
* XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.
|
22912
|
+
* HTTP_COOKIE: The value of the HTTP cookie whose name is configured under "enforceOnKeyName". The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults to ALL.
|
22913
|
+
* HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.
|
22914
|
+
* SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.
|
22915
|
+
* REGION_CODE: The country/region from which the request originates.
|
22916
|
+
* TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.
|
22917
|
+
* USER_IP: The IP address of the originating client, which is resolved based on "userIpRequestHeaders" configured with the security policy. If there is no "userIpRequestHeaders" configuration or an IP address cannot be resolved from it, the key type defaults to IP.
|
22918
|
+
Possible values are: `ALL`, `IP`, `HTTP_HEADER`, `XFF_IP`, `HTTP_COOKIE`, `HTTP_PATH`, `SNI`, `REGION_CODE`, `TLS_JA3_FINGERPRINT`, `USER_IP`.
|
22919
|
+
"""
|
22920
|
+
return pulumi.get(self, "enforce_on_key_type")
|
22921
|
+
|
22922
|
+
|
22923
|
+
@pulumi.output_type
|
22924
|
+
class RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold(dict):
|
22925
|
+
@staticmethod
|
22926
|
+
def __key_warning(key: str):
|
22927
|
+
suggest = None
|
22928
|
+
if key == "intervalSec":
|
22929
|
+
suggest = "interval_sec"
|
22930
|
+
|
22931
|
+
if suggest:
|
22932
|
+
pulumi.log.warn(f"Key '{key}' not found in RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold. Access the value via the '{suggest}' property getter instead.")
|
22933
|
+
|
22934
|
+
def __getitem__(self, key: str) -> Any:
|
22935
|
+
RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold.__key_warning(key)
|
22936
|
+
return super().__getitem__(key)
|
22937
|
+
|
22938
|
+
def get(self, key: str, default = None) -> Any:
|
22939
|
+
RegionSecurityPolicyRuleRateLimitOptionsRateLimitThreshold.__key_warning(key)
|
22940
|
+
return super().get(key, default)
|
22941
|
+
|
22942
|
+
def __init__(__self__, *,
|
22943
|
+
count: Optional[int] = None,
|
22944
|
+
interval_sec: Optional[int] = None):
|
22945
|
+
"""
|
22946
|
+
:param int count: Number of HTTP(S) requests for calculating the threshold.
|
22947
|
+
:param int interval_sec: Interval over which the threshold is computed.
|
22948
|
+
"""
|
22949
|
+
if count is not None:
|
22950
|
+
pulumi.set(__self__, "count", count)
|
22951
|
+
if interval_sec is not None:
|
22952
|
+
pulumi.set(__self__, "interval_sec", interval_sec)
|
22953
|
+
|
22954
|
+
@property
|
22955
|
+
@pulumi.getter
|
22956
|
+
def count(self) -> Optional[int]:
|
22957
|
+
"""
|
22958
|
+
Number of HTTP(S) requests for calculating the threshold.
|
22959
|
+
"""
|
22960
|
+
return pulumi.get(self, "count")
|
22961
|
+
|
22962
|
+
@property
|
22963
|
+
@pulumi.getter(name="intervalSec")
|
22964
|
+
def interval_sec(self) -> Optional[int]:
|
22965
|
+
"""
|
22966
|
+
Interval over which the threshold is computed.
|
22967
|
+
"""
|
22968
|
+
return pulumi.get(self, "interval_sec")
|
22969
|
+
|
22970
|
+
|
22287
22971
|
@pulumi.output_type
|
22288
22972
|
class RegionSecurityPolicyUserDefinedField(dict):
|
22289
22973
|
def __init__(__self__, *,
|