pulumi-oci 1.37.0__py3-none-any.whl → 1.37.0a1715927489__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- pulumi_oci/__init__.py +0 -40
- pulumi_oci/adm/_inputs.py +6 -6
- pulumi_oci/adm/outputs.py +6 -6
- pulumi_oci/aianomalydetection/_inputs.py +8 -10
- pulumi_oci/aianomalydetection/outputs.py +8 -22
- pulumi_oci/aidocument/_inputs.py +18 -22
- pulumi_oci/aidocument/outputs.py +18 -36
- pulumi_oci/ailanguage/_inputs.py +20 -4
- pulumi_oci/ailanguage/model.py +4 -4
- pulumi_oci/ailanguage/outputs.py +20 -4
- pulumi_oci/aivision/_inputs.py +16 -0
- pulumi_oci/aivision/outputs.py +16 -0
- pulumi_oci/analytics/_inputs.py +2 -2
- pulumi_oci/analytics/outputs.py +2 -2
- pulumi_oci/apigateway/_inputs.py +414 -206
- pulumi_oci/apigateway/outputs.py +414 -206
- pulumi_oci/apmconfig/_inputs.py +4 -4
- pulumi_oci/apmconfig/config.py +7 -7
- pulumi_oci/apmconfig/outputs.py +4 -4
- pulumi_oci/apmsynthetics/_inputs.py +26 -18
- pulumi_oci/apmsynthetics/config.py +7 -7
- pulumi_oci/apmsynthetics/outputs.py +26 -18
- pulumi_oci/autoscaling/_inputs.py +16 -14
- pulumi_oci/autoscaling/auto_scaling_configuration.py +7 -20
- pulumi_oci/autoscaling/outputs.py +16 -14
- pulumi_oci/bigdataservice/_inputs.py +44 -32
- pulumi_oci/bigdataservice/bds_instance.py +4 -4
- pulumi_oci/bigdataservice/outputs.py +44 -32
- pulumi_oci/certificatesmanagement/_inputs.py +16 -16
- pulumi_oci/certificatesmanagement/certificate.py +16 -16
- pulumi_oci/certificatesmanagement/certificate_authority.py +8 -8
- pulumi_oci/certificatesmanagement/outputs.py +16 -16
- pulumi_oci/cloudbridge/_inputs.py +18 -18
- pulumi_oci/cloudbridge/outputs.py +18 -18
- pulumi_oci/cloudguard/__init__.py +0 -9
- pulumi_oci/cloudguard/_inputs.py +488 -1066
- pulumi_oci/cloudguard/cloud_guard_configuration.py +57 -25
- pulumi_oci/cloudguard/cloud_guard_data_source.py +38 -54
- pulumi_oci/cloudguard/data_mask_rule.py +62 -62
- pulumi_oci/cloudguard/detector_recipe.py +53 -95
- pulumi_oci/cloudguard/get_cloud_guard_configuration.py +7 -9
- pulumi_oci/cloudguard/get_data_mask_rule.py +14 -14
- pulumi_oci/cloudguard/get_data_mask_rules.py +17 -17
- pulumi_oci/cloudguard/get_data_source.py +10 -10
- pulumi_oci/cloudguard/get_data_source_events.py +7 -11
- pulumi_oci/cloudguard/get_data_sources.py +20 -24
- pulumi_oci/cloudguard/get_detector_recipe.py +15 -28
- pulumi_oci/cloudguard/get_detector_recipes.py +13 -13
- pulumi_oci/cloudguard/get_guard_target.py +14 -14
- pulumi_oci/cloudguard/get_guard_targets.py +17 -19
- pulumi_oci/cloudguard/get_managed_list.py +14 -14
- pulumi_oci/cloudguard/get_managed_lists.py +16 -16
- pulumi_oci/cloudguard/get_problem_entities.py +3 -5
- pulumi_oci/cloudguard/get_responder_recipe.py +13 -13
- pulumi_oci/cloudguard/get_responder_recipes.py +13 -15
- pulumi_oci/cloudguard/get_security_policies.py +12 -14
- pulumi_oci/cloudguard/get_security_policy.py +8 -12
- pulumi_oci/cloudguard/get_security_recipe.py +9 -9
- pulumi_oci/cloudguard/get_security_recipes.py +12 -14
- pulumi_oci/cloudguard/get_security_zone.py +8 -8
- pulumi_oci/cloudguard/get_security_zones.py +15 -17
- pulumi_oci/cloudguard/managed_list.py +57 -57
- pulumi_oci/cloudguard/outputs.py +1808 -3493
- pulumi_oci/cloudguard/responder_recipe.py +39 -41
- pulumi_oci/cloudguard/security_recipe.py +27 -43
- pulumi_oci/cloudguard/security_zone.py +20 -22
- pulumi_oci/cloudguard/target.py +54 -54
- pulumi_oci/cloudmigrations/_inputs.py +496 -222
- pulumi_oci/cloudmigrations/outputs.py +498 -224
- pulumi_oci/cloudmigrations/target_asset.py +15 -15
- pulumi_oci/clusterplacementgroups/_inputs.py +2 -2
- pulumi_oci/clusterplacementgroups/outputs.py +2 -2
- pulumi_oci/computecloud/at_customer_ccc_upgrade_schedule.py +7 -7
- pulumi_oci/containerengine/_inputs.py +22 -22
- pulumi_oci/containerengine/container_instance.py +21 -21
- pulumi_oci/containerengine/outputs.py +22 -22
- pulumi_oci/containerengine/virtual_node_pool.py +35 -7
- pulumi_oci/core/_inputs.py +668 -402
- pulumi_oci/core/boot_volume.py +7 -7
- pulumi_oci/core/cluster_network.py +22 -22
- pulumi_oci/core/cross_connect_group.py +20 -4
- pulumi_oci/core/drg_route_table_route_rule.py +0 -7
- pulumi_oci/core/get_image.py +0 -4
- pulumi_oci/core/get_instance.py +0 -4
- pulumi_oci/core/get_public_ip.py +0 -4
- pulumi_oci/core/get_public_ips.py +0 -8
- pulumi_oci/core/get_vtap.py +0 -2
- pulumi_oci/core/get_vtaps.py +0 -2
- pulumi_oci/core/image.py +0 -56
- pulumi_oci/core/instance.py +48 -48
- pulumi_oci/core/instance_configuration.py +28 -70
- pulumi_oci/core/instance_pool.py +7 -7
- pulumi_oci/core/ipsec_connection_tunnel_management.py +8 -8
- pulumi_oci/core/network_security_group_security_rule.py +105 -28
- pulumi_oci/core/outputs.py +668 -748
- pulumi_oci/core/public_ip.py +0 -8
- pulumi_oci/core/vnic_attachment.py +24 -8
- pulumi_oci/core/volume.py +7 -7
- pulumi_oci/core/volume_group.py +7 -7
- pulumi_oci/core/vtap.py +0 -14
- pulumi_oci/database/_inputs.py +220 -188
- pulumi_oci/database/autonomous_database.py +7 -21
- pulumi_oci/database/autonomous_database_wallet.py +0 -28
- pulumi_oci/database/backup_destination.py +11 -11
- pulumi_oci/database/cloud_database_management.py +0 -14
- pulumi_oci/database/database.py +44 -28
- pulumi_oci/database/database_upgrade.py +4 -4
- pulumi_oci/database/db_home.py +13 -0
- pulumi_oci/database/get_autonomous_database_wallet.py +0 -8
- pulumi_oci/database/outputs.py +220 -188
- pulumi_oci/database/vm_cluster_network.py +4 -4
- pulumi_oci/databasemanagement/_inputs.py +8 -8
- pulumi_oci/databasemanagement/outputs.py +8 -8
- pulumi_oci/databasemigration/_inputs.py +34 -34
- pulumi_oci/databasemigration/connection.py +7 -7
- pulumi_oci/databasemigration/migration.py +7 -7
- pulumi_oci/databasemigration/outputs.py +34 -34
- pulumi_oci/databasetools/_inputs.py +36 -12
- pulumi_oci/databasetools/database_tools_connection.py +4 -4
- pulumi_oci/databasetools/database_tools_private_endpoint.py +4 -4
- pulumi_oci/databasetools/outputs.py +36 -12
- pulumi_oci/dataintegration/_inputs.py +330 -318
- pulumi_oci/dataintegration/outputs.py +330 -318
- pulumi_oci/dataintegration/workspace_application.py +7 -7
- pulumi_oci/dataintegration/workspace_application_patch.py +7 -7
- pulumi_oci/dataintegration/workspace_application_schedule.py +11 -11
- pulumi_oci/dataintegration/workspace_application_task_schedule.py +29 -29
- pulumi_oci/dataintegration/workspace_folder.py +7 -7
- pulumi_oci/dataintegration/workspace_project.py +7 -7
- pulumi_oci/dataintegration/workspace_task.py +47 -47
- pulumi_oci/datalabellingservice/_inputs.py +10 -10
- pulumi_oci/datalabellingservice/outputs.py +10 -10
- pulumi_oci/datasafe/__init__.py +0 -2
- pulumi_oci/datasafe/_inputs.py +80 -72
- pulumi_oci/datasafe/library_masing_format.py +7 -7
- pulumi_oci/datasafe/masking_policies_masking_column.py +7 -7
- pulumi_oci/datasafe/masking_policy.py +7 -7
- pulumi_oci/datasafe/outputs.py +80 -72
- pulumi_oci/datasafe/report_definition.py +24 -8
- pulumi_oci/datasafe/target_database.py +21 -21
- pulumi_oci/datascience/_inputs.py +65 -337
- pulumi_oci/datascience/get_job_run.py +1 -11
- pulumi_oci/datascience/get_model_deployment.py +1 -11
- pulumi_oci/datascience/get_pipeline.py +0 -3
- pulumi_oci/datascience/get_pipeline_run.py +1 -14
- pulumi_oci/datascience/job_run.py +3 -52
- pulumi_oci/datascience/model_deployment.py +2 -51
- pulumi_oci/datascience/outputs.py +94 -757
- pulumi_oci/datascience/pipeline.py +14 -34
- pulumi_oci/datascience/pipeline_run.py +0 -65
- pulumi_oci/devops/_inputs.py +462 -80
- pulumi_oci/devops/deploy_stage.py +4 -4
- pulumi_oci/devops/deployment.py +7 -7
- pulumi_oci/devops/outputs.py +1143 -210
