UNPKG

cloudflare

Version:

The official TypeScript library for the Cloudflare API

84 lines 3.7 kB
import * as Core from 'cloudflare/core'; import { APIResource } from 'cloudflare/resource'; import * as WAFAPI from 'cloudflare/resources/zones/settings/waf'; export declare class WAF extends APIResource { /** * The WAF examines HTTP requests to your website. It inspects both GET and POST * requests and applies rules to help filter out illegitimate traffic from * legitimate website visitors. The Cloudflare WAF inspects website addresses or * URLs to detect anything out of the ordinary. If the Cloudflare WAF determines * suspicious user behavior, then the WAF will 'challenge' the web visitor with a * page that asks them to submit a CAPTCHA successfully to continue their action. * If the challenge is failed, the action will be stopped. What this means is that * Cloudflare's WAF will block any traffic identified as illegitimate before it * reaches your origin web server. * (https://support.cloudflare.com/hc/en-us/articles/200172016). */ edit(params: WAFEditParams, options?: Core.RequestOptions): Core.APIPromise<ZoneSettingWAF>; /** * The WAF examines HTTP requests to your website. It inspects both GET and POST * requests and applies rules to help filter out illegitimate traffic from * legitimate website visitors. The Cloudflare WAF inspects website addresses or * URLs to detect anything out of the ordinary. If the Cloudflare WAF determines * suspicious user behavior, then the WAF will 'challenge' the web visitor with a * page that asks them to submit a CAPTCHA successfully to continue their action. * If the challenge is failed, the action will be stopped. What this means is that * Cloudflare's WAF will block any traffic identified as illegitimate before it * reaches your origin web server. * (https://support.cloudflare.com/hc/en-us/articles/200172016). */ get(params: WAFGetParams, options?: Core.RequestOptions): Core.APIPromise<ZoneSettingWAF>; } /** * The WAF examines HTTP requests to your website. It inspects both GET and POST * requests and applies rules to help filter out illegitimate traffic from * legitimate website visitors. The Cloudflare WAF inspects website addresses or * URLs to detect anything out of the ordinary. If the Cloudflare WAF determines * suspicious user behavior, then the WAF will 'challenge' the web visitor with a * page that asks them to submit a CAPTCHA successfully to continue their action. * If the challenge is failed, the action will be stopped. What this means is that * Cloudflare's WAF will block any traffic identified as illegitimate before it * reaches your origin web server. * (https://support.cloudflare.com/hc/en-us/articles/200172016). */ export interface ZoneSettingWAF { /** * ID of the zone setting. */ id: 'waf'; /** * Current value of the zone setting. */ value: 'on' | 'off'; /** * Whether or not this setting can be modified for this zone (based on your * Cloudflare plan level). */ editable?: true | false; /** * last time this setting was modified. */ modified_on?: string | null; } export interface WAFEditParams { /** * Path param: Identifier */ zone_id: string; /** * Body param: Value of the zone setting. */ value: 'on' | 'off'; } export interface WAFGetParams { /** * Identifier */ zone_id: string; } export declare namespace WAF { export import ZoneSettingWAF = WAFAPI.ZoneSettingWAF; export import WAFEditParams = WAFAPI.WAFEditParams; export import WAFGetParams = WAFAPI.WAFGetParams; } //# sourceMappingURL=waf.d.ts.map