opentelekomcloud.WafDedicatedPolicyV1
Explore with Pulumi AI
Up-to-date reference of API arguments for WAF policy you can get at documentation portal.
Manages a WAF dedicated policy resource within OpenTelekomCloud.
Note: For this resource region must be set in environment variable
OS_REGION_NAME
or inclouds.yaml
Example Usage
import * as pulumi from "@pulumi/pulumi";
import * as opentelekomcloud from "@pulumi/opentelekomcloud";
const policy1 = new opentelekomcloud.WafDedicatedPolicyV1("policy1", {
fullDetection: true,
level: 3,
options: [{
cc: true,
crawler: false,
webAttack: false,
webShell: true,
}],
protectionMode: "block",
});
import pulumi
import pulumi_opentelekomcloud as opentelekomcloud
policy1 = opentelekomcloud.WafDedicatedPolicyV1("policy1",
full_detection=True,
level=3,
options=[{
"cc": True,
"crawler": False,
"web_attack": False,
"web_shell": True,
}],
protection_mode="block")
package main
import (
"github.com/pulumi/pulumi-terraform-provider/sdks/go/opentelekomcloud/opentelekomcloud"
"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
)
func main() {
pulumi.Run(func(ctx *pulumi.Context) error {
_, err := opentelekomcloud.NewWafDedicatedPolicyV1(ctx, "policy1", &opentelekomcloud.WafDedicatedPolicyV1Args{
FullDetection: pulumi.Bool(true),
Level: pulumi.Float64(3),
Options: opentelekomcloud.WafDedicatedPolicyV1OptionArray{
&opentelekomcloud.WafDedicatedPolicyV1OptionArgs{
Cc: pulumi.Bool(true),
Crawler: pulumi.Bool(false),
WebAttack: pulumi.Bool(false),
WebShell: pulumi.Bool(true),
},
},
ProtectionMode: pulumi.String("block"),
})
if err != nil {
return err
}
return nil
})
}
using System.Collections.Generic;
using System.Linq;
using Pulumi;
using Opentelekomcloud = Pulumi.Opentelekomcloud;
return await Deployment.RunAsync(() =>
{
var policy1 = new Opentelekomcloud.WafDedicatedPolicyV1("policy1", new()
{
FullDetection = true,
Level = 3,
Options = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedPolicyV1OptionArgs
{
Cc = true,
Crawler = false,
WebAttack = false,
WebShell = true,
},
},
ProtectionMode = "block",
});
});
package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.opentelekomcloud.WafDedicatedPolicyV1;
import com.pulumi.opentelekomcloud.WafDedicatedPolicyV1Args;
import com.pulumi.opentelekomcloud.inputs.WafDedicatedPolicyV1OptionArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var policy1 = new WafDedicatedPolicyV1("policy1", WafDedicatedPolicyV1Args.builder()
.fullDetection(true)
.level(3)
.options(WafDedicatedPolicyV1OptionArgs.builder()
.cc(true)
.crawler(false)
.webAttack(false)
.webShell(true)
.build())
.protectionMode("block")
.build());
}
}
resources:
policy1:
type: opentelekomcloud:WafDedicatedPolicyV1
properties:
fullDetection: true
level: 3
options:
- cc: true
crawler: false
webAttack: false
webShell: true
protectionMode: block
Create WafDedicatedPolicyV1 Resource
Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.
Constructor syntax
new WafDedicatedPolicyV1(name: string, args?: WafDedicatedPolicyV1Args, opts?: CustomResourceOptions);
@overload
def WafDedicatedPolicyV1(resource_name: str,
args: Optional[WafDedicatedPolicyV1Args] = None,
opts: Optional[ResourceOptions] = None)
@overload
def WafDedicatedPolicyV1(resource_name: str,
opts: Optional[ResourceOptions] = None,
deep_inspection: Optional[bool] = None,
full_detection: Optional[bool] = None,
header_inspection: Optional[bool] = None,
level: Optional[float] = None,
name: Optional[str] = None,
options: Optional[Sequence[WafDedicatedPolicyV1OptionArgs]] = None,
protection_mode: Optional[str] = None,
region: Optional[str] = None,
shiro_decryption_check: Optional[bool] = None,
timeouts: Optional[WafDedicatedPolicyV1TimeoutsArgs] = None,
waf_dedicated_policy_v1_id: Optional[str] = None)
func NewWafDedicatedPolicyV1(ctx *Context, name string, args *WafDedicatedPolicyV1Args, opts ...ResourceOption) (*WafDedicatedPolicyV1, error)
public WafDedicatedPolicyV1(string name, WafDedicatedPolicyV1Args? args = null, CustomResourceOptions? opts = null)
public WafDedicatedPolicyV1(String name, WafDedicatedPolicyV1Args args)
public WafDedicatedPolicyV1(String name, WafDedicatedPolicyV1Args args, CustomResourceOptions options)
type: opentelekomcloud:WafDedicatedPolicyV1
properties: # The arguments to resource properties.