- pulumi_oci/disasterrecovery/_inputs.py +6 -6
- pulumi_oci/disasterrecovery/dr_plan_execution.py +4 -4
- pulumi_oci/disasterrecovery/dr_protection_group.py +4 -4
- pulumi_oci/disasterrecovery/outputs.py +6 -6
- pulumi_oci/dns/_inputs.py +8 -20
- pulumi_oci/dns/outputs.py +8 -42
- pulumi_oci/dns/rrset.py +7 -7
- pulumi_oci/dns/steering_policy.py +0 -42
- pulumi_oci/events/_inputs.py +12 -4
- pulumi_oci/events/outputs.py +12 -4
- pulumi_oci/events/rule.py +7 -7
- pulumi_oci/functions/_inputs.py +2 -2
- pulumi_oci/functions/outputs.py +2 -2
- pulumi_oci/goldengate/_inputs.py +4 -2
- pulumi_oci/goldengate/outputs.py +4 -2
- pulumi_oci/identity/_inputs.py +5954 -4860
- pulumi_oci/identity/domains_api_key.py +70 -70
- pulumi_oci/identity/domains_app.py +140 -119
- pulumi_oci/identity/domains_auth_token.py +21 -21
- pulumi_oci/identity/domains_cloud_gate.py +49 -49
- pulumi_oci/identity/domains_customer_secret_key.py +21 -21
- pulumi_oci/identity/domains_my_api_key.py +70 -70
- pulumi_oci/identity/domains_my_auth_token.py +21 -21
- pulumi_oci/identity/domains_my_customer_secret_key.py +21 -21
- pulumi_oci/identity/domains_my_oauth2client_credential.py +70 -49
- pulumi_oci/identity/domains_my_smtp_credential.py +21 -21
- pulumi_oci/identity/domains_my_support_account.py +21 -21
- pulumi_oci/identity/domains_my_user_db_credential.py +41 -37
- pulumi_oci/identity/domains_oauth2client_credential.py +70 -49
- pulumi_oci/identity/domains_policy.py +49 -35
- pulumi_oci/identity/domains_rule.py +21 -28
- pulumi_oci/identity/domains_setting.py +21 -35
- pulumi_oci/identity/domains_smtp_credential.py +21 -21
- pulumi_oci/identity/domains_user.py +175 -189
- pulumi_oci/identity/domains_user_db_credential.py +41 -37
- pulumi_oci/identity/outputs.py +6007 -4913
- pulumi_oci/integration/_inputs.py +0 -4
- pulumi_oci/integration/outputs.py +4 -16
- pulumi_oci/jms/_inputs.py +8 -0
- pulumi_oci/jms/outputs.py +8 -0
- pulumi_oci/kms/_inputs.py +6 -6
- pulumi_oci/kms/outputs.py +6 -6
- pulumi_oci/loadbalancer/_inputs.py +30 -14
- pulumi_oci/loadbalancer/load_balancer_routing_policy.py +35 -7
- pulumi_oci/loadbalancer/outputs.py +30 -14
- pulumi_oci/loganalytics/_inputs.py +34 -26
- pulumi_oci/loganalytics/outputs.py +34 -26
- pulumi_oci/logging/_inputs.py +60 -60
- pulumi_oci/logging/outputs.py +60 -60
- pulumi_oci/managementagent/_inputs.py +46 -2
- pulumi_oci/managementagent/outputs.py +46 -2
- pulumi_oci/marketplace/_inputs.py +6 -6
- pulumi_oci/marketplace/outputs.py +6 -6
- pulumi_oci/marketplace/publication.py +11 -11
- pulumi_oci/mediaservices/_inputs.py +32 -8
- pulumi_oci/mediaservices/media_asset.py +18 -18
- pulumi_oci/mediaservices/media_workflow.py +38 -22
- pulumi_oci/mediaservices/media_workflow_configuration.py +11 -11
- pulumi_oci/mediaservices/media_workflow_job.py +11 -11
- pulumi_oci/mediaservices/outputs.py +32 -8
- pulumi_oci/mediaservices/stream_cdn_config.py +4 -4
- pulumi_oci/mediaservices/stream_distribution_channel.py +11 -11
- pulumi_oci/mediaservices/stream_packaging_config.py +4 -4
- pulumi_oci/meteringcomputation/_inputs.py +2 -2
- pulumi_oci/meteringcomputation/outputs.py +2 -2
- pulumi_oci/meteringcomputation/usage_statement_email_recipients_group.py +4 -4
- pulumi_oci/monitoring/_inputs.py +4 -4
- pulumi_oci/monitoring/alarm.py +0 -21
- pulumi_oci/monitoring/get_alarm.py +0 -3
- pulumi_oci/monitoring/outputs.py +4 -10
- pulumi_oci/mysql/_inputs.py +22 -30
- pulumi_oci/mysql/outputs.py +22 -30
- pulumi_oci/mysql/replica.py +28 -12
- pulumi_oci/networkfirewall/get_network_firewall_policy_mapped_secret.py +0 -2
- pulumi_oci/networkfirewall/network_firewall_policy_mapped_secret.py +0 -14
- pulumi_oci/networkfirewall/outputs.py +0 -4
- pulumi_oci/networkloadbalancer/_inputs.py +26 -10
- pulumi_oci/networkloadbalancer/outputs.py +26 -10
- pulumi_oci/nosql/_inputs.py +12 -4
- pulumi_oci/nosql/outputs.py +12 -4
- pulumi_oci/objectstorage/_inputs.py +4 -4
- pulumi_oci/objectstorage/outputs.py +4 -4
- pulumi_oci/ocvp/_inputs.py +42 -86
- pulumi_oci/ocvp/get_retrieve_password.py +0 -1
- pulumi_oci/ocvp/outputs.py +42 -86
- pulumi_oci/ocvp/sddc.py +77 -49
- pulumi_oci/ons/subscription.py +0 -63
- pulumi_oci/opa/_inputs.py +2 -6
- pulumi_oci/opa/outputs.py +6 -18
- pulumi_oci/opsi/_inputs.py +6 -6
- pulumi_oci/opsi/exadata_insight.py +28 -28
- pulumi_oci/opsi/outputs.py +6 -6
- pulumi_oci/optimizer/_inputs.py +4 -4
- pulumi_oci/optimizer/outputs.py +4 -4
- pulumi_oci/osmanagement/_inputs.py +10 -2
- pulumi_oci/osmanagement/outputs.py +10 -2
- pulumi_oci/osmanagementhub/_inputs.py +8 -24
- pulumi_oci/osmanagementhub/event.py +0 -32
- pulumi_oci/osmanagementhub/get_event.py +0 -8
- pulumi_oci/osmanagementhub/get_events.py +0 -8
- pulumi_oci/osmanagementhub/lifecycle_environment.py +14 -14
- pulumi_oci/osmanagementhub/outputs.py +8 -40
- pulumi_oci/osmanagementhub/software_source.py +7 -7
- pulumi_oci/ospgateway/_inputs.py +96 -96
- pulumi_oci/ospgateway/outputs.py +96 -96
- pulumi_oci/ospgateway/subscription.py +80 -80
- pulumi_oci/psql/_inputs.py +18 -10
- pulumi_oci/psql/db_system.py +14 -14
- pulumi_oci/psql/outputs.py +18 -10
- pulumi_oci/pulumi-plugin.json +1 -1
- pulumi_oci/queue/get_queue.py +9 -9
- pulumi_oci/queue/outputs.py +5 -5
- pulumi_oci/queue/queue.py +26 -77
- pulumi_oci/sch/_inputs.py +26 -26
- pulumi_oci/sch/connector.py +7 -7
- pulumi_oci/sch/outputs.py +26 -26
- pulumi_oci/servicecatalog/private_application.py +4 -4
- pulumi_oci/servicemesh/_inputs.py +24 -8
- pulumi_oci/servicemesh/ingress_gateway_route_table.py +7 -7
- pulumi_oci/servicemesh/outputs.py +24 -8
- pulumi_oci/stackmonitoring/_inputs.py +56 -40
- pulumi_oci/stackmonitoring/metric_extension.py +18 -18
- pulumi_oci/stackmonitoring/monitored_resource.py +7 -7
- pulumi_oci/stackmonitoring/outputs.py +56 -40
- pulumi_oci/visualbuilder/_inputs.py +2 -6
- pulumi_oci/visualbuilder/outputs.py +6 -18
- pulumi_oci/vnmonitoring/_inputs.py +42 -10
- pulumi_oci/vnmonitoring/outputs.py +42 -10
- pulumi_oci/vulnerabilityscanning/_inputs.py +4 -4
- pulumi_oci/vulnerabilityscanning/container_scan_target.py +7 -7
- pulumi_oci/vulnerabilityscanning/outputs.py +4 -4
- pulumi_oci/waas/_inputs.py +205 -133
- pulumi_oci/waas/outputs.py +205 -133
- pulumi_oci/waas/policy.py +7 -7
- pulumi_oci/waas/protection_rule.py +7 -7
- pulumi_oci/waf/_inputs.py +30 -36
- pulumi_oci/waf/network_address_list.py +7 -7
- pulumi_oci/waf/outputs.py +30 -36
- {pulumi_oci-1.37.0.dist-info → pulumi_oci-1.37.0a1715927489.dist-info}/METADATA +1 -1
- {pulumi_oci-1.37.0.dist-info → pulumi_oci-1.37.0a1715927489.dist-info}/RECORD +296 -307
- pulumi_oci/cloudguard/adhoc_query.py +0 -596
- pulumi_oci/cloudguard/get_adhoc_queries.py +0 -253
- pulumi_oci/cloudguard/get_adhoc_query.py +0 -249
- pulumi_oci/cloudguard/get_saved_queries.py +0 -190
- pulumi_oci/cloudguard/get_saved_query.py +0 -235
- pulumi_oci/cloudguard/get_wlp_agent.py +0 -258
- pulumi_oci/cloudguard/get_wlp_agents.py +0 -136
- pulumi_oci/cloudguard/saved_query.py +0 -595
- pulumi_oci/cloudguard/wlp_agent.py +0 -654
- pulumi_oci/datasafe/set_security_assessment_baseline_management.py +0 -304
- pulumi_oci/datasafe/set_user_assessment_baseline_management.py +0 -304
- {pulumi_oci-1.37.0.dist-info → pulumi_oci-1.37.0a1715927489.dist-info}/WHEEL +0 -0
- {pulumi_oci-1.37.0.dist-info → pulumi_oci-1.37.0a1715927489.dist-info}/top_level.txt +0 -0
pulumi_oci/waas/outputs.py
CHANGED
@@ -636,7 +636,11 @@ class PolicyOriginCustomHeader(dict):
|
|
636
636
|
name: str,
|
637
637
|
value: str):
|
638
638
|
"""
|
639
|
-
:param str name: (Updatable) The name of the
|
639
|
+
:param str name: (Updatable) The unique name of the whitelist.
