UNPKG

cloudflare

Version:

The official TypeScript library for the Cloudflare API

475 lines (406 loc) 13.4 kB
// File generated from our OpenAPI spec by Stainless. See CONTRIBUTING.md for details. import { APIResource } from '../../../../resource'; import * as Core from '../../../../core'; import * as RulesAPI from './rules'; import { V4PagePaginationArray, type V4PagePaginationArrayParams } from '../../../../pagination'; export class Rules extends APIResource { /** * Fetches WAF rules in a WAF package. * * **Note:** Applies only to the * [previous version of WAF managed rules](https://developers.cloudflare.com/support/firewall/managed-rules-web-application-firewall-waf/understanding-waf-managed-rules-web-application-firewall/). */ list( packageId: string, params: RuleListParams, options?: Core.RequestOptions, ): Core.PagePromise<RuleListResponsesV4PagePaginationArray, RuleListResponse> { const { zone_id, ...query } = params; return this._client.getAPIList( `/zones/${zone_id}/firewall/waf/packages/${packageId}/rules`, RuleListResponsesV4PagePaginationArray, { query, ...options }, ); } /** * Updates a WAF rule. You can only update the mode/action of the rule. * * **Note:** Applies only to the * [previous version of WAF managed rules](https://developers.cloudflare.com/support/firewall/managed-rules-web-application-firewall-waf/understanding-waf-managed-rules-web-application-firewall/). */ edit( packageId: string, ruleId: string, params: RuleEditParams, options?: Core.RequestOptions, ): Core.APIPromise<RuleEditResponse> { const { zone_id, ...body } = params; return ( this._client.patch(`/zones/${zone_id}/firewall/waf/packages/${packageId}/rules/${ruleId}`, { body, ...options, }) as Core.APIPromise<{ result: RuleEditResponse }> )._thenUnwrap((obj) => obj.result); } /** * Fetches the details of a WAF rule in a WAF package. * * **Note:** Applies only to the * [previous version of WAF managed rules](https://developers.cloudflare.com/support/firewall/managed-rules-web-application-firewall-waf/understanding-waf-managed-rules-web-application-firewall/). */ get( packageId: string, ruleId: string, params: RuleGetParams, options?: Core.RequestOptions, ): Core.APIPromise<RuleGetResponse> { const { zone_id } = params; return ( this._client.get( `/zones/${zone_id}/firewall/waf/packages/${packageId}/rules/${ruleId}`, options, ) as Core.APIPromise<{ result: RuleGetResponse }> )._thenUnwrap((obj) => obj.result); } } export class RuleListResponsesV4PagePaginationArray extends V4PagePaginationArray<RuleListResponse> {} /** * When set to `on`, the current WAF rule will be used when evaluating the request. * Applies to anomaly detection WAF rules. */ export type AllowedModesAnomaly = 'on' | 'off'; /** * The rule group to which the current WAF rule belongs. */ export interface WAFRuleGroup { /** * The unique identifier of the rule group. */ id?: string; /** * The name of the rule group. */ name?: string; } /** * When triggered, anomaly detection WAF rules contribute to an overall threat * score that will determine if a request is considered malicious. You can * configure the total scoring threshold through the 'sensitivity' property of the * WAF package. */ export type RuleListResponse = | RuleListResponse.WAFManagedRulesAnomalyRule | RuleListResponse.WAFManagedRulesTraditionalDenyRule | RuleListResponse.WAFManagedRulesTraditionalAllowRule; export namespace RuleListResponse { /** * When triggered, anomaly detection WAF rules contribute to an overall threat * score that will determine if a request is considered malicious. You can * configure the total scoring threshold through the 'sensitivity' property of the * WAF package. */ export interface WAFManagedRulesAnomalyRule { /** * The unique identifier of the WAF rule. */ id: string; /** * Defines the available modes for the current WAF rule. Applies to anomaly * detection WAF rules. */ allowed_modes: Array<RulesAPI.AllowedModesAnomaly>; /** * The public description of the WAF rule. */ description: string; /** * The rule group to