cloudflare
Version:
The official TypeScript library for the Cloudflare API
418 lines • 15.1 kB
TypeScript
import * as Core from 'cloudflare/core';
import { APIResource } from 'cloudflare/resource';
import * as RulesAPI from 'cloudflare/resources/firewall/waf/packages/rules';
import { V4PagePaginationArray, type V4PagePaginationArrayParams } from 'cloudflare/pagination';
export declare class Rules extends APIResource {
/**
* Fetches WAF rules in a WAF package.
*
* **Note:** Applies only to the
* [previous version of WAF managed rules](https://developers.cloudflare.com/support/firewall/managed-rules-web-application-firewall-waf/understanding-waf-managed-rules-web-application-firewall/).
*/
list(packageId: string, params: RuleListParams, options?: Core.RequestOptions): Core.PagePromise<WAFManagedRulesRulesV4PagePaginationArray, WAFManagedRulesRule>;
/**
* Updates a WAF rule. You can only update the mode/action of the rule.
*
* **Note:** Applies only to the
* [previous version of WAF managed rules](https://developers.cloudflare.com/support/firewall/managed-rules-web-application-firewall-waf/understanding-waf-managed-rules-web-application-firewall/).
*/
edit(packageId: string, ruleId: string, params: RuleEditParams, options?: Core.RequestOptions): Core.APIPromise<RuleEditResponse>;
/**
* Fetches the details of a WAF rule in a WAF package.
*
* **Note:** Applies only to the
* [previous version of WAF managed rules](https://developers.cloudflare.com/support/firewall/managed-rules-web-application-firewall-waf/understanding-waf-managed-rules-web-application-firewall/).
*/
get(packageId: string, ruleId: string, params: RuleGetParams, options?: Core.RequestOptions): Core.APIPromise<RuleGetResponse>;
}
export declare class WAFManagedRulesRulesV4PagePaginationArray extends V4PagePaginationArray<WAFManagedRulesRule> {
}
/**
* When triggered, anomaly detection WAF rules contribute to an overall threat
* score that will determine if a request is considered malicious. You can
* configure the total scoring threshold through the 'sensitivity' property of the
* WAF package.
*/
export type WAFManagedRulesRule = WAFManagedRulesRule.WAFManagedRulesAnomalyRule | WAFManagedRulesRule.WAFManagedRulesTraditionalDenyRule | WAFManagedRulesRule.WAFManagedRulesTraditionalAllowRule;
export declare namespace WAFManagedRulesRule {
/**
* When triggered, anomaly detection WAF rules contribute to an overall threat
* score that will determine if a request is considered malicious. You can
* configure the total scoring threshold through the 'sensitivity' property of the
* WAF package.
*/
interface WAFManagedRulesAnomalyRule {
/**
* The unique identifier of the WAF rule.
*/
id: string;
/**
* Defines the available modes for the current WAF rule. Applies to anomaly
* detection WAF rules.
*/
allowed_modes: Array<'on' | 'off'>;
/**
* The public description of the WAF rule.
*/
description: string;
/**
* The rule group to which the current WAF rule belongs.
*/
group: WAFManagedRulesAnomalyRule.Group;
/**
* When set to `on`, the current WAF rule will be used when evaluating the request.
* Applies to anomaly detection WAF rules.
*/
mode: 'on' | 'off';
/**
* The unique identifier of a WAF package.
*/
package_id: string;
/**
* The order in which the individual WAF rule is executed within its rule group.
*/
priority: string;
}
namespace WAFManagedRulesAnomalyRule {
/**
* The rule group to which the current WAF rule belongs.
*/
interface Group {
/**
* The unique identifier of the rule group.
*/
id?: string;
/**
* The name of the rule group.
*/
name?: string;
}
}
/**
* When triggered, traditional WAF rules cause the firewall to immediately act upon
* the request based on the configuration of the rule. A 'deny' rule will
* immediately respond to the request based on the configured rule action/mode (for
* example, 'block') and no other rules will be processed.
*/
interface WAFManagedRulesTraditionalDenyRule {
/**
* The unique identifier of the WAF rule.
*/
id: string;
/**
* The list of possible actions of the WAF rule when it is triggered.
