@volcengine/pulumi
Version:
A Pulumi package for creating and managing volcengine cloud resources.
117 lines (116 loc) • 4.64 kB
TypeScript
import * as pulumi from "@pulumi/pulumi";
import * as inputs from "../types/input";
import * as outputs from "../types/output";
/**
* Provides a resource to manage waf vulnerability
* ## Import
*
* WafVulnerability can be imported using the id, e.g.
*
* ```sh
* $ pulumi import volcengine:waf/vulnerability:Vulnerability default resource_id
* ```
*/
export declare class Vulnerability extends pulumi.CustomResource {
/**
* Get an existing Vulnerability resource's state with the given name, ID, and optional extra
* properties used to qualify the lookup.
*
* @param name The _unique_ name of the resulting resource.
* @param id The _unique_ provider ID of the resource to lookup.
* @param state Any extra arguments used during the lookup.
* @param opts Optional settings to control the behavior of the CustomResource.
*/
static get(name: string, id: pulumi.Input<pulumi.ID>, state?: VulnerabilityState, opts?: pulumi.CustomResourceOptions): Vulnerability;
/**
* Returns true if the given object is an instance of Vulnerability. This is designed to work even
* when multiple copies of the Pulumi SDK have been loaded into the same process.
*/
static isInstance(obj: any): obj is Vulnerability;
/**
* Protection mode.
*/
readonly action: pulumi.Output<string>;
/**
* The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
*/
readonly advanceConfig: pulumi.Output<outputs.waf.VulnerabilityAdvanceConfig>;
/**
* Protect website domain names.
*/
readonly host: pulumi.Output<string>;
/**
* Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
*/
readonly ruleDetails: pulumi.Output<outputs.waf.VulnerabilityRuleDetail[]>;
/**
* The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
*/
readonly ruleMode: pulumi.Output<string>;
/**
* Custom rule switch.
*/
readonly systemRuleSwitches: pulumi.Output<outputs.waf.VulnerabilitySystemRuleSwitch[] | undefined>;
/**
* Create a Vulnerability resource with the given unique name, arguments, and options.
*
* @param name The _unique_ name of the resource.
* @param args The arguments to use to populate this resource's properties.
* @param opts A bag of options that control this resource's behavior.
*/
constructor(name: string, args: VulnerabilityArgs, opts?: pulumi.CustomResourceOptions);
}
/**
* Input properties used for looking up and filtering Vulnerability resources.
*/
export interface VulnerabilityState {
/**
* Protection mode.
*/
action?: pulumi.Input<string>;
/**
* The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
*/
advanceConfig?: pulumi.Input<inputs.waf.VulnerabilityAdvanceConfig>;
/**
* Protect website domain names.
*/
host?: pulumi.Input<string>;
/**
* Detailed information of the vulnerability rules. By default, only the vulnerability protection rules of the custom mode are displayed.
*/
ruleDetails?: pulumi.Input<pulumi.Input<inputs.waf.VulnerabilityRuleDetail>[]>;
/**
* The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
*/
ruleMode?: pulumi.Input<string>;
/**
* Custom rule switch.
*/
systemRuleSwitches?: pulumi.Input<pulumi.Input<inputs.waf.VulnerabilitySystemRuleSwitch>[]>;
}
/**
* The set of arguments for constructing a Vulnerability resource.
*/
export interface VulnerabilityArgs {
/**
* Protection mode.
*/
action?: pulumi.Input<string>;
/**
* The advanced configuration of vulnerability protection currently supports automatic blocking of directory traversal attacks and high-frequency scanning attacks.
*/
advanceConfig?: pulumi.Input<inputs.waf.VulnerabilityAdvanceConfig>;
/**
* Protect website domain names.
*/
host: pulumi.Input<string>;
/**
* The enabled vulnerability rule categories, WAF has classified the managed rules according to their strictness.
*/
ruleMode?: pulumi.Input<string>;
/**
* Custom rule switch.
*/
systemRuleSwitches?: pulumi.Input<pulumi.Input<inputs.waf.VulnerabilitySystemRuleSwitch>[]>;
}