options: # Bag of options to control resource's behavior.
Parameters
- name string
- The unique name of the resource.
- args WafDedicatedPolicyV1Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- resource_name str
- The unique name of the resource.
- args WafDedicatedPolicyV1Args
- The arguments to resource properties.
- opts ResourceOptions
- Bag of options to control resource's behavior.
- ctx Context
- Context object for the current deployment.
- name string
- The unique name of the resource.
- args WafDedicatedPolicyV1Args
- The arguments to resource properties.
- opts ResourceOption
- Bag of options to control resource's behavior.
- name string
- The unique name of the resource.
- args WafDedicatedPolicyV1Args
- The arguments to resource properties.
- opts CustomResourceOptions
- Bag of options to control resource's behavior.
- name String
- The unique name of the resource.
- args WafDedicatedPolicyV1Args
- The arguments to resource properties.
- options CustomResourceOptions
- Bag of options to control resource's behavior.
Constructor example
The following reference example uses placeholder values for all input properties.
var wafDedicatedPolicyV1Resource = new Opentelekomcloud.WafDedicatedPolicyV1("wafDedicatedPolicyV1Resource", new()
{
DeepInspection = false,
FullDetection = false,
HeaderInspection = false,
Level = 0,
Name = "string",
Options = new[]
{
new Opentelekomcloud.Inputs.WafDedicatedPolicyV1OptionArgs
{
AntiCrawler = false,
AntiLeakage = false,
AntiTamper = false,
Blacklist = false,
BotEnable = false,
Cc = false,
Common = false,
Crawler = false,
CrawlerEngine = false,
CrawlerOther = false,
CrawlerScanner = false,
CrawlerScript = false,
Custom = false,
FollowedAction = false,
GeolocationAccessControl = false,
Ignore = false,
Precise = false,
Privacy = false,
WebAttack = false,
WebShell = false,
},
},
ProtectionMode = "string",
Region = "string",
ShiroDecryptionCheck = false,
Timeouts = new Opentelekomcloud.Inputs.WafDedicatedPolicyV1TimeoutsArgs
{
Create = "string",
Delete = "string",
},
WafDedicatedPolicyV1Id = "string",
});
example, err := opentelekomcloud.NewWafDedicatedPolicyV1(ctx, "wafDedicatedPolicyV1Resource", &opentelekomcloud.WafDedicatedPolicyV1Args{
DeepInspection: pulumi.Bool(false),
FullDetection: pulumi.Bool(false),
HeaderInspection: pulumi.Bool(false),
Level: pulumi.Float64(0),
Name: pulumi.String("string"),
Options: opentelekomcloud.WafDedicatedPolicyV1OptionArray{
&opentelekomcloud.WafDedicatedPolicyV1OptionArgs{
AntiCrawler: pulumi.Bool(false),
AntiLeakage: pulumi.Bool(false),
AntiTamper: pulumi.Bool(false),
Blacklist: pulumi.Bool(false),
BotEnable: pulumi.Bool(false),
Cc: pulumi.Bool(false),
Common: pulumi.Bool(false),
Crawler: pulumi.Bool(false),
CrawlerEngine: pulumi.Bool(false),
CrawlerOther: pulumi.Bool(false),
CrawlerScanner: pulumi.Bool(false),
CrawlerScript: pulumi.Bool(false),
Custom: pulumi.Bool(false),
FollowedAction: pulumi.Bool(false),
GeolocationAccessControl: pulumi.Bool(false),
Ignore: pulumi.Bool(false),
Precise: pulumi.Bool(false),
Privacy: pulumi.Bool(false),
WebAttack: pulumi.Bool(false),
WebShell: pulumi.Bool(false),
},
},
ProtectionMode: pulumi.String("string"),
Region: pulumi.String("string"),
ShiroDecryptionCheck: pulumi.Bool(false),
Timeouts: &opentelekomcloud.WafDedicatedPolicyV1TimeoutsArgs{
Create: pulumi.String("string"),