|
640
|
+
|
641
|
+
|
642
|
+
** IMPORTANT **
|
643
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
640
644
|
:param str value: (Updatable) The value of the header.
|
641
645
|
"""
|
642
646
|
pulumi.set(__self__, "name", name)
|
@@ -646,7 +650,11 @@ class PolicyOriginCustomHeader(dict):
|
|
646
650
|
@pulumi.getter
|
647
651
|
def name(self) -> str:
|
648
652
|
"""
|
649
|
-
(Updatable) The name of the
|
653
|
+
(Updatable) The unique name of the whitelist.
|
654
|
+
|
655
|
+
|
656
|
+
** IMPORTANT **
|
657
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
650
658
|
"""
|
651
659
|
return pulumi.get(self, "name")
|
652
660
|
|
@@ -701,7 +709,7 @@ class PolicyOriginGroupOriginGroup(dict):
|
|
701
709
|
origin: str,
|
702
710
|
weight: Optional[int] = None):
|
703
711
|
"""
|
704
|
-
:param str origin: The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in `Origins`. Required when creating the `WafConfig` resource, but not
|
712
|
+
:param str origin: (Updatable) The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in `Origins`. Required when creating the `WafConfig` resource, but is not required upon updating the configuration.
|
705
713
|
"""
|
706
714
|
pulumi.set(__self__, "origin", origin)
|
707
715
|
if weight is not None:
|
@@ -711,7 +719,7 @@ class PolicyOriginGroupOriginGroup(dict):
|
|
711
719
|
@pulumi.getter
|
712
720
|
def origin(self) -> str:
|
713
721
|
"""
|
714
|
-
The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in `Origins`. Required when creating the `WafConfig` resource, but not
|
722
|
+
(Updatable) The key in the map of origins referencing the origin used for the Web Application Firewall. The origin must already be included in `Origins`. Required when creating the `WafConfig` resource, but is not required upon updating the configuration.
|
715
723
|
"""
|
716
724
|
return pulumi.get(self, "origin")
|
717
725
|
|
@@ -1032,9 +1040,12 @@ class PolicyPolicyConfigHealthChecks(dict):
|
|
1032
1040
|
**Note:** The only currently-supported header fields are Host and User-Agent.
|
1033
1041
|
:param int healthy_threshold: (Updatable) Number of successful health checks after which the server is marked up.
|
1034
1042
|
:param int interval_in_seconds: (Updatable) Time between health checks of an individual origin server, in seconds.
|
1035
|
-
:param bool is_enabled: (Updatable) Enables or disables the
|
1043
|
+
:param bool is_enabled: (Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
1036
1044
|
:param bool is_response_text_check_enabled: (Updatable) Enables or disables additional check for predefined text in addition to response code.
|
1037
|
-
:param str method: (Updatable)
|
1045
|
+
:param str method: (Updatable) Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.
|
1046
|
+
* **[IP_HASH](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/IPHashLoadBalancingMethod):** All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
|
1047
|
+
* **[ROUND_ROBIN](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/RoundRobinLoadBalancingMethod):** Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
|
1048
|
+
* **[STICKY_COOKIE](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/StickyCookieLoadBalancingMethod):** Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
|
1038
1049
|
:param str path: (Updatable) Path to visit on your origins when performing the health check.
|
1039
1050
|
:param int timeout_in_seconds: (Updatable) Response timeout represents wait time until request is considered failed, in seconds.
|
1040
1051
|
:param int unhealthy_threshold: (Updatable) Number of failed health checks after which the server is marked down.
|
@@ -1112,7 +1123,7 @@ class PolicyPolicyConfigHealthChecks(dict):
|
|
1112
1123
|
@pulumi.getter(name="isEnabled")
|
1113
1124
|
def is_enabled(self) -> Optional[bool]:
|
1114
1125
|
"""
|
1115
|
-
(Updatable) Enables or disables the
|
1126
|
+
(Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
1116
1127
|
"""
|
1117
1128
|
return pulumi.get(self, "is_enabled")
|
1118
1129
|
|
@@ -1128,7 +1139,10 @@ class PolicyPolicyConfigHealthChecks(dict):
|
|
1128
1139
|
@pulumi.getter
|
1129
1140
|
def method(self) -> Optional[str]:
|
1130
1141
|
"""
|
1131
|
-
(Updatable)
|
1142
|
+
(Updatable) Load balancing methods are algorithms used to efficiently distribute traffic among origin servers.
|
1143
|
+
* **[IP_HASH](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/IPHashLoadBalancingMethod):** All the incoming requests from the same client IP address should go to the same content origination server. IP_HASH load balancing method uses origin weights when choosing which origin should the hash be assigned to initially.
|
1144
|
+
* **[ROUND_ROBIN](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/RoundRobinLoadBalancingMethod):** Forwards requests sequentially to the available origin servers. The first request - to the first origin server, the second request - to the next origin server, and so on. After it sends a request to the last origin server, it starts again with the first origin server. When using weights on origins, Weighted Round Robin assigns more requests to origins with a greater weight. Over a period of time, origins will receive a number of requests in proportion to their weight.
|
1145
|
+
* **[STICKY_COOKIE](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/StickyCookieLoadBalancingMethod):** Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
|
1132
1146
|
"""
|
1133
1147
|
return pulumi.get(self, "method")
|
1134
1148
|
|
@@ -1188,7 +1202,11 @@ class PolicyPolicyConfigLoadBalancingMethod(dict):
|
|
1188
1202
|
* **[STICKY_COOKIE](https://www.terraform.io/iaas/api/#/en/waas/latest/datatypes/StickyCookieLoadBalancingMethod):** Adds a session cookie to the first response from the origin server and identifies the server that sent the response. The client's next request contains the cookie value, and nginx routes the request to the origin server that responded to the first request. STICKY_COOKIE load balancing method falls back to Round Robin for the first request.
|
1189
1203
|
:param str domain: (Updatable) The domain for which the cookie is set, defaults to WAAS policy domain.
|
1190
1204
|
:param int expiration_time_in_seconds: (Updatable) The time for which a browser should keep the cookie in seconds. Empty value will cause the cookie to expire at the end of a browser session.
|
1191
|
-
:param str name: (Updatable) The name of the
|
1205
|
+
:param str name: (Updatable) The unique name of the whitelist.
|
1206
|
+
|
1207
|
+
|
1208
|
+
** IMPORTANT **
|
1209
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
1192
1210
|
"""
|
1193
1211
|
pulumi.set(__self__, "method", method)
|
1194
1212
|
if domain is not None:
|
@@ -1229,7 +1247,11 @@ class PolicyPolicyConfigLoadBalancingMethod(dict):
|
|
1229
1247
|
@pulumi.getter
|
1230
1248
|
def name(self) -> Optional[str]:
|
1231
1249
|
"""
|
1232
|
-
(Updatable) The name of the
|
1250
|
+
(Updatable) The unique name of the whitelist.
|
1251
|
+
|
1252
|
+
|
1253
|
+
** IMPORTANT **
|
1254
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
1233
1255
|
"""
|
1234
1256
|
return pulumi.get(self, "name")
|
1235
1257
|
|
@@ -1479,31 +1501,27 @@ class PolicyWafConfigAccessRule(dict):
|
|
1479
1501
|
redirect_url: Optional[str] = None,
|
1480
1502
|
response_header_manipulations: Optional[Sequence['outputs.PolicyWafConfigAccessRuleResponseHeaderManipulation']] = None):
|
1481
1503
|
"""
|
1482
|
-
:param str action: (Updatable) The action to take
|
1483
|
-
|
1484
|
-
|
1485
|
-
* **BLOCK:** Blocks the request by returning specified response code or showing error page.
|
1486
|
-
* **BYPASS:** Bypasses some or all challenges.
|
1487
|
-
* **REDIRECT:** Redirects the request to the specified URL. These fields are required when `REDIRECT` is selected: `redirectUrl`, `redirectResponseCode`.
|
1488
|
-
* **SHOW_CAPTCHA:** Show a CAPTCHA Challenge page instead of the requested page.
|
1504
|
+
:param str action: (Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
1505
|
+
:param Sequence['PolicyWafConfigAccessRuleCriteriaArgs'] criterias: (Updatable) When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
|
1506
|
+
:param str name: (Updatable) The unique name of the whitelist.
|
1489
1507
|
|
1490
|
-
|
1491
|
-
|
1492
|
-
|
1493
|
-
:param str block_action: (Updatable)
|
1494
|
-
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
1495
|
-
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
1496
|
-
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
1497
|
-
:param int block_response_code: (Updatable) The response
|
1508
|
+
|
1509
|
+
** IMPORTANT **
|
1510
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
1511
|
+
:param str block_action: (Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
1512
|
+
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
1513
|
+
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
1514
|
+
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
1515
|
+
:param int block_response_code: (Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
1498
1516
|
:param Sequence[str] bypass_challenges: (Updatable) The list of challenges to bypass when `action` is set to `BYPASS`. If unspecified or empty, all challenges are bypassed.
|
1499
1517
|
* **JS_CHALLENGE:** Bypasses JavaScript Challenge.
|
1500
1518
|
* **DEVICE_FINGERPRINT_CHALLENGE:** Bypasses Device Fingerprint Challenge.
|
1501
1519
|
* **HUMAN_INTERACTION_CHALLENGE:** Bypasses Human Interaction Challenge.
|
1502
1520
|
* **CAPTCHA:** Bypasses CAPTCHA Challenge.
|
1503
|
-
:param str captcha_footer: (Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `
|
1504
|
-
:param str captcha_header: (Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `
|
1505
|
-
:param str captcha_submit_label: (Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `
|
1506
|
-
:param str captcha_title: (Updatable) The title used when showing a CAPTCHA challenge when `action` is set to `
|
1521
|
+
:param str captcha_footer: (Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, default to `Enter the letters and numbers as they are shown in image above`.
|
1522
|
+
:param str captcha_header: (Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `We have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.`
|
1523
|
+
:param str captcha_submit_label: (Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Yes, I am human`.