which the current WAF rule belongs. */ group: RulesAPI.WAFRuleGroup; /** * When set to `on`, the current WAF rule will be used when evaluating the request. * Applies to anomaly detection WAF rules. */ mode: RulesAPI.AllowedModesAnomaly; /** * The unique identifier of a WAF package. */ package_id: string; /** * The order in which the individual WAF rule is executed within its rule group. */ priority: string; } /** * When triggered, traditional WAF rules cause the firewall to immediately act upon * the request based on the configuration of the rule. A 'deny' rule will * immediately respond to the request based on the configured rule action/mode (for * example, 'block') and no other rules will be processed. */ export interface WAFManagedRulesTraditionalDenyRule { /** * The unique identifier of the WAF rule. */ id: string; /** * The list of possible actions of the WAF rule when it is triggered. */ allowed_modes: Array<'default' | 'disable' | 'simulate' | 'block' | 'challenge'>; /** * The default action/mode of a rule. */ default_mode: 'disable' | 'simulate' | 'block' | 'challenge'; /** * The public description of the WAF rule. */ description: string; /** * The rule group to which the current WAF rule belongs. */ group: RulesAPI.WAFRuleGroup; /** * The action that the current WAF rule will perform when triggered. Applies to * traditional (deny) WAF rules. */ mode: 'default' | 'disable' | 'simulate' | 'block' | 'challenge'; /** * The unique identifier of a WAF package. */ package_id: string; /** * The order in which the individual WAF rule is executed within its rule group. */ priority: string; } /** * When triggered, traditional WAF rules cause the firewall to immediately act on * the request based on the rule configuration. An 'allow' rule will immediately * allow the request and no other rules will be processed. */ export interface WAFManagedRulesTraditionalAllowRule { /** * The unique identifier of the WAF rule. */ id: string; /** * Defines the available modes for the current WAF rule. */ allowed_modes: Array<'on' | 'off'>; /** * The public description of the WAF rule. */ description: string; /** * The rule group to which the current WAF rule belongs. */ group: RulesAPI.WAFRuleGroup; /** * When set to `on`, the current rule will be used when evaluating the request. * Applies to traditional (allow) WAF rules. */ mode: 'on' | 'off'; /** * The unique identifier of a WAF package. */ package_id: string; /** * The order in which the individual WAF rule is executed within its rule group. */ priority: string; } } /** * When triggered, anomaly detection WAF rules contribute to an overall threat * score that will determine if a request is considered malicious. You can * configure the total scoring threshold through the 'sensitivity' property of the * WAF package. */ export type RuleEditResponse = | RuleEditResponse.WAFManagedRulesAnomalyRule | RuleEditResponse.WAFManagedRulesTraditionalDenyRule | RuleEditResponse.WAFManagedRulesTraditionalAllowRule; export namespace RuleEditResponse { /** * When triggered, anomaly detection WAF rules contribute to an overall threat * score that will determine if a request is considered malicious. You can * configure the total scoring threshold through the 'sensitivity' property of the * WAF package. */ export interface WAFManagedRulesAnomalyRule { /** * The unique identifier of the WAF rule. */ id: string; /** * Defines the available modes for the current WAF rule. Applies to anomaly * detection WAF rules. */ allowed_modes: Array<RulesAPI.AllowedModesAnomaly>; /** * The public description of the WAF rule. */ description: string; /** * The rule group to which the current WAF rule belongs. */ group: RulesAPI.WAFRuleGroup; /** * When set to `on`, the current WAF rule will be used when evaluating the request. * Applies to anomaly detection WAF rules. */ mode: RulesAPI.AllowedModesAnomaly; /** * The unique identifier of a WAF package. */ package_id: string; /** * The order in which the individual WAF rule is executed within its rule group. */ priority: string; } /** * When triggered, traditional WAF rules cause the firewall to immediately act upon * the request based on the configuration of the rule. A 'deny' rule will * immediately respond to the request based on the configured rule action/mode (for * example, 'block') and no other rules will be processed. */ export interface WAFManagedRulesTraditionalDenyRule { /** * The unique identifier of the WAF rule. */ id: string; /** * The list of possible actions of the WAF rule when it is triggered. */ allowed_modes: Array<'default' | 'disable' | 'simulate' | 'block' | 'challenge'>; /** * The default action/mode of a rule. */ default_mode: 'disable' | 'simulate' | 'block' | 'challenge'; /** * The public description of the WAF rule. */ description: string; /** * The rule group to which the current WAF rule belongs. */ group: RulesAPI.WAFRuleGroup; /** * The action that the current WAF rule will perform when triggered. Applies to * traditional (deny) WAF rules. */ mode: 'default' | 'disable' | 'simulate' | 'block' | 'challenge'; /** * The unique identifier of a WAF package. */ package_id: string; /** * The order in which the individual WAF rule is executed within its rule group. */ priority: string; } /** * When triggered, traditional WAF rules cause the firewall to immediately act on * the request based on the rule configuration. An 'allow' rule will immediately * allow the request and no other rules will be processed. */ export interface WAFManagedRulesTraditionalAllowRule { /** * The unique identifier of the WAF rule. */ id: string; /** * Defines the available modes for the current WAF rule. */ allowed_modes: Array<'on' | 'off'>; /** * The public description of the WAF rule. */ description: string; /** * The rule group to which the current WAF rule belongs. */ group: RulesAPI.WAFRuleGroup; /** * When set to `on`, the current rule will be used when evaluating the request. * Applies to traditional (allow) WAF rules. */ mode: 'on' | 'off'; /** * The unique identifier of a WAF package. */ package_id: string; /** * The order in which the individual WAF rule is executed within its rule group. */ priority: string; } } export type RuleGetResponse = unknown | string | null; export interface RuleListParams extends V4PagePaginationArrayParams { /** * Path param: Identifier */ zone_id: string; /** * Query param: The public description of the WAF rule. */ description?: string; /** * Query param: The direction used to sort returned rules. */ direction?: 'asc' | 'desc'; /** * Query param: The unique identifier of the rule group. */ group_id?: string; /** * Query param: When set to `all`, all the search requirements must match. When set * to `any`, only one of the search requirements has to match. */ match?: 'any' | 'all'; /** * Query param: The action/mode a rule has been overridden to perform. */ mode?: 'DIS' | 'CHL' | 'BLK' | 'SIM'; /** * Query param: The field used to sort returned rules. */ order?: 'priority' | 'group_id' | 'description'; /** * Query param: The order in which the individual WAF rule is executed within its * rule group. */ priority?: string; } export interface RuleEditParams { /** * Path param: Identifier */ zone_id: string; /** * Body param: The mode/action of the rule when triggered. You must use a value * from the `allowed_modes` array of the current rule. */ mode?: 'default' | 'disable' | 'simulate' | 'block' | 'challenge' | 'on' | 'off'; } export interface RuleGetParams { /** * Identifier */ zone_id: string; } Rules.RuleListResponsesV4PagePaginationArray = RuleListResponsesV4PagePaginationArray; export declare namespace Rules { export { type AllowedModesAnomaly as AllowedModesAnomaly, type WAFRuleGroup as WAFRuleGroup, type RuleListResponse as RuleListResponse, type RuleEditResponse as RuleEditResponse, type RuleGetResponse as RuleGetResponse, RuleListResponsesV4PagePaginationArray as RuleListResponsesV4PagePaginationArray, type RuleListParams as RuleListParams, type RuleEditParams as RuleEditParams, type RuleGetParams as RuleGetParams, }; }