Delete: pulumi.String("string"),
},
WafDedicatedPolicyV1Id: pulumi.String("string"),
})
var wafDedicatedPolicyV1Resource = new WafDedicatedPolicyV1("wafDedicatedPolicyV1Resource", WafDedicatedPolicyV1Args.builder()
.deepInspection(false)
.fullDetection(false)
.headerInspection(false)
.level(0)
.name("string")
.options(WafDedicatedPolicyV1OptionArgs.builder()
.antiCrawler(false)
.antiLeakage(false)
.antiTamper(false)
.blacklist(false)
.botEnable(false)
.cc(false)
.common(false)
.crawler(false)
.crawlerEngine(false)
.crawlerOther(false)
.crawlerScanner(false)
.crawlerScript(false)
.custom(false)
.followedAction(false)
.geolocationAccessControl(false)
.ignore(false)
.precise(false)
.privacy(false)
.webAttack(false)
.webShell(false)
.build())
.protectionMode("string")
.region("string")
.shiroDecryptionCheck(false)
.timeouts(WafDedicatedPolicyV1TimeoutsArgs.builder()
.create("string")
.delete("string")
.build())
.wafDedicatedPolicyV1Id("string")
.build());
waf_dedicated_policy_v1_resource = opentelekomcloud.WafDedicatedPolicyV1("wafDedicatedPolicyV1Resource",
deep_inspection=False,
full_detection=False,
header_inspection=False,
level=0,
name="string",
options=[{
"anti_crawler": False,
"anti_leakage": False,
"anti_tamper": False,
"blacklist": False,
"bot_enable": False,
"cc": False,
"common": False,
"crawler": False,
"crawler_engine": False,
"crawler_other": False,
"crawler_scanner": False,
"crawler_script": False,
"custom": False,
"followed_action": False,
"geolocation_access_control": False,
"ignore": False,
"precise": False,
"privacy": False,
"web_attack": False,
"web_shell": False,
}],
protection_mode="string",
region="string",
shiro_decryption_check=False,
timeouts={
"create": "string",
"delete": "string",
},
waf_dedicated_policy_v1_id="string")
const wafDedicatedPolicyV1Resource = new opentelekomcloud.WafDedicatedPolicyV1("wafDedicatedPolicyV1Resource", {
deepInspection: false,
fullDetection: false,
headerInspection: false,
level: 0,
name: "string",
options: [{
antiCrawler: false,
antiLeakage: false,
antiTamper: false,
blacklist: false,
botEnable: false,
cc: false,
common: false,
crawler: false,
crawlerEngine: false,
crawlerOther: false,
crawlerScanner: false,
crawlerScript: false,
custom: false,
followedAction: false,
geolocationAccessControl: false,
ignore: false,
precise: false,
privacy: false,
webAttack: false,
webShell: false,
}],
protectionMode: "string",
region: "string",
shiroDecryptionCheck: false,
timeouts: {
create: "string",
"delete": "string",
},
wafDedicatedPolicyV1Id: "string",
});
type: opentelekomcloud:WafDedicatedPolicyV1
properties:
deepInspection: false
fullDetection: false
headerInspection: false
level: 0
name: string
options:
- antiCrawler: false
antiLeakage: false
antiTamper: false
blacklist: false
botEnable: false
cc: false
common: false
crawler: false
crawlerEngine: false
crawlerOther: false
crawlerScanner: false
crawlerScript: false
custom: false
followedAction: false
geolocationAccessControl: false
ignore: false
precise: false
privacy: false
webAttack: false
webShell: false
protectionMode: string
region: string
shiroDecryptionCheck: false
timeouts:
create: string
delete: string
wafDedicatedPolicyV1Id: string
WafDedicatedPolicyV1 Resource Properties
To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.
Inputs
In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.