|
1524
|
+
:param str captcha_title: (Updatable) The title used when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Are you human?`
|
1507
1525
|
:param str redirect_response_code: (Updatable) The response status code to return when `action` is set to `REDIRECT`.
|
1508
1526
|
* **MOVED_PERMANENTLY:** Used for designating the permanent movement of a page (numerical code - 301).
|
1509
1527
|
* **FOUND:** Used for designating the temporary movement of a page (numerical code - 302).
|
@@ -1544,15 +1562,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1544
1562
|
@pulumi.getter
|
1545
1563
|
def action(self) -> str:
|
1546
1564
|
"""
|
1547
|
-
(Updatable) The action to take
|
1548
|
-
* **ALLOW:** Takes no action, just logs the request.
|
1549
|
-
* **DETECT:** Takes no action, but creates an alert for the request.
|
1550
|
-
* **BLOCK:** Blocks the request by returning specified response code or showing error page.
|
1551
|
-
* **BYPASS:** Bypasses some or all challenges.
|
1552
|
-
* **REDIRECT:** Redirects the request to the specified URL. These fields are required when `REDIRECT` is selected: `redirectUrl`, `redirectResponseCode`.
|
1553
|
-
* **SHOW_CAPTCHA:** Show a CAPTCHA Challenge page instead of the requested page.
|
1554
|
-
|
1555
|
-
Regardless of action, no further rules are processed once a rule is matched.
|
1565
|
+
(Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
1556
1566
|
"""
|
1557
1567
|
return pulumi.get(self, "action")
|
1558
1568
|
|
@@ -1560,7 +1570,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1560
1570
|
@pulumi.getter
|
1561
1571
|
def criterias(self) -> Sequence['outputs.PolicyWafConfigAccessRuleCriteria']:
|
1562
1572
|
"""
|
1563
|
-
(Updatable)
|
1573
|
+
(Updatable) When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
|
1564
1574
|
"""
|
1565
1575
|
return pulumi.get(self, "criterias")
|
1566
1576
|
|
@@ -1568,7 +1578,11 @@ class PolicyWafConfigAccessRule(dict):
|
|
1568
1578
|
@pulumi.getter
|
1569
1579
|
def name(self) -> str:
|
1570
1580
|
"""
|
1571
|
-
(Updatable) The unique name of the
|
1581
|
+
(Updatable) The unique name of the whitelist.
|
1582
|
+
|
1583
|
+
|
1584
|
+
** IMPORTANT **
|
1585
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
1572
1586
|
"""
|
1573
1587
|
return pulumi.get(self, "name")
|
1574
1588
|
|
@@ -1576,7 +1590,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1576
1590
|
@pulumi.getter(name="blockAction")
|
1577
1591
|
def block_action(self) -> Optional[str]:
|
1578
1592
|
"""
|
1579
|
-
(Updatable)
|
1593
|
+
(Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
1580
1594
|
"""
|
1581
1595
|
return pulumi.get(self, "block_action")
|
1582
1596
|
|
@@ -1584,7 +1598,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1584
1598
|
@pulumi.getter(name="blockErrorPageCode")
|
1585
1599
|
def block_error_page_code(self) -> Optional[str]:
|
1586
1600
|
"""
|
1587
|
-
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
1601
|
+
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
1588
1602
|
"""
|
1589
1603
|
return pulumi.get(self, "block_error_page_code")
|
1590
1604
|
|
@@ -1592,7 +1606,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1592
1606
|
@pulumi.getter(name="blockErrorPageDescription")
|
1593
1607
|
def block_error_page_description(self) -> Optional[str]:
|
1594
1608
|
"""
|
1595
|
-
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
1609
|
+
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
1596
1610
|
"""
|
1597
1611
|
return pulumi.get(self, "block_error_page_description")
|
1598
1612
|
|
@@ -1600,7 +1614,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1600
1614
|
@pulumi.getter(name="blockErrorPageMessage")
|
1601
1615
|
def block_error_page_message(self) -> Optional[str]:
|
1602
1616
|
"""
|
1603
|
-
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
1617
|
+
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
1604
1618
|
"""
|
1605
1619
|
return pulumi.get(self, "block_error_page_message")
|
1606
1620
|
|
@@ -1608,7 +1622,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1608
1622
|
@pulumi.getter(name="blockResponseCode")
|
1609
1623
|
def block_response_code(self) -> Optional[int]:
|
1610
1624
|
"""
|
1611
|
-
(Updatable) The response
|
1625
|
+
(Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
1612
1626
|
"""
|
1613
1627
|
return pulumi.get(self, "block_response_code")
|
1614
1628
|
|
@@ -1628,7 +1642,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1628
1642
|
@pulumi.getter(name="captchaFooter")
|
1629
1643
|
def captcha_footer(self) -> Optional[str]:
|
1630
1644
|
"""
|
1631
|
-
(Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `
|
1645
|
+
(Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, default to `Enter the letters and numbers as they are shown in image above`.
|
1632
1646
|
"""
|
1633
1647
|
return pulumi.get(self, "captcha_footer")
|
1634
1648
|
|
@@ -1636,7 +1650,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1636
1650
|
@pulumi.getter(name="captchaHeader")
|
1637
1651
|
def captcha_header(self) -> Optional[str]:
|
1638
1652
|
"""
|
1639
|
-
(Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `
|
1653
|
+
(Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `We have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.`
|
1640
1654
|
"""
|
1641
1655
|
return pulumi.get(self, "captcha_header")
|
1642
1656
|
|
@@ -1644,7 +1658,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1644
1658
|
@pulumi.getter(name="captchaSubmitLabel")
|
1645
1659
|
def captcha_submit_label(self) -> Optional[str]:
|
1646
1660
|
"""
|
1647
|
-
(Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `
|
1661
|
+
(Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Yes, I am human`.
|
1648
1662
|
"""
|
1649
1663
|
return pulumi.get(self, "captcha_submit_label")
|
1650
1664
|
|
@@ -1652,7 +1666,7 @@ class PolicyWafConfigAccessRule(dict):
|
|
1652
1666
|
@pulumi.getter(name="captchaTitle")
|
1653
1667
|
def captcha_title(self) -> Optional[str]:
|
1654
1668
|
"""
|
1655
|
-
(Updatable) The title used when showing a CAPTCHA challenge when `action` is set to `
|
1669
|
+
(Updatable) The title used when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Are you human?`
|
1656
1670
|
"""
|
1657
1671
|
return pulumi.get(self, "captcha_title")
|
1658
1672
|
|
@@ -1733,7 +1747,7 @@ class PolicyWafConfigAccessRuleCriteria(dict):
|
|
1733
1747
|
* **COUNTRY_IS_NOT:** Matches if the request does not originate from any of countries in the `value` field. The `value` in this case is string with one or multiple countries separated by new line symbol \\n Country codes are in ISO 3166-1 alpha-2 format. For a list of codes, see [ISO's website](https://www.iso.org/obp/ui/#search/code/). *Example:* "AL\\nDZ\\nAM"
|
1734
1748
|
* **USER_AGENT_IS:** Matches if the requesting user agent is identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
1735
1749
|
* **USER_AGENT_IS_NOT:** Matches if the requesting user agent is not identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
1736
|
-
:param str value: (Updatable) The
|
1750
|
+
:param str value: (Updatable) The value of the header.
|
1737
1751
|
:param bool is_case_sensitive: (Updatable) When enabled, the condition will be matched with case-sensitive rules.
|
1738
1752
|
"""
|
1739
1753
|
pulumi.set(__self__, "condition", condition)
|
@@ -1778,7 +1792,7 @@ class PolicyWafConfigAccessRuleCriteria(dict):
|
|
1778
1792
|
@pulumi.getter
|
1779
1793
|
def value(self) -> str:
|
1780
1794
|
"""
|
1781
|
-
(Updatable) The
|
1795
|
+
(Updatable) The value of the header.
|
1782
1796
|
"""
|
1783
1797
|
return pulumi.get(self, "value")
|
1784
1798
|
|
@@ -1798,9 +1812,9 @@ class PolicyWafConfigAccessRuleResponseHeaderManipulation(dict):
|
|
1798
1812
|
header: str,
|
1799
1813
|
value: Optional[str] = None):
|
1800
1814
|
"""
|
1801
|
-
:param str action: (Updatable) The action
|
1815
|
+
:param str action: (Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
1802
1816
|
:param str header: (Updatable) A header field name that conforms to RFC 7230. Example: `example_header_name`
|
1803
|
-
:param str value: (Updatable)
|
1817
|
+
:param str value: (Updatable) The value of the header.
|
1804
1818
|
"""
|
1805
1819
|
pulumi.set(__self__, "action", action)
|
1806
1820
|
pulumi.set(__self__, "header", header)
|
@@ -1811,7 +1825,7 @@ class PolicyWafConfigAccessRuleResponseHeaderManipulation(dict):
|
|
1811
1825
|
@pulumi.getter
|
1812
1826
|
def action(self) -> str:
|
1813
1827
|
"""
|
1814
|
-
(Updatable) The action
|
1828
|
+
(Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
1815
1829
|
"""
|
1816
1830
|
return pulumi.get(self, "action")
|
1817
1831
|
|
@@ -1827,7 +1841,7 @@ class PolicyWafConfigAccessRuleResponseHeaderManipulation(dict):
|
|
1827
1841
|
@pulumi.getter
|
1828
1842
|
def value(self) -> Optional[str]:
|
1829
1843
|
"""
|
1830
|
-
(Updatable)
|
1844
|
+
(Updatable) The value of the header.
|
1831
1845
|
"""
|
1832
1846
|
return pulumi.get(self, "value")
|
1833
1847
|
|
@@ -1863,9 +1877,9 @@ class PolicyWafConfigAddressRateLimiting(dict):
|
|
1863
1877
|
block_response_code: Optional[int] = None,
|
1864
1878
|
max_delayed_count_per_address: Optional[int] = None):
|
1865
1879
|
"""
|
1866
|
-
:param bool is_enabled: (Updatable) Enables or disables the
|
1880
|
+
:param bool is_enabled: (Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
1867
1881
|
:param int allowed_rate_per_address: (Updatable) The number of allowed requests per second from one IP address. If unspecified, defaults to `1`.
|
1868
|
-
:param int block_response_code: (Updatable) The response
|
1882
|
+
:param int block_response_code: (Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
1869
1883
|
:param int max_delayed_count_per_address: (Updatable) The maximum number of requests allowed to be queued before subsequent requests are dropped. If unspecified, defaults to `10`.