*/
allowed_modes: Array<'default' | 'disable' | 'simulate' | 'block' | 'challenge'>;
/**
* The default action/mode of a rule.
*/
default_mode: 'disable' | 'simulate' | 'block' | 'challenge';
/**
* The public description of the WAF rule.
*/
description: string;
/**
* The rule group to which the current WAF rule belongs.
*/
group: WAFManagedRulesTraditionalDenyRule.Group;
/**
* The action that the current WAF rule will perform when triggered. Applies to
* traditional (deny) WAF rules.
*/
mode: 'default' | 'disable' | 'simulate' | 'block' | 'challenge';
/**
* The unique identifier of a WAF package.
*/
package_id: string;
/**
* The order in which the individual WAF rule is executed within its rule group.
*/
priority: string;
}
namespace WAFManagedRulesTraditionalDenyRule {
/**
* The rule group to which the current WAF rule belongs.
*/
interface Group {
/**
* The unique identifier of the rule group.
*/
id?: string;
/**
* The name of the rule group.
*/
name?: string;
}
}
/**
* When triggered, traditional WAF rules cause the firewall to immediately act on
* the request based on the rule configuration. An 'allow' rule will immediately
* allow the request and no other rules will be processed.
*/
interface WAFManagedRulesTraditionalAllowRule {
/**
* The unique identifier of the WAF rule.
*/
id: string;
/**
* Defines the available modes for the current WAF rule.
*/
allowed_modes: Array<'on' | 'off'>;
/**
* The public description of the WAF rule.
*/
description: string;
/**
* The rule group to which the current WAF rule belongs.
*/
group: WAFManagedRulesTraditionalAllowRule.Group;
/**
* When set to `on`, the current rule will be used when evaluating the request.
* Applies to traditional (allow) WAF rules.
*/
mode: 'on' | 'off';
/**
* The unique identifier of a WAF package.
*/
package_id: string;
/**
* The order in which the individual WAF rule is executed within its rule group.
*/
priority: string;
}
namespace WAFManagedRulesTraditionalAllowRule {
/**
* The rule group to which the current WAF rule belongs.
*/
interface Group {
/**
* The unique identifier of the rule group.
*/
id?: string;
/**
* The name of the rule group.
*/
name?: string;
}
}
}
/**
* When triggered, anomaly detection WAF rules contribute to an overall threat
* score that will determine if a request is considered malicious. You can
* configure the total scoring threshold through the 'sensitivity' property of the
* WAF package.
*/
export type RuleEditResponse = RuleEditResponse.WAFManagedRulesAnomalyRule | RuleEditResponse.WAFManagedRulesTraditionalDenyRule | RuleEditResponse.WAFManagedRulesTraditionalAllowRule;
export declare namespace RuleEditResponse {
/**
* When triggered, anomaly detection WAF rules contribute to an overall threat
* score that will determine if a request is considered malicious. You can
* configure the total scoring threshold through the 'sensitivity' property of the
* WAF package.
*/
interface WAFManagedRulesAnomalyRule {
/**
* The unique identifier of the WAF rule.
*/
id: string;
/**
* Defines the available modes for the current WAF rule. Applies to anomaly
* detection WAF rules.
*/
allowed_modes: Array<'on' | 'off'>;
/**
* The public description of the WAF rule.
*/
description: string;
/**
* The rule group to which the current WAF rule belongs.
*/
group: WAFManagedRulesAnomalyRule.Group;
/**
* When set to `on`, the current WAF rule will be used when evaluating the request.
* Applies to anomaly detection WAF rules.
*/
mode: 'on' | 'off';
/**
* The unique identifier of a WAF package.
*/
package_id: string;
/**
* The order in which the individual WAF rule is executed within its rule group.
*/
priority: string;
}
namespace WAFManagedRulesAnomalyRule {
/**
* The rule group to which the current WAF rule belongs.
*/
interface Group {
/**
* The unique identifier of the rule group.
*/
id?: string;
/**
* The name of the rule group.
*/
name?: string;
}
}
/**
* When triggered, traditional WAF rules cause the firewall to immediately act upon
* the request based on the configuration of the rule. A 'deny' rule will
* immediately respond to the request based on the configured rule action/mode (for
* example, 'block') and no other rules will be processed.