The WafDedicatedPolicyV1 resource accepts the following input properties:
- Deep
Inspection bool - The deep inspection in basic web protection.
- Full
Detection bool - Specifies the detection mode in Precise Protection.
- Header
Inspection bool - The header inspection in basic web protection.
- Level double
- Specifies the protection level. Values are:
- Name string
- The policy name.
- Options
List<Waf
Dedicated Policy V1Option> - Specifies the protection switches.
The
options
block supports: - Protection
Mode string - Specifies the protective action after a rule is matched. Values are:
- Region string
- Shiro
Decryption boolCheck - The shiro decryption check in basic web protection.
- Timeouts
Waf
Dedicated Policy V1Timeouts - Waf
Dedicated stringPolicy V1Id - ID of the policy.
- Deep
Inspection bool - The deep inspection in basic web protection.
- Full
Detection bool - Specifies the detection mode in Precise Protection.
- Header
Inspection bool - The header inspection in basic web protection.
- Level float64
- Specifies the protection level. Values are:
- Name string
- The policy name.
- Options
[]Waf
Dedicated Policy V1Option Args - Specifies the protection switches.
The
options
block supports: - Protection
Mode string - Specifies the protective action after a rule is matched. Values are:
- Region string
- Shiro
Decryption boolCheck - The shiro decryption check in basic web protection.
- Timeouts
Waf
Dedicated Policy V1Timeouts Args - Waf
Dedicated stringPolicy V1Id - ID of the policy.
- deep
Inspection Boolean - The deep inspection in basic web protection.
- full
Detection Boolean - Specifies the detection mode in Precise Protection.
- header
Inspection Boolean - The header inspection in basic web protection.
- level Double
- Specifies the protection level. Values are:
- name String
- The policy name.
- options
List<Waf
Dedicated Policy V1Option> - Specifies the protection switches.
The
options
block supports: - protection
Mode String - Specifies the protective action after a rule is matched. Values are:
- region String
- shiro
Decryption BooleanCheck - The shiro decryption check in basic web protection.
- timeouts
Waf
Dedicated Policy V1Timeouts - waf
Dedicated StringPolicy V1Id - ID of the policy.
- deep
Inspection boolean - The deep inspection in basic web protection.
- full
Detection boolean - Specifies the detection mode in Precise Protection.
- header
Inspection boolean - The header inspection in basic web protection.
- level number
- Specifies the protection level. Values are:
- name string
- The policy name.
- options
Waf
Dedicated Policy V1Option[] - Specifies the protection switches.
The
options
block supports: - protection
Mode string - Specifies the protective action after a rule is matched. Values are:
- region string
- shiro
Decryption booleanCheck - The shiro decryption check in basic web protection.
- timeouts
Waf
Dedicated Policy V1Timeouts - waf
Dedicated stringPolicy V1Id - ID of the policy.
- deep_
inspection bool - The deep inspection in basic web protection.
- full_
detection bool - Specifies the detection mode in Precise Protection.
- header_
inspection bool - The header inspection in basic web protection.
- level float
- Specifies the protection level. Values are:
- name str
- The policy name.
- options
Sequence[Waf
Dedicated Policy V1Option Args] - Specifies the protection switches.
The
options
block supports: - protection_
mode str - Specifies the protective action after a rule is matched. Values are:
- region str
- shiro_
decryption_ boolcheck - The shiro decryption check in basic web protection.
- timeouts
Waf
Dedicated Policy V1Timeouts Args - waf_
dedicated_ strpolicy_ v1_ id - ID of the policy.
- deep
Inspection Boolean - The deep inspection in basic web protection.
- full
Detection Boolean - Specifies the detection mode in Precise Protection.
- header
Inspection Boolean - The header inspection in basic web protection.
- level Number
- Specifies the protection level. Values are:
- name String
- The policy name.
- options List<Property Map>
- Specifies the protection switches.
The
options
block supports: - protection
Mode String - Specifies the protective action after a rule is matched. Values are:
- region String
- shiro
Decryption BooleanCheck - The shiro decryption check in basic web protection.
- timeouts Property Map
- waf
Dedicated StringPolicy V1Id - ID of the policy.