|
1870
1884
|
"""
|
1871
1885
|
pulumi.set(__self__, "is_enabled", is_enabled)
|
@@ -1880,7 +1894,7 @@ class PolicyWafConfigAddressRateLimiting(dict):
|
|
1880
1894
|
@pulumi.getter(name="isEnabled")
|
1881
1895
|
def is_enabled(self) -> bool:
|
1882
1896
|
"""
|
1883
|
-
(Updatable) Enables or disables the
|
1897
|
+
(Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
1884
1898
|
"""
|
1885
1899
|
return pulumi.get(self, "is_enabled")
|
1886
1900
|
|
@@ -1896,7 +1910,7 @@ class PolicyWafConfigAddressRateLimiting(dict):
|
|
1896
1910
|
@pulumi.getter(name="blockResponseCode")
|
1897
1911
|
def block_response_code(self) -> Optional[int]:
|
1898
1912
|
"""
|
1899
|
-
(Updatable) The response
|
1913
|
+
(Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
1900
1914
|
"""
|
1901
1915
|
return pulumi.get(self, "block_response_code")
|
1902
1916
|
|
@@ -1941,11 +1955,13 @@ class PolicyWafConfigCachingRule(dict):
|
|
1941
1955
|
is_client_caching_enabled: Optional[bool] = None,
|
1942
1956
|
key: Optional[str] = None):
|
1943
1957
|
"""
|
1944
|
-
:param str action: (Updatable) The action to take
|
1945
|
-
|
1946
|
-
|
1947
|
-
|
1948
|
-
|
1958
|
+
:param str action: (Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
1959
|
+
:param Sequence['PolicyWafConfigCachingRuleCriteriaArgs'] criterias: (Updatable) When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
|
1960
|
+
:param str name: (Updatable) The unique name of the whitelist.
|
1961
|
+
|
1962
|
+
|
1963
|
+
** IMPORTANT **
|
1964
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
1949
1965
|
:param str caching_duration: (Updatable) The duration to cache content for the caching rule, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is `99`. Mixing of multiple units is not supported. Only applies when the `action` is set to `CACHE`. Example: `PT1H`
|
1950
1966
|
:param str client_caching_duration: (Updatable) The duration to cache content in the user's browser, specified in ISO 8601 extended format. Supported units: seconds, minutes, hours, days, weeks, months. The maximum value that can be set for any unit is `99`. Mixing of multiple units is not supported. Only applies when the `action` is set to `CACHE`. Example: `PT1H`
|
1951
1967
|
:param bool is_client_caching_enabled: (Updatable) Enables or disables client caching. Browsers use the `Cache-Control` header value for caching content locally in the browser. This setting overrides the addition of a `Cache-Control` header in responses.
|
@@ -1967,9 +1983,7 @@ class PolicyWafConfigCachingRule(dict):
|
|
1967
1983
|
@pulumi.getter
|
1968
1984
|
def action(self) -> str:
|
1969
1985
|
"""
|
1970
|
-
(Updatable) The action to take
|
1971
|
-
* **CACHE:** Caches requested content when the criteria of the rule are met.
|
1972
|
-
* **BYPASS_CACHE:** Allows requests to bypass the cache and be directed to the origin when the criteria of the rule is met.
|
1986
|
+
(Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
1973
1987
|
"""
|
1974
1988
|
return pulumi.get(self, "action")
|
1975
1989
|
|
@@ -1977,7 +1991,7 @@ class PolicyWafConfigCachingRule(dict):
|
|
1977
1991
|
@pulumi.getter
|
1978
1992
|
def criterias(self) -> Sequence['outputs.PolicyWafConfigCachingRuleCriteria']:
|
1979
1993
|
"""
|
1980
|
-
(Updatable)
|
1994
|
+
(Updatable) When defined, the JavaScript Challenge would be applied only for the requests that matched all the listed conditions.
|
1981
1995
|
"""
|
1982
1996
|
return pulumi.get(self, "criterias")
|
1983
1997
|
|
@@ -1985,7 +1999,11 @@ class PolicyWafConfigCachingRule(dict):
|
|
1985
1999
|
@pulumi.getter
|
1986
2000
|
def name(self) -> str:
|
1987
2001
|
"""
|
1988
|
-
(Updatable) The name of the
|
2002
|
+
(Updatable) The unique name of the whitelist.
|
2003
|
+
|
2004
|
+
|
2005
|
+
** IMPORTANT **
|
2006
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
1989
2007
|
"""
|
1990
2008
|
return pulumi.get(self, "name")
|
1991
2009
|
|
@@ -2028,14 +2046,33 @@ class PolicyWafConfigCachingRuleCriteria(dict):
|
|
2028
2046
|
condition: str,
|
2029
2047
|
value: str):
|
2030
2048
|
"""
|
2031
|
-
:param str condition: (Updatable) The
|
2032
|
-
* **URL_IS:** Matches if the concatenation of request URL path and query is identical to the contents of the `value` field.
|
2033
|
-
* **
|
2049
|
+
:param str condition: (Updatable) The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.
|
2050
|
+
* **URL_IS:** Matches if the concatenation of request URL path and query is identical to the contents of the `value` field. URL must start with a `/`.
|
2051
|
+
* **URL_IS_NOT:** Matches if the concatenation of request URL path and query is not identical to the contents of the `value` field. URL must start with a `/`.
|
2052
|
+
* **URL_STARTS_WITH:** Matches if the concatenation of request URL path and query starts with the contents of the `value` field. URL must start with a `/`.
|
2034
2053
|
* **URL_PART_ENDS_WITH:** Matches if the concatenation of request URL path and query ends with the contents of the `value` field.
|
2035
2054
|
* **URL_PART_CONTAINS:** Matches if the concatenation of request URL path and query contains the contents of the `value` field.
|
2055
|
+
* **URL_REGEX:** Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
|
2056
|
+
* **URL_DOES_NOT_MATCH_REGEX:** Matches if the concatenation of request URL path and query is not described by the regular expression in the `value` field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
|
2057
|
+
* **URL_DOES_NOT_START_WITH:** Matches if the concatenation of request URL path and query does not start with the contents of the `value` field.
|
2058
|
+
* **URL_PART_DOES_NOT_CONTAIN:** Matches if the concatenation of request URL path and query does not contain the contents of the `value` field.
|
2059
|
+
* **URL_PART_DOES_NOT_END_WITH:** Matches if the concatenation of request URL path and query does not end with the contents of the `value` field.
|
2060
|
+
* **IP_IS:** Matches if the request originates from one of the IP addresses contained in the defined address list. The `value` in this case is string with one or multiple IPs or CIDR notations separated by new line symbol \\n *Example:* "1.1.1.1\\n1.1.1.2\\n1.2.2.1/30"
|
2061
|
+
* **IP_IS_NOT:** Matches if the request does not originate from any of the IP addresses contained in the defined address list. The `value` in this case is string with one or multiple IPs or CIDR notations separated by new line symbol \\n *Example:* "1.1.1.1\\n1.1.1.2\\n1.2.2.1/30"
|
2062
|
+
* **IP_IN_LIST:** Matches if the request originates from one of the IP addresses contained in the referenced address list. The `value` in this case is OCID of the address list.
|
2063
|
+
* **IP_NOT_IN_LIST:** Matches if the request does not originate from any IP address contained in the referenced address list. The `value` field in this case is OCID of the address list.
|
2064
|
+
* **HTTP_HEADER_CONTAINS:** The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. `host:test.example.com` is an example of a criteria value where `host` is the header field name and `test.example.com` is the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. *Example:* With a criteria value of `host:test.example.com`, where `host` is the name of the field and `test.example.com` is the value of the host field, a request with the header values, `Host: www.test.example.com` will match, where as a request with header values of `host: www.example.com` or `host: test.sub.example.com` will not match.
|
2065
|
+
* **HTTP_METHOD_IS:** Matches if the request method is identical to one of the values listed in field. The `value` in this case is string with one or multiple HTTP methods separated by new line symbol \\n The list of available methods: `GET`, `HEAD`, `POST`, `PUT`, `DELETE`, `CONNECT`, `OPTIONS`, `TRACE`, `PATCH`
|
2036
2066
|
|
2037
|
-
|
2038
|
-
|
2067
|
+
*Example:* "GET\\nPOST"
|
2068
|
+
* **HTTP_METHOD_IS_NOT:** Matches if the request is not identical to any of the contents of the `value` field. The `value` in this case is string with one or multiple HTTP methods separated by new line symbol \\n The list of available methods: `GET`, `HEAD`, `POST`, `PUT`, `DELETE`, `CONNECT`, `OPTIONS`, `TRACE`, `PATCH`
|
2069
|
+
|
2070
|
+
*Example:* "GET\\nPOST"
|
2071
|
+
* **COUNTRY_IS:** Matches if the request originates from one of countries in the `value` field. The `value` in this case is string with one or multiple countries separated by new line symbol \\n Country codes are in ISO 3166-1 alpha-2 format. For a list of codes, see [ISO's website](https://www.iso.org/obp/ui/#search/code/). *Example:* "AL\\nDZ\\nAM"
|
2072
|
+
* **COUNTRY_IS_NOT:** Matches if the request does not originate from any of countries in the `value` field. The `value` in this case is string with one or multiple countries separated by new line symbol \\n Country codes are in ISO 3166-1 alpha-2 format. For a list of codes, see [ISO's website](https://www.iso.org/obp/ui/#search/code/). *Example:* "AL\\nDZ\\nAM"
|
2073
|
+
* **USER_AGENT_IS:** Matches if the requesting user agent is identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
2074
|
+
* **USER_AGENT_IS_NOT:** Matches if the requesting user agent is not identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
2075
|
+
:param str value: (Updatable) The value of the header.
|
2039
2076
|
"""
|
2040
2077
|
pulumi.set(__self__, "condition", condition)
|
2041
2078
|
pulumi.set(__self__, "value", value)
|
@@ -2044,13 +2081,32 @@ class PolicyWafConfigCachingRuleCriteria(dict):
|
|
2044
2081
|
@pulumi.getter
|
2045
2082
|
def condition(self) -> str:
|
2046
2083
|
"""
|
2047
|
-
(Updatable) The
|
2048
|
-
* **URL_IS:** Matches if the concatenation of request URL path and query is identical to the contents of the `value` field.