*/
interface WAFManagedRulesTraditionalDenyRule {
/**
* The unique identifier of the WAF rule.
*/
id: string;
/**
* The list of possible actions of the WAF rule when it is triggered.
*/
allowed_modes: Array<'default' | 'disable' | 'simulate' | 'block' | 'challenge'>;
/**
* The default action/mode of a rule.
*/
default_mode: 'disable' | 'simulate' | 'block' | 'challenge';
/**
* The public description of the WAF rule.
*/
description: string;
/**
* The rule group to which the current WAF rule belongs.
*/
group: WAFManagedRulesTraditionalDenyRule.Group;
/**
* The action that the current WAF rule will perform when triggered. Applies to
* traditional (deny) WAF rules.
*/
mode: 'default' | 'disable' | 'simulate' | 'block' | 'challenge';
/**
* The unique identifier of a WAF package.
*/
package_id: string;
/**
* The order in which the individual WAF rule is executed within its rule group.
*/
priority: string;
}
namespace WAFManagedRulesTraditionalDenyRule {
/**
* The rule group to which the current WAF rule belongs.
*/
interface Group {
/**
* The unique identifier of the rule group.
*/
id?: string;
/**
* The name of the rule group.
*/
name?: string;
}
}
/**
* When triggered, traditional WAF rules cause the firewall to immediately act on
* the request based on the rule configuration. An 'allow' rule will immediately
* allow the request and no other rules will be processed.
*/
interface WAFManagedRulesTraditionalAllowRule {
/**
* The unique identifier of the WAF rule.
*/
id: string;
/**
* Defines the available modes for the current WAF rule.
*/
allowed_modes: Array<'on' | 'off'>;
/**
* The public description of the WAF rule.
*/
description: string;
/**
* The rule group to which the current WAF rule belongs.
*/
group: WAFManagedRulesTraditionalAllowRule.Group;
/**
* When set to `on`, the current rule will be used when evaluating the request.
* Applies to traditional (allow) WAF rules.
*/
mode: 'on' | 'off';
/**
* The unique identifier of a WAF package.
*/
package_id: string;
/**
* The order in which the individual WAF rule is executed within its rule group.
*/
priority: string;
}
namespace WAFManagedRulesTraditionalAllowRule {
/**
* The rule group to which the current WAF rule belongs.
*/
interface Group {
/**
* The unique identifier of the rule group.
*/
id?: string;
/**
* The name of the rule group.
*/
name?: string;
}
}
}
export type RuleGetResponse = unknown | Array<unknown> | string;
export interface RuleListParams extends V4PagePaginationArrayParams {
/**
* Path param: Identifier
*/
zone_id: string;
/**
* Query param: The direction used to sort returned rules.
*/
direction?: 'asc' | 'desc';
/**
* Query param: When set to `all`, all the search requirements must match. When set
* to `any`, only one of the search requirements has to match.
*/
match?: 'any' | 'all';
/**
* Query param: The action/mode a rule has been overridden to perform.
*/
mode?: 'DIS' | 'CHL' | 'BLK' | 'SIM';
/**
* Query param: The field used to sort returned rules.
*/
order?: 'priority' | 'group_id' | 'description';
}
export interface RuleEditParams {
/**
* Path param: Identifier
*/
zone_id: string;
/**
* Body param: The mode/action of the rule when triggered. You must use a value
* from the `allowed_modes` array of the current rule.
*/
mode?: 'default' | 'disable' | 'simulate' | 'block' | 'challenge' | 'on' | 'off';
}
export interface RuleGetParams {
/**
* Identifier
*/
zone_id: string;
}
export declare namespace Rules {
export import WAFManagedRulesRule = RulesAPI.WAFManagedRulesRule;
export import RuleEditResponse = RulesAPI.RuleEditResponse;
export import RuleGetResponse = RulesAPI.RuleGetResponse;
export import WAFManagedRulesRulesV4PagePaginationArray = RulesAPI.WAFManagedRulesRulesV4PagePaginationArray;
export import RuleListParams = RulesAPI.RuleListParams;
export import RuleEditParams = RulesAPI.RuleEditParams;
export import RuleGetParams = RulesAPI.RuleGetParams;
}
//# sourceMappingURL=rules.d.ts.map