Outputs
All input properties are implicitly available as output properties. Additionally, the WafDedicatedPolicyV1 resource produces the following output properties:
- created_
at float - Time the policy is created. The value is a 13-digit timestamp, in ms.
- domains Sequence[str]
- Specifies the domain IDs.
- id str
- The provider-assigned unique ID for this managed resource.
Look up Existing WafDedicatedPolicyV1 Resource
Get an existing WafDedicatedPolicyV1 resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.
public static get(name: string, id: Input<ID>, state?: WafDedicatedPolicyV1State, opts?: CustomResourceOptions): WafDedicatedPolicyV1
@staticmethod
def get(resource_name: str,
id: str,
opts: Optional[ResourceOptions] = None,
created_at: Optional[float] = None,
deep_inspection: Optional[bool] = None,
domains: Optional[Sequence[str]] = None,
full_detection: Optional[bool] = None,
header_inspection: Optional[bool] = None,
level: Optional[float] = None,
name: Optional[str] = None,
options: Optional[Sequence[WafDedicatedPolicyV1OptionArgs]] = None,
protection_mode: Optional[str] = None,
region: Optional[str] = None,
shiro_decryption_check: Optional[bool] = None,
timeouts: Optional[WafDedicatedPolicyV1TimeoutsArgs] = None,
waf_dedicated_policy_v1_id: Optional[str] = None) -> WafDedicatedPolicyV1
func GetWafDedicatedPolicyV1(ctx *Context, name string, id IDInput, state *WafDedicatedPolicyV1State, opts ...ResourceOption) (*WafDedicatedPolicyV1, error)
public static WafDedicatedPolicyV1 Get(string name, Input<string> id, WafDedicatedPolicyV1State? state, CustomResourceOptions? opts = null)
public static WafDedicatedPolicyV1 get(String name, Output<String> id, WafDedicatedPolicyV1State state, CustomResourceOptions options)
resources: _: type: opentelekomcloud:WafDedicatedPolicyV1 get: id: ${id}
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- resource_name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- name
- The unique name of the resulting resource.
- id
- The unique provider ID of the resource to lookup.
- state
- Any extra arguments used during the lookup.
- opts
- A bag of options that control this resource's behavior.
- Created
At double - Time the policy is created. The value is a 13-digit timestamp, in ms.
- Deep
Inspection bool - The deep inspection in basic web protection.
- Domains List<string>
- Specifies the domain IDs.
- Full
Detection bool - Specifies the detection mode in Precise Protection.
- Header
Inspection bool - The header inspection in basic web protection.
- Level double
- Specifies the protection level. Values are:
- Name string
- The policy name.
- Options
List<Waf
Dedicated Policy V1Option> - Specifies the protection switches.
The
options
block supports: - Protection
Mode string - Specifies the protective action after a rule is matched. Values are:
- Region string
- Shiro
Decryption boolCheck - The shiro decryption check in basic web protection.
- Timeouts
Waf
Dedicated Policy V1Timeouts - Waf
Dedicated stringPolicy V1Id - ID of the policy.
- Created
At float64 - Time the policy is created. The value is a 13-digit timestamp, in ms.
- Deep
Inspection bool - The deep inspection in basic web protection.
- Domains []string
- Specifies the domain IDs.
- Full
Detection bool - Specifies the detection mode in Precise Protection.
- Header
Inspection bool - The header inspection in basic web protection.
- Level float64
- Specifies the protection level. Values are:
- Name string
- The policy name.
- Options
[]Waf
Dedicated Policy V1Option Args - Specifies the protection switches.
The
options
block supports: - Protection
Mode string - Specifies the protective action after a rule is matched. Values are:
- Region string
- Shiro
Decryption boolCheck - The shiro decryption check in basic web protection.
- Timeouts
Waf
Dedicated Policy V1Timeouts Args - Waf
Dedicated stringPolicy V1Id - ID of the policy.
- created
At Double - Time the policy is created. The value is a 13-digit timestamp, in ms.
- deep
Inspection Boolean - The deep inspection in basic web protection.
- domains List<String>
- Specifies the domain IDs.
- full
Detection Boolean - Specifies the detection mode in Precise Protection.
- header
Inspection Boolean - The header inspection in basic web protection.
- level Double
- Specifies the protection level. Values are:
- name String
- The policy name.