|
2049
|
-
* **
|
2084
|
+
(Updatable) The criteria the access rule and JavaScript Challenge uses to determine if action should be taken on a request.
|
2085
|
+
* **URL_IS:** Matches if the concatenation of request URL path and query is identical to the contents of the `value` field. URL must start with a `/`.
|
2086
|
+
* **URL_IS_NOT:** Matches if the concatenation of request URL path and query is not identical to the contents of the `value` field. URL must start with a `/`.
|
2087
|
+
* **URL_STARTS_WITH:** Matches if the concatenation of request URL path and query starts with the contents of the `value` field. URL must start with a `/`.
|
2050
2088
|
* **URL_PART_ENDS_WITH:** Matches if the concatenation of request URL path and query ends with the contents of the `value` field.
|
2051
2089
|
* **URL_PART_CONTAINS:** Matches if the concatenation of request URL path and query contains the contents of the `value` field.
|
2090
|
+
* **URL_REGEX:** Matches if the concatenation of request URL path and query is described by the regular expression in the value field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
|
2091
|
+
* **URL_DOES_NOT_MATCH_REGEX:** Matches if the concatenation of request URL path and query is not described by the regular expression in the `value` field. The value must be a valid regular expression recognized by the PCRE library in Nginx (https://www.pcre.org).
|
2092
|
+
* **URL_DOES_NOT_START_WITH:** Matches if the concatenation of request URL path and query does not start with the contents of the `value` field.
|
2093
|
+
* **URL_PART_DOES_NOT_CONTAIN:** Matches if the concatenation of request URL path and query does not contain the contents of the `value` field.
|
2094
|
+
* **URL_PART_DOES_NOT_END_WITH:** Matches if the concatenation of request URL path and query does not end with the contents of the `value` field.
|
2095
|
+
* **IP_IS:** Matches if the request originates from one of the IP addresses contained in the defined address list. The `value` in this case is string with one or multiple IPs or CIDR notations separated by new line symbol \\n *Example:* "1.1.1.1\\n1.1.1.2\\n1.2.2.1/30"
|
2096
|
+
* **IP_IS_NOT:** Matches if the request does not originate from any of the IP addresses contained in the defined address list. The `value` in this case is string with one or multiple IPs or CIDR notations separated by new line symbol \\n *Example:* "1.1.1.1\\n1.1.1.2\\n1.2.2.1/30"
|
2097
|
+
* **IP_IN_LIST:** Matches if the request originates from one of the IP addresses contained in the referenced address list. The `value` in this case is OCID of the address list.
|
2098
|
+
* **IP_NOT_IN_LIST:** Matches if the request does not originate from any IP address contained in the referenced address list. The `value` field in this case is OCID of the address list.
|
2099
|
+
* **HTTP_HEADER_CONTAINS:** The HTTP_HEADER_CONTAINS criteria is defined using a compound value separated by a colon: a header field name and a header field value. `host:test.example.com` is an example of a criteria value where `host` is the header field name and `test.example.com` is the header field value. A request matches when the header field name is a case insensitive match and the header field value is a case insensitive, substring match. *Example:* With a criteria value of `host:test.example.com`, where `host` is the name of the field and `test.example.com` is the value of the host field, a request with the header values, `Host: www.test.example.com` will match, where as a request with header values of `host: www.example.com` or `host: test.sub.example.com` will not match.
|
2100
|
+
* **HTTP_METHOD_IS:** Matches if the request method is identical to one of the values listed in field. The `value` in this case is string with one or multiple HTTP methods separated by new line symbol \\n The list of available methods: `GET`, `HEAD`, `POST`, `PUT`, `DELETE`, `CONNECT`, `OPTIONS`, `TRACE`, `PATCH`
|
2052
2101
|
|
2053
|
-
|
2102
|
+
*Example:* "GET\\nPOST"
|
2103
|
+
* **HTTP_METHOD_IS_NOT:** Matches if the request is not identical to any of the contents of the `value` field. The `value` in this case is string with one or multiple HTTP methods separated by new line symbol \\n The list of available methods: `GET`, `HEAD`, `POST`, `PUT`, `DELETE`, `CONNECT`, `OPTIONS`, `TRACE`, `PATCH`
|
2104
|
+
|
2105
|
+
*Example:* "GET\\nPOST"
|
2106
|
+
* **COUNTRY_IS:** Matches if the request originates from one of countries in the `value` field. The `value` in this case is string with one or multiple countries separated by new line symbol \\n Country codes are in ISO 3166-1 alpha-2 format. For a list of codes, see [ISO's website](https://www.iso.org/obp/ui/#search/code/). *Example:* "AL\\nDZ\\nAM"
|
2107
|
+
* **COUNTRY_IS_NOT:** Matches if the request does not originate from any of countries in the `value` field. The `value` in this case is string with one or multiple countries separated by new line symbol \\n Country codes are in ISO 3166-1 alpha-2 format. For a list of codes, see [ISO's website](https://www.iso.org/obp/ui/#search/code/). *Example:* "AL\\nDZ\\nAM"
|
2108
|
+
* **USER_AGENT_IS:** Matches if the requesting user agent is identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
2109
|
+
* **USER_AGENT_IS_NOT:** Matches if the requesting user agent is not identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
2054
2110
|
"""
|
2055
2111
|
return pulumi.get(self, "condition")
|
2056
2112
|
|
@@ -2058,7 +2114,7 @@ class PolicyWafConfigCachingRuleCriteria(dict):
|
|
2058
2114
|
@pulumi.getter
|
2059
2115
|
def value(self) -> str:
|
2060
2116
|
"""
|
2061
|
-
(Updatable) The value of the
|
2117
|
+
(Updatable) The value of the header.
|
2062
2118
|
"""
|
2063
2119
|
return pulumi.get(self, "value")
|
2064
2120
|
|
@@ -2181,8 +2237,8 @@ class PolicyWafConfigCustomProtectionRule(dict):
|
|
2181
2237
|
exclusions: Optional[Sequence['outputs.PolicyWafConfigCustomProtectionRuleExclusion']] = None,
|
2182
2238
|
id: Optional[str] = None):
|
2183
2239
|
"""
|
2184
|
-
:param str action: (Updatable) The action to take
|
2185
|
-
:param Sequence['PolicyWafConfigCustomProtectionRuleExclusionArgs'] exclusions: (Updatable)
|
2240
|
+
:param str action: (Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
2241
|
+
:param Sequence['PolicyWafConfigCustomProtectionRuleExclusionArgs'] exclusions: (Updatable) An array of The target property of a request that would allow it to bypass the protection rule. For example, when `target` is `REQUEST_COOKIE_NAMES`, the list may include names of cookies to exclude from the protection rule. When the target is `ARGS`, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule. `Exclusions` properties must not contain whitespace, comma or |. **Note:** If protection rules have been enabled that utilize the `maxArgumentCount` or `maxTotalNameLengthOfArguments` properties, and the `target` property has been set to `ARGS`, it is important that the `exclusions` properties be defined to honor those protection rule settings in a consistent manner.
|
2186
2242
|
:param str id: (Updatable) The [OCID](https://docs.cloud.oracle.com/iaas/Content/General/Concepts/identifiers.htm) of the custom protection rule.
|
2187
2243
|
"""
|
2188
2244
|
if action is not None:
|
@@ -2196,7 +2252,7 @@ class PolicyWafConfigCustomProtectionRule(dict):
|
|
2196
2252
|
@pulumi.getter
|
2197
2253
|
def action(self) -> Optional[str]:
|
2198
2254
|
"""
|
2199
|
-
(Updatable) The action to take
|
2255
|
+
(Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
2200
2256
|
"""
|
2201
2257
|
return pulumi.get(self, "action")
|
2202
2258
|
|
@@ -2204,7 +2260,7 @@ class PolicyWafConfigCustomProtectionRule(dict):
|
|
2204
2260
|
@pulumi.getter
|
2205
2261
|
def exclusions(self) -> Optional[Sequence['outputs.PolicyWafConfigCustomProtectionRuleExclusion']]:
|
2206
2262
|
"""
|
2207
|
-
(Updatable)
|
2263
|
+
(Updatable) An array of The target property of a request that would allow it to bypass the protection rule. For example, when `target` is `REQUEST_COOKIE_NAMES`, the list may include names of cookies to exclude from the protection rule. When the target is `ARGS`, the list may include strings of URL query parameters and values from form-urlencoded XML, JSON, AMP, or POST payloads to exclude from the protection rule. `Exclusions` properties must not contain whitespace, comma or |. **Note:** If protection rules have been enabled that utilize the `maxArgumentCount` or `maxTotalNameLengthOfArguments` properties, and the `target` property has been set to `ARGS`, it is important that the `exclusions` properties be defined to honor those protection rule settings in a consistent manner.
|
2208
2264
|
"""
|
2209
2265
|
return pulumi.get(self, "exclusions")
|
2210
2266
|
|
@@ -2289,12 +2345,12 @@ class PolicyWafConfigDeviceFingerprintChallenge(dict):
|
|
2289
2345
|
max_address_count: Optional[int] = None,
|
2290
2346
|
max_address_count_expiration_in_seconds: Optional[int] = None):
|
2291
2347
|
"""
|
2292
|
-
:param bool is_enabled: (Updatable) Enables or disables the
|
2293
|
-
:param str action: (Updatable) The action to take
|
2294
|
-
:param int action_expiration_in_seconds: (Updatable) The number of seconds between challenges
|
2348
|
+
:param bool is_enabled: (Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
2349
|
+
:param str action: (Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
2350
|
+
:param int action_expiration_in_seconds: (Updatable) The number of seconds between challenges from the same IP address. If unspecified, defaults to `60`.
|
2295
2351
|
:param 'PolicyWafConfigDeviceFingerprintChallengeChallengeSettingsArgs' challenge_settings: (Updatable) The challenge settings if `action` is set to `BLOCK`.
|
2296
|
-
:param int failure_threshold: (Updatable) The number of failed requests
|
2297
|
-
:param int failure_threshold_expiration_in_seconds: (Updatable) The number of seconds before the failure threshold resets. If unspecified, defaults to
|
2352
|
+
:param int failure_threshold: (Updatable) The number of failed requests before taking action. If unspecified, defaults to `10`.
|
2353
|
+
:param int failure_threshold_expiration_in_seconds: (Updatable) The number of seconds before the failure threshold resets. If unspecified, defaults to `60`.
