Struct aws_sdk_wafv2::model::Rule
source · [−]#[non_exhaustive]pub struct Rule {
pub name: Option<String>,
pub priority: i32,
pub statement: Option<Statement>,
pub action: Option<RuleAction>,
pub override_action: Option<OverrideAction>,
pub rule_labels: Option<Vec<Label>>,
pub visibility_config: Option<VisibilityConfig>,
pub captcha_config: Option<CaptchaConfig>,
}
Expand description
A single rule, which you can use in a WebACL
or RuleGroup
to identify web requests that you want to allow, block, or count. Each rule includes one top-level Statement
that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.
Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. }
syntax; cannot be matched against without a wildcard ..
; and struct update syntax will not work.name: Option<String>
The name of the rule. You can't change the name of a Rule
after you create it.
priority: i32
If you define more than one Rule
in a WebACL
, WAF evaluates each request against the Rules
in order based on the value of Priority
. WAF processes rules with lower priority first. The priorities don't need to be consecutive, but they must all be different.
statement: Option<Statement>
The WAF processing statement for the rule, for example ByteMatchStatement
or SizeConstraintStatement
.
action: Option<RuleAction>
The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting.
This is used only for rules whose statements do not reference a rule group. Rule statements that reference a rule group include RuleGroupReferenceStatement
and ManagedRuleGroupStatement
.
You must specify either this Action
setting or the rule OverrideAction
setting, but not both:
-
If the rule statement does not reference a rule group, use this rule action setting and not the rule override action setting.
-
If the rule statement references a rule group, use the override action setting and not this action setting.
override_action: Option<OverrideAction>
The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only.
You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement
and ManagedRuleGroupStatement
.
This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead exclude those rules in your rule group reference statement settings.
rule_labels: Option<Vec<Label>>
Labels to apply to web requests that match the rule match statement. WAF applies fully qualified labels to matching web requests. A fully qualified label is the concatenation of a label namespace and a rule label. The rule's rule group or web ACL defines the label namespace.
Rules that run after this rule in the web ACL can match against these labels using a LabelMatchStatement
.
For each label, provide a case-sensitive string containing optional namespaces and a label name, according to the following guidelines:
-
Separate each component of the label with a colon.
-
Each namespace or name can have up to 128 characters.
-
You can specify up to 5 namespaces in a label.
-
Don't use the following reserved words in your label specification:
aws
,waf
,managed
,rulegroup
,webacl
,regexpatternset
, oripset
.
For example, myLabelName
or nameSpace1:nameSpace2:myLabelName
.
visibility_config: Option<VisibilityConfig>
Defines and enables Amazon CloudWatch metrics and web request sample collection.
captcha_config: Option<CaptchaConfig>
Specifies how WAF should handle CAPTCHA
evaluations. If you don't specify this, WAF uses the CAPTCHA
configuration that's defined for the web ACL.
Implementations
The name of the rule. You can't change the name of a Rule
after you create it.
If you define more than one Rule
in a WebACL
, WAF evaluates each request against the Rules
in order based on the value of Priority
. WAF processes rules with lower priority first. The priorities don't need to be consecutive, but they must all be different.
The WAF processing statement for the rule, for example ByteMatchStatement
or SizeConstraintStatement
.
The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting.
This is used only for rules whose statements do not reference a rule group. Rule statements that reference a rule group include RuleGroupReferenceStatement
and ManagedRuleGroupStatement
.
You must specify either this Action
setting or the rule OverrideAction
setting, but not both:
-
If the rule statement does not reference a rule group, use this rule action setting and not the rule override action setting.
-
If the rule statement references a rule group, use the override action setting and not this action setting.
The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only.
You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement
and ManagedRuleGroupStatement
.
This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead exclude those rules in your rule group reference statement settings.
Labels to apply to web requests that match the rule match statement. WAF applies fully qualified labels to matching web requests. A fully qualified label is the concatenation of a label namespace and a rule label. The rule's rule group or web ACL defines the label namespace.
Rules that run after this rule in the web ACL can match against these labels using a LabelMatchStatement
.
For each label, provide a case-sensitive string containing optional namespaces and a label name, according to the following guidelines:
-
Separate each component of the label with a colon.
-
Each namespace or name can have up to 128 characters.
-
You can specify up to 5 namespaces in a label.
-
Don't use the following reserved words in your label specification:
aws
,waf
,managed
,rulegroup
,webacl
,regexpatternset
, oripset
.
For example, myLabelName
or nameSpace1:nameSpace2:myLabelName
.
Defines and enables Amazon CloudWatch metrics and web request sample collection.
Specifies how WAF should handle CAPTCHA
evaluations. If you don't specify this, WAF uses the CAPTCHA
configuration that's defined for the web ACL.
Trait Implementations
Auto Trait Implementations
impl RefUnwindSafe for Rule
impl UnwindSafe for Rule
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber
to this type, returning a
WithDispatch
wrapper. Read more
Attaches the current default Subscriber
to this type, returning a
WithDispatch
wrapper. Read more