- options
List<Waf
Dedicated Policy V1Option> - Specifies the protection switches.
The
options
block supports: - protection
Mode String - Specifies the protective action after a rule is matched. Values are:
- region String
- shiro
Decryption BooleanCheck - The shiro decryption check in basic web protection.
- timeouts
Waf
Dedicated Policy V1Timeouts - waf
Dedicated StringPolicy V1Id - ID of the policy.
- created
At number - Time the policy is created. The value is a 13-digit timestamp, in ms.
- deep
Inspection boolean - The deep inspection in basic web protection.
- domains string[]
- Specifies the domain IDs.
- full
Detection boolean - Specifies the detection mode in Precise Protection.
- header
Inspection boolean - The header inspection in basic web protection.
- level number
- Specifies the protection level. Values are:
- name string
- The policy name.
- options
Waf
Dedicated Policy V1Option[] - Specifies the protection switches.
The
options
block supports: - protection
Mode string - Specifies the protective action after a rule is matched. Values are:
- region string
- shiro
Decryption booleanCheck - The shiro decryption check in basic web protection.
- timeouts
Waf
Dedicated Policy V1Timeouts - waf
Dedicated stringPolicy V1Id - ID of the policy.
- created_
at float - Time the policy is created. The value is a 13-digit timestamp, in ms.
- deep_
inspection bool - The deep inspection in basic web protection.
- domains Sequence[str]
- Specifies the domain IDs.
- full_
detection bool - Specifies the detection mode in Precise Protection.
- header_
inspection bool - The header inspection in basic web protection.
- level float
- Specifies the protection level. Values are:
- name str
- The policy name.
- options
Sequence[Waf
Dedicated Policy V1Option Args] - Specifies the protection switches.
The
options
block supports: - protection_
mode str - Specifies the protective action after a rule is matched. Values are:
- region str
- shiro_
decryption_ boolcheck - The shiro decryption check in basic web protection.
- timeouts
Waf
Dedicated Policy V1Timeouts Args - waf_
dedicated_ strpolicy_ v1_ id - ID of the policy.
- created
At Number - Time the policy is created. The value is a 13-digit timestamp, in ms.
- deep
Inspection Boolean - The deep inspection in basic web protection.
- domains List<String>
- Specifies the domain IDs.
- full
Detection Boolean - Specifies the detection mode in Precise Protection.
- header
Inspection Boolean - The header inspection in basic web protection.
- level Number
- Specifies the protection level. Values are:
- name String
- The policy name.
- options List<Property Map>
- Specifies the protection switches.
The
options
block supports: - protection
Mode String - Specifies the protective action after a rule is matched. Values are:
- region String
- shiro
Decryption BooleanCheck - The shiro decryption check in basic web protection.
- timeouts Property Map
- waf
Dedicated StringPolicy V1Id - ID of the policy.
Supporting Types
WafDedicatedPolicyV1Option, WafDedicatedPolicyV1OptionArgs
- Anti
Crawler bool - JavaScript anti-crawler function.
- Anti
Leakage bool - Whether the information leakage prevention is enabled.
- Anti
Tamper bool - Specifies whether Web Tamper Protection is enabled.
- Blacklist bool
- Specifies whether Blacklist and Whitelist is enabled.
- Bot
Enable bool - Cc bool
- Specifies whether CC Attack Protection is enabled.
- Common bool
- Specifies whether General Check in Basic Web Protection is enabled.
- Crawler bool
- Specifies whether the master crawler detection switch in Basic Web Protection is enabled.
- Crawler
Engine bool - Specifies whether the Search Engine switch in Basic Web Protection is enabled.
- Crawler
Other bool - Specifies whether detection of other crawlers in Basic Web Protection is enabled.
- Crawler
Scanner bool - Specifies whether the Scanner switch in Basic Web Protection is enabled.
- Crawler
Script bool - Specifies whether the Script Tool switch in Basic Web Protection is enabled.
- Custom bool
- Specifies whether Precise Protection is enabled.
- Followed
Action bool - Whether the Known Attack Source protection is enabled.
- Geolocation
Access boolControl - Whether geolocation access control is enabled.
- Ignore bool
- Specifies whether False Alarm Masking is enabled.
- Precise bool
- Privacy bool
- Specifies whether Data Masking is enabled.