|
2298
2354
|
:param int max_address_count: (Updatable) The maximum number of IP addresses permitted with the same device fingerprint. If unspecified, defaults to `20`.
|
2299
2355
|
:param int max_address_count_expiration_in_seconds: (Updatable) The number of seconds before the maximum addresses count resets. If unspecified, defaults to `60`.
|
2300
2356
|
"""
|
@@ -2318,7 +2374,7 @@ class PolicyWafConfigDeviceFingerprintChallenge(dict):
|
|
2318
2374
|
@pulumi.getter(name="isEnabled")
|
2319
2375
|
def is_enabled(self) -> bool:
|
2320
2376
|
"""
|
2321
|
-
(Updatable) Enables or disables the
|
2377
|
+
(Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
2322
2378
|
"""
|
2323
2379
|
return pulumi.get(self, "is_enabled")
|
2324
2380
|
|
@@ -2326,7 +2382,7 @@ class PolicyWafConfigDeviceFingerprintChallenge(dict):
|
|
2326
2382
|
@pulumi.getter
|
2327
2383
|
def action(self) -> Optional[str]:
|
2328
2384
|
"""
|
2329
|
-
(Updatable) The action to take
|
2385
|
+
(Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
2330
2386
|
"""
|
2331
2387
|
return pulumi.get(self, "action")
|
2332
2388
|
|
@@ -2334,7 +2390,7 @@ class PolicyWafConfigDeviceFingerprintChallenge(dict):
|
|
2334
2390
|
@pulumi.getter(name="actionExpirationInSeconds")
|
2335
2391
|
def action_expiration_in_seconds(self) -> Optional[int]:
|
2336
2392
|
"""
|
2337
|
-
(Updatable) The number of seconds between challenges
|
2393
|
+
(Updatable) The number of seconds between challenges from the same IP address. If unspecified, defaults to `60`.
|
2338
2394
|
"""
|
2339
2395
|
return pulumi.get(self, "action_expiration_in_seconds")
|
2340
2396
|
|
@@ -2350,7 +2406,7 @@ class PolicyWafConfigDeviceFingerprintChallenge(dict):
|
|
2350
2406
|
@pulumi.getter(name="failureThreshold")
|
2351
2407
|
def failure_threshold(self) -> Optional[int]:
|
2352
2408
|
"""
|
2353
|
-
(Updatable) The number of failed requests
|
2409
|
+
(Updatable) The number of failed requests before taking action. If unspecified, defaults to `10`.
|
2354
2410
|
"""
|
2355
2411
|
return pulumi.get(self, "failure_threshold")
|
2356
2412
|
|
@@ -2358,7 +2414,7 @@ class PolicyWafConfigDeviceFingerprintChallenge(dict):
|
|
2358
2414
|
@pulumi.getter(name="failureThresholdExpirationInSeconds")
|
2359
2415
|
def failure_threshold_expiration_in_seconds(self) -> Optional[int]:
|
2360
2416
|
"""
|
2361
|
-
(Updatable) The number of seconds before the failure threshold resets. If unspecified, defaults to
|
2417
|
+
(Updatable) The number of seconds before the failure threshold resets. If unspecified, defaults to `60`.
|
2362
2418
|
"""
|
2363
2419
|
return pulumi.get(self, "failure_threshold_expiration_in_seconds")
|
2364
2420
|
|
@@ -2425,11 +2481,11 @@ class PolicyWafConfigDeviceFingerprintChallengeChallengeSettings(dict):
|
|
2425
2481
|
captcha_submit_label: Optional[str] = None,
|
2426
2482
|
captcha_title: Optional[str] = None):
|
2427
2483
|
"""
|
2428
|
-
:param str block_action: (Updatable)
|
2429
|
-
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE
|
2430
|
-
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2431
|
-
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2432
|
-
:param int block_response_code: (Updatable) The response
|
2484
|
+
:param str block_action: (Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
2485
|
+
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
2486
|
+
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
2487
|
+
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
2488
|
+
:param int block_response_code: (Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
2433
2489
|
:param str captcha_footer: (Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, default to `Enter the letters and numbers as they are shown in image above`.
|
2434
2490
|
:param str captcha_header: (Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `We have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.`
|
2435
2491
|
:param str captcha_submit_label: (Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Yes, I am human`.
|
@@ -2458,7 +2514,7 @@ class PolicyWafConfigDeviceFingerprintChallengeChallengeSettings(dict):
|
|
2458
2514
|
@pulumi.getter(name="blockAction")
|
2459
2515
|
def block_action(self) -> Optional[str]:
|
2460
2516
|
"""
|
2461
|
-
(Updatable)
|
2517
|
+
(Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
2462
2518
|
"""
|
2463
2519
|
return pulumi.get(self, "block_action")
|
2464
2520
|
|
@@ -2466,7 +2522,7 @@ class PolicyWafConfigDeviceFingerprintChallengeChallengeSettings(dict):
|
|
2466
2522
|
@pulumi.getter(name="blockErrorPageCode")
|
2467
2523
|
def block_error_page_code(self) -> Optional[str]:
|
2468
2524
|
"""
|
2469
|
-
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE
|
2525
|
+
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
2470
2526
|
"""
|
2471
2527
|
return pulumi.get(self, "block_error_page_code")
|
2472
2528
|
|
@@ -2474,7 +2530,7 @@ class PolicyWafConfigDeviceFingerprintChallengeChallengeSettings(dict):
|
|
2474
2530
|
@pulumi.getter(name="blockErrorPageDescription")
|
2475
2531
|
def block_error_page_description(self) -> Optional[str]:
|
2476
2532
|
"""
|
2477
|
-
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2533
|
+
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
2478
2534
|
"""
|
2479
2535
|
return pulumi.get(self, "block_error_page_description")
|
2480
2536
|
|
@@ -2482,7 +2538,7 @@ class PolicyWafConfigDeviceFingerprintChallengeChallengeSettings(dict):
|
|
2482
2538
|
@pulumi.getter(name="blockErrorPageMessage")
|
2483
2539
|
def block_error_page_message(self) -> Optional[str]:
|
2484
2540
|
"""
|
2485
|
-
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2541
|
+
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
2486
2542
|
"""
|
2487
2543
|
return pulumi.get(self, "block_error_page_message")
|
2488
2544
|
|
@@ -2490,7 +2546,7 @@ class PolicyWafConfigDeviceFingerprintChallengeChallengeSettings(dict):
|
|
2490
2546
|
@pulumi.getter(name="blockResponseCode")
|
2491
2547
|
def block_response_code(self) -> Optional[int]:
|
2492
2548
|
"""
|
2493
|
-
(Updatable) The response
|
2549
|
+
(Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
2494
2550
|
"""
|
2495
2551
|
return pulumi.get(self, "block_response_code")
|
2496
2552
|
|
@@ -2574,9 +2630,9 @@ class PolicyWafConfigHumanInteractionChallenge(dict):
|
|
2574
2630
|
recording_period_in_seconds: Optional[int] = None,
|
2575
2631
|
set_http_header: Optional['outputs.PolicyWafConfigHumanInteractionChallengeSetHttpHeader'] = None):
|
2576
2632
|
"""
|
2577
|
-
:param bool is_enabled: (Updatable) Enables or disables the
|
2633
|
+
:param bool is_enabled: (Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
2578
2634
|
:param str action: (Updatable) The action to take against requests from detected bots. If unspecified, defaults to `DETECT`.
|
2579
|
-
:param int action_expiration_in_seconds: (Updatable) The number of seconds between challenges
|
2635
|
+
:param int action_expiration_in_seconds: (Updatable) The number of seconds between challenges from the same IP address. If unspecified, defaults to `60`.
|
2580
2636
|
:param 'PolicyWafConfigHumanInteractionChallengeChallengeSettingsArgs' challenge_settings: (Updatable) The challenge settings if `action` is set to `BLOCK`.
|
2581
2637
|
:param int failure_threshold: (Updatable) The number of failed requests before taking action. If unspecified, defaults to `10`.
|
2582
2638
|
:param int failure_threshold_expiration_in_seconds: (Updatable) The number of seconds before the failure threshold resets. If unspecified, defaults to `60`.
|
@@ -2609,7 +2665,7 @@ class PolicyWafConfigHumanInteractionChallenge(dict):
|
|
2609
2665
|
@pulumi.getter(name="isEnabled")
|
2610
2666
|
def is_enabled(self) -> bool:
|
2611
2667
|
"""
|
2612
|
-
(Updatable) Enables or disables the
|
2668
|
+
(Updatable) Enables or disables the JavaScript challenge Web Application Firewall feature.
|
2613
2669
|
"""
|
2614
2670
|
return pulumi.get(self, "is_enabled")
|
2615
2671
|
|
@@ -2625,7 +2681,7 @@ class PolicyWafConfigHumanInteractionChallenge(dict):
|
|
2625
2681
|
@pulumi.getter(name="actionExpirationInSeconds")
|
2626
2682
|
def action_expiration_in_seconds(self) -> Optional[int]:
|
2627
2683
|
"""
|
2628
|
-
(Updatable) The number of seconds between challenges
|
2684
|
+
(Updatable) The number of seconds between challenges from the same IP address. If unspecified, defaults to `60`.
|
2629
2685
|
"""
|
2630
2686
|
return pulumi.get(self, "action_expiration_in_seconds")
|
2631
2687
|
|
@@ -2732,11 +2788,11 @@ class PolicyWafConfigHumanInteractionChallengeChallengeSettings(dict):
|
|
2732
2788
|
captcha_submit_label: Optional[str] = None,
|
2733
2789
|
captcha_title: Optional[str] = None):
|
2734
2790
|
"""
|
2735
|
-
:param str block_action: (Updatable)
|
2736
|
-
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE
|
2737
|
-
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2738
|
-
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2739
|
-
:param int block_response_code: (Updatable) The response
|
2791
|
+
:param str block_action: (Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
2792
|
+
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
2793
|
+
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
2794
|
+
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
2795
|
+
:param int block_response_code: (Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
2740
2796
|
:param str captcha_footer: (Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, default to `Enter the letters and numbers as they are shown in image above`.
|
2741
2797
|
:param str captcha_header: (Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `We have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.`
|
2742
2798
|
:param str captcha_submit_label: (Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Yes, I am human`.