- Web
Attack bool - Specifies whether Basic Web Protection is enabled.
- Web
Shell bool - Specifies whether webshell detection in Basic Web Protection is enabled.
- Anti
Crawler bool - JavaScript anti-crawler function.
- Anti
Leakage bool - Whether the information leakage prevention is enabled.
- Anti
Tamper bool - Specifies whether Web Tamper Protection is enabled.
- Blacklist bool
- Specifies whether Blacklist and Whitelist is enabled.
- Bot
Enable bool - Cc bool
- Specifies whether CC Attack Protection is enabled.
- Common bool
- Specifies whether General Check in Basic Web Protection is enabled.
- Crawler bool
- Specifies whether the master crawler detection switch in Basic Web Protection is enabled.
- Crawler
Engine bool - Specifies whether the Search Engine switch in Basic Web Protection is enabled.
- Crawler
Other bool - Specifies whether detection of other crawlers in Basic Web Protection is enabled.
- Crawler
Scanner bool - Specifies whether the Scanner switch in Basic Web Protection is enabled.
- Crawler
Script bool - Specifies whether the Script Tool switch in Basic Web Protection is enabled.
- Custom bool
- Specifies whether Precise Protection is enabled.
- Followed
Action bool - Whether the Known Attack Source protection is enabled.
- Geolocation
Access boolControl - Whether geolocation access control is enabled.
- Ignore bool
- Specifies whether False Alarm Masking is enabled.
- Precise bool
- Privacy bool
- Specifies whether Data Masking is enabled.
- Web
Attack bool - Specifies whether Basic Web Protection is enabled.
- Web
Shell bool - Specifies whether webshell detection in Basic Web Protection is enabled.
- anti
Crawler Boolean - JavaScript anti-crawler function.
- anti
Leakage Boolean - Whether the information leakage prevention is enabled.
- anti
Tamper Boolean - Specifies whether Web Tamper Protection is enabled.
- blacklist Boolean
- Specifies whether Blacklist and Whitelist is enabled.
- bot
Enable Boolean - cc Boolean
- Specifies whether CC Attack Protection is enabled.
- common Boolean
- Specifies whether General Check in Basic Web Protection is enabled.
- crawler Boolean
- Specifies whether the master crawler detection switch in Basic Web Protection is enabled.
- crawler
Engine Boolean - Specifies whether the Search Engine switch in Basic Web Protection is enabled.
- crawler
Other Boolean - Specifies whether detection of other crawlers in Basic Web Protection is enabled.
- crawler
Scanner Boolean - Specifies whether the Scanner switch in Basic Web Protection is enabled.
- crawler
Script Boolean - Specifies whether the Script Tool switch in Basic Web Protection is enabled.
- custom Boolean
- Specifies whether Precise Protection is enabled.
- followed
Action Boolean - Whether the Known Attack Source protection is enabled.
- geolocation
Access BooleanControl - Whether geolocation access control is enabled.
- ignore Boolean
- Specifies whether False Alarm Masking is enabled.
- precise Boolean
- privacy Boolean
- Specifies whether Data Masking is enabled.
- web
Attack Boolean - Specifies whether Basic Web Protection is enabled.
- web
Shell Boolean - Specifies whether webshell detection in Basic Web Protection is enabled.
- anti
Crawler boolean - JavaScript anti-crawler function.
- anti
Leakage boolean - Whether the information leakage prevention is enabled.
- anti
Tamper boolean - Specifies whether Web Tamper Protection is enabled.
- blacklist boolean
- Specifies whether Blacklist and Whitelist is enabled.
- bot
Enable boolean - cc boolean
- Specifies whether CC Attack Protection is enabled.
- common boolean
- Specifies whether General Check in Basic Web Protection is enabled.
- crawler boolean
- Specifies whether the master crawler detection switch in Basic Web Protection is enabled.
- crawler
Engine boolean - Specifies whether the Search Engine switch in Basic Web Protection is enabled.
- crawler
Other boolean - Specifies whether detection of other crawlers in Basic Web Protection is enabled.
- crawler
Scanner boolean - Specifies whether the Scanner switch in Basic Web Protection is enabled.
- crawler
Script boolean - Specifies whether the Script Tool switch in Basic Web Protection is enabled.
- custom boolean
- Specifies whether Precise Protection is enabled.
- followed
Action boolean - Whether the Known Attack Source protection is enabled.
- geolocation
Access booleanControl - Whether geolocation access control is enabled.
- ignore boolean
- Specifies whether False Alarm Masking is enabled.
- precise boolean
- privacy boolean
- Specifies whether Data Masking is enabled.
- web
Attack boolean - Specifies whether Basic Web Protection is enabled.
- web
Shell boolean - Specifies whether webshell detection in Basic Web Protection is enabled.
- anti_
crawler bool - JavaScript anti-crawler function.
- anti_
leakage bool - Whether the information leakage prevention is enabled.
- anti_
tamper bool - Specifies whether Web Tamper Protection is enabled.
- blacklist bool
- Specifies whether Blacklist and Whitelist is enabled.
- bot_
enable bool - cc bool
- Specifies whether CC Attack Protection is enabled.
- common bool
- Specifies whether General Check in Basic Web Protection is enabled.
- crawler bool
- Specifies whether the master crawler detection switch in Basic Web Protection is enabled.
- crawler_
engine bool - Specifies whether the Search Engine switch in Basic Web Protection is enabled.
- crawler_
other bool - Specifies whether detection of other crawlers in Basic Web Protection is enabled.
- crawler_
scanner bool - Specifies whether the Scanner switch in Basic Web Protection is enabled.
- crawler_
script bool - Specifies whether the Script Tool switch in Basic Web Protection is enabled.
- custom bool
- Specifies whether Precise Protection is enabled.
- followed_
action bool - Whether the Known Attack Source protection is enabled.
- geolocation_
access_ boolcontrol - Whether geolocation access control is enabled.
- ignore bool
- Specifies whether False Alarm Masking is enabled.
- precise bool
- privacy bool
- Specifies whether Data Masking is enabled.
- web_
attack bool - Specifies whether Basic Web Protection is enabled.
- web_
shell bool - Specifies whether webshell detection in Basic Web Protection is enabled.
- anti
Crawler Boolean - JavaScript anti-crawler function.
- anti
Leakage Boolean - Whether the information leakage prevention is enabled.
- anti
Tamper Boolean - Specifies whether Web Tamper Protection is enabled.
- blacklist Boolean
- Specifies whether Blacklist and Whitelist is enabled.
- bot
Enable Boolean - cc Boolean
- Specifies whether CC Attack Protection is enabled.
- common Boolean
- Specifies whether General Check in Basic Web Protection is enabled.
- crawler Boolean
- Specifies whether the master crawler detection switch in Basic Web Protection is enabled.
- crawler
Engine Boolean - Specifies whether the Search Engine switch in Basic Web Protection is enabled.
- crawler
Other Boolean - Specifies whether detection of other crawlers in Basic Web Protection is enabled.
- crawler
Scanner Boolean - Specifies whether the Scanner switch in Basic Web Protection is enabled.
- crawler
Script Boolean - Specifies whether the Script Tool switch in Basic Web Protection is enabled.
- custom Boolean
- Specifies whether Precise Protection is enabled.
- followed
Action Boolean - Whether the Known Attack Source protection is enabled.
- geolocation
Access BooleanControl - Whether geolocation access control is enabled.
- ignore Boolean
- Specifies whether False Alarm Masking is enabled.
- precise Boolean
- privacy Boolean
- Specifies whether Data Masking is enabled.
- web
Attack Boolean - Specifies whether Basic Web Protection is enabled.
- web
Shell Boolean - Specifies whether webshell detection in Basic Web Protection is enabled.
WafDedicatedPolicyV1Timeouts, WafDedicatedPolicyV1TimeoutsArgs
Import
WAF dedicated policies can be imported using the id
, e.g.
$ pulumi import opentelekomcloud:index/wafDedicatedPolicyV1:WafDedicatedPolicyV1 policy_1 7117d38e-4c8f-4624-a505-bd96b97d024c
To learn more about importing existing cloud resources, see Importing resources.
Package Details
- Repository
- opentelekomcloud opentelekomcloud/terraform-provider-opentelekomcloud
- License
- Notes
- This Pulumi package is based on the
opentelekomcloud
Terraform Provider.