|
@@ -2765,7 +2821,7 @@ class PolicyWafConfigHumanInteractionChallengeChallengeSettings(dict):
|
|
2765
2821
|
@pulumi.getter(name="blockAction")
|
2766
2822
|
def block_action(self) -> Optional[str]:
|
2767
2823
|
"""
|
2768
|
-
(Updatable)
|
2824
|
+
(Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
2769
2825
|
"""
|
2770
2826
|
return pulumi.get(self, "block_action")
|
2771
2827
|
|
@@ -2773,7 +2829,7 @@ class PolicyWafConfigHumanInteractionChallengeChallengeSettings(dict):
|
|
2773
2829
|
@pulumi.getter(name="blockErrorPageCode")
|
2774
2830
|
def block_error_page_code(self) -> Optional[str]:
|
2775
2831
|
"""
|
2776
|
-
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE
|
2832
|
+
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
2777
2833
|
"""
|
2778
2834
|
return pulumi.get(self, "block_error_page_code")
|
2779
2835
|
|
@@ -2781,7 +2837,7 @@ class PolicyWafConfigHumanInteractionChallengeChallengeSettings(dict):
|
|
2781
2837
|
@pulumi.getter(name="blockErrorPageDescription")
|
2782
2838
|
def block_error_page_description(self) -> Optional[str]:
|
2783
2839
|
"""
|
2784
|
-
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2840
|
+
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
2785
2841
|
"""
|
2786
2842
|
return pulumi.get(self, "block_error_page_description")
|
2787
2843
|
|
@@ -2789,7 +2845,7 @@ class PolicyWafConfigHumanInteractionChallengeChallengeSettings(dict):
|
|
2789
2845
|
@pulumi.getter(name="blockErrorPageMessage")
|
2790
2846
|
def block_error_page_message(self) -> Optional[str]:
|
2791
2847
|
"""
|
2792
|
-
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
2848
|
+
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
2793
2849
|
"""
|
2794
2850
|
return pulumi.get(self, "block_error_page_message")
|
2795
2851
|
|
@@ -2797,7 +2853,7 @@ class PolicyWafConfigHumanInteractionChallengeChallengeSettings(dict):
|
|
2797
2853
|
@pulumi.getter(name="blockResponseCode")
|
2798
2854
|
def block_response_code(self) -> Optional[int]:
|
2799
2855
|
"""
|
2800
|
-
(Updatable) The response
|
2856
|
+
(Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
2801
2857
|
"""
|
2802
2858
|
return pulumi.get(self, "block_response_code")
|
2803
2859
|
|
@@ -2840,7 +2896,11 @@ class PolicyWafConfigHumanInteractionChallengeSetHttpHeader(dict):
|
|
2840
2896
|
name: str,
|
2841
2897
|
value: str):
|
2842
2898
|
"""
|
2843
|
-
:param str name: (Updatable) The name of the
|
2899
|
+
:param str name: (Updatable) The unique name of the whitelist.
|
2900
|
+
|
2901
|
+
|
2902
|
+
** IMPORTANT **
|
2903
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
2844
2904
|
:param str value: (Updatable) The value of the header.
|
2845
2905
|
"""
|
2846
2906
|
pulumi.set(__self__, "name", name)
|
@@ -2850,7 +2910,11 @@ class PolicyWafConfigHumanInteractionChallengeSetHttpHeader(dict):
|
|
2850
2910
|
@pulumi.getter
|
2851
2911
|
def name(self) -> str:
|
2852
2912
|
"""
|
2853
|
-
(Updatable) The name of the
|
2913
|
+
(Updatable) The unique name of the whitelist.
|
2914
|
+
|
2915
|
+
|
2916
|
+
** IMPORTANT **
|
2917
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
2854
2918
|
"""
|
2855
2919
|
return pulumi.get(self, "name")
|
2856
2920
|
|
@@ -3052,11 +3116,11 @@ class PolicyWafConfigJsChallengeChallengeSettings(dict):
|
|
3052
3116
|
captcha_submit_label: Optional[str] = None,
|
3053
3117
|
captcha_title: Optional[str] = None):
|
3054
3118
|
"""
|
3055
|
-
:param str block_action: (Updatable)
|
3056
|
-
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE
|
3057
|
-
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
3058
|
-
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
3059
|
-
:param int block_response_code: (Updatable) The response
|
3119
|
+
:param str block_action: (Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
3120
|
+
:param str block_error_page_code: (Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
3121
|
+
:param str block_error_page_description: (Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
3122
|
+
:param str block_error_page_message: (Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
3123
|
+
:param int block_response_code: (Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
3060
3124
|
:param str captcha_footer: (Updatable) The text to show in the footer when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, default to `Enter the letters and numbers as they are shown in image above`.
|
3061
3125
|
:param str captcha_header: (Updatable) The text to show in the header when showing a CAPTCHA challenge when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `We have detected an increased number of attempts to access this webapp. To help us keep this webapp secure, please let us know that you are not a robot by entering the text from captcha below.`
|
3062
3126
|
:param str captcha_submit_label: (Updatable) The text to show on the label of the CAPTCHA challenge submit button when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_CAPTCHA`, and the request is blocked. If unspecified, defaults to `Yes, I am human`.
|
@@ -3085,7 +3149,7 @@ class PolicyWafConfigJsChallengeChallengeSettings(dict):
|
|
3085
3149
|
@pulumi.getter(name="blockAction")
|
3086
3150
|
def block_action(self) -> Optional[str]:
|
3087
3151
|
"""
|
3088
|
-
(Updatable)
|
3152
|
+
(Updatable) If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`.
|
3089
3153
|
"""
|
3090
3154
|
return pulumi.get(self, "block_action")
|
3091
3155
|
|
@@ -3093,7 +3157,7 @@ class PolicyWafConfigJsChallengeChallengeSettings(dict):
|
|
3093
3157
|
@pulumi.getter(name="blockErrorPageCode")
|
3094
3158
|
def block_error_page_code(self) -> Optional[str]:
|
3095
3159
|
"""
|
3096
|
-
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE
|
3160
|
+
(Updatable) The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`.
|
3097
3161
|
"""
|
3098
3162
|
return pulumi.get(self, "block_error_page_code")
|
3099
3163
|
|
@@ -3101,7 +3165,7 @@ class PolicyWafConfigJsChallengeChallengeSettings(dict):
|
|
3101
3165
|
@pulumi.getter(name="blockErrorPageDescription")
|
3102
3166
|
def block_error_page_description(self) -> Optional[str]:
|
3103
3167
|
"""
|
3104
|
-
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
3168
|
+
(Updatable) The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.`
|
3105
3169
|
"""
|
3106
3170
|
return pulumi.get(self, "block_error_page_description")
|
3107
3171
|
|
@@ -3109,7 +3173,7 @@ class PolicyWafConfigJsChallengeChallengeSettings(dict):
|
|
3109
3173
|
@pulumi.getter(name="blockErrorPageMessage")
|
3110
3174
|
def block_error_page_message(self) -> Optional[str]:
|
3111
3175
|
"""
|
3112
|
-
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the
|
3176
|
+
(Updatable) The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.'
|
3113
3177
|
"""
|
3114
3178
|
return pulumi.get(self, "block_error_page_message")
|
3115
3179
|
|
@@ -3117,7 +3181,7 @@ class PolicyWafConfigJsChallengeChallengeSettings(dict):
|
|
3117
3181
|
@pulumi.getter(name="blockResponseCode")
|
3118
3182
|
def block_response_code(self) -> Optional[int]:
|
3119
3183
|
"""
|
3120
|
-
(Updatable) The response
|
3184
|
+
(Updatable) The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`.
|
3121
3185
|
"""
|
3122
3186
|
return pulumi.get(self, "block_response_code")
|
3123
3187
|
|
@@ -3204,7 +3268,7 @@ class PolicyWafConfigJsChallengeCriteria(dict):
|
|
3204
3268
|
* **COUNTRY_IS_NOT:** Matches if the request does not originate from any of countries in the `value` field. The `value` in this case is string with one or multiple countries separated by new line symbol \\n Country codes are in ISO 3166-1 alpha-2 format. For a list of codes, see [ISO's website](https://www.iso.org/obp/ui/#search/code/). *Example:* "AL\\nDZ\\nAM"
|
3205
3269
|
* **USER_AGENT_IS:** Matches if the requesting user agent is identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
3206
3270
|
* **USER_AGENT_IS_NOT:** Matches if the requesting user agent is not identical to the contents of the `value` field. *Example:* `Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:35.0) Gecko/20100101 Firefox/35.0`
|
3207
|
-
:param str value: (Updatable) The
|
3271
|
+
:param str value: (Updatable) The value of the header.
|
3208
3272
|
:param bool is_case_sensitive: (Updatable) When enabled, the condition will be matched with case-sensitive rules.
|
3209
3273
|
"""
|
3210
3274
|
pulumi.set(__self__, "condition", condition)
|
@@ -3249,7 +3313,7 @@ class PolicyWafConfigJsChallengeCriteria(dict):
|
|
3249
3313
|
@pulumi.getter
|
3250
3314
|
def value(self) -> str:
|
3251
3315
|
"""
|
3252
|
-
(Updatable) The
|
3316
|
+
(Updatable) The value of the header.
|
3253
3317
|
"""
|
3254
3318
|
return pulumi.get(self, "value")
|
3255
3319
|
|
@@ -3268,7 +3332,11 @@ class PolicyWafConfigJsChallengeSetHttpHeader(dict):
|
|
3268
3332
|
name: str,
|
3269
3333
|
value: str):
|
3270
3334
|
"""
|
3271
|
-
:param str name: (Updatable) The name of the
|
3335
|
+
:param str name: (Updatable) The unique name of the whitelist.
|
3336
|
+
|
3337
|
+
|
3338
|
+
** IMPORTANT **
|
3339
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
3272
3340
|
:param str value: (Updatable) The value of the header.
|
3273
3341
|
"""
|
3274
3342
|
pulumi.set(__self__, "name", name)
|
@@ -3278,7 +3346,11 @@ class PolicyWafConfigJsChallengeSetHttpHeader(dict):
|
|
3278
3346
|
@pulumi.getter
|
3279
3347
|
def name(self) -> str:
|
3280
3348
|
"""
|
3281
|
-
(Updatable) The name of the
|
3349
|
+
(Updatable) The unique name of the whitelist.
|
3350
|
+
|
3351
|
+
|
3352
|
+
** IMPORTANT **
|
3353
|
+
Any change to a property that does not support update will force the destruction and recreation of the resource with the new property values
|
3282
3354
|
"""
|
3283
3355
|
return pulumi.get(self, "name")
|
3284
3356
|
|