Skip to main content

SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Struct SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig 

Source
#[non_exhaustive]
pub struct SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig { pub enforce_on_key_name: Option<String>, pub enforce_on_key_type: Option<EnforceOnKeyType>, /* private fields */ }
Available on crate features organization-security-policies or region-security-policies or security-policies only.

Fields (Non-exhaustive)§

This struct is marked as non-exhaustive
Non-exhaustive structs could have additional fields added in future. Therefore, non-exhaustive structs cannot be constructed in external crates using the traditional Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.
§enforce_on_key_name: Option<String>

Rate limit key name applicable only for the following key types: HTTP_HEADER – Name of the HTTP header whose value is taken as the key value. HTTP_COOKIE – Name of the HTTP cookie whose value is taken as the key value.

§enforce_on_key_type: Option<EnforceOnKeyType>

Determines the key to enforce the rate_limit_threshold on. Possible values are:

  • ALL: A single rate limit threshold is applied to all the requests matching this rule. This is the default value if “enforceOnKeyConfigs” is not configured.

  • IP: The source IP address of the request is the key. Each IP has this limit enforced separately.

  • HTTP_HEADER: The value of the HTTP header whose name is configured under “enforceOnKeyName”. The key value is truncated to the first 128 bytes of the header value. If no such header is present in the request, the key type defaults toALL.

  • XFF_IP: The first IP address (i.e. the originating client IP address) specified in the list of IPs under X-Forwarded-For HTTP header. If no such header is present or the value is not a valid IP, the key defaults to the source IP address of the request i.e. key type IP.

  • HTTP_COOKIE: The value of the HTTP cookie whose name is configured under “enforceOnKeyName”. The key value is truncated to the first 128 bytes of the cookie value. If no such cookie is present in the request, the key type defaults toALL.

  • HTTP_PATH: The URL path of the HTTP request. The key value is truncated to the first 128 bytes.

  • SNI: Server name indication in the TLS session of the HTTPS request. The key value is truncated to the first 128 bytes. The key type defaults to ALL on a HTTP session.

  • REGION_CODE: The country/region from which the request originates.

  • TLS_JA3_FINGERPRINT: JA3 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.

  • USER_IP: The IP address of the originating client, which is resolved based on “userIpRequestHeaders” configured with the security policy. If there is no “userIpRequestHeaders” configuration or an IP address cannot be resolved from it, the key type defaults toIP.

  • TLS_JA4_FINGERPRINT: JA4 TLS/SSL fingerprint if the client connects using HTTPS, HTTP/2 or HTTP/3. If not available, the key type defaults to ALL.

Implementations§

Source§

impl SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Source

pub fn new() -> Self

Source

pub fn set_enforce_on_key_name<T>(self, v: T) -> Self
where T: Into<String>,

Sets the value of enforce_on_key_name.

§Example
let x = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_enforce_on_key_name("example");
Source

pub fn set_or_clear_enforce_on_key_name<T>(self, v: Option<T>) -> Self
where T: Into<String>,

Sets or clears the value of enforce_on_key_name.

§Example
let x = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_or_clear_enforce_on_key_name(Some("example"));
let x = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_or_clear_enforce_on_key_name(None::<String>);
Source

pub fn set_enforce_on_key_type<T>(self, v: T) -> Self

Sets the value of enforce_on_key_type.

§Example
use google_cloud_compute_v1::model::security_policy_rule_rate_limit_options_enforce_on_key_config::EnforceOnKeyType;
let x0 = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_enforce_on_key_type(EnforceOnKeyType::HttpCookie);
let x1 = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_enforce_on_key_type(EnforceOnKeyType::HttpHeader);
let x2 = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_enforce_on_key_type(EnforceOnKeyType::HttpPath);
Source

pub fn set_or_clear_enforce_on_key_type<T>(self, v: Option<T>) -> Self

Sets or clears the value of enforce_on_key_type.

§Example
use google_cloud_compute_v1::model::security_policy_rule_rate_limit_options_enforce_on_key_config::EnforceOnKeyType;
let x0 = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_or_clear_enforce_on_key_type(Some(EnforceOnKeyType::HttpCookie));
let x1 = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_or_clear_enforce_on_key_type(Some(EnforceOnKeyType::HttpHeader));
let x2 = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_or_clear_enforce_on_key_type(Some(EnforceOnKeyType::HttpPath));
let x_none = SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig::new().set_or_clear_enforce_on_key_type(None::<EnforceOnKeyType>);

Trait Implementations§

Source§

impl Clone for SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Source§

fn clone(&self) -> SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Returns a duplicate of the value. Read more
1.0.0 · Source§

fn clone_from(&mut self, source: &Self)

Performs copy-assignment from source. Read more
Source§

impl Debug for SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Source§

fn fmt(&self, f: &mut Formatter<'_>) -> Result

Formats the value using the given formatter. Read more
Source§

impl Default for SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Source§

fn default() -> SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Returns the “default value” for a type. Read more
Source§

impl Message for SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Source§

fn typename() -> &'static str

The typename of this message.
Source§

impl PartialEq for SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Source§

fn eq( &self, other: &SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig, ) -> bool

Tests for self and other values to be equal, and is used by ==.
1.0.0 · Source§

fn ne(&self, other: &Rhs) -> bool

Tests for !=. The default implementation is almost always sufficient, and should not be overridden without very good reason.
Source§

impl StructuralPartialEq for SecurityPolicyRuleRateLimitOptionsEnforceOnKeyConfig

Auto Trait Implementations§

Blanket Implementations§

Source§

impl<T> Any for T
where T: 'static + ?Sized,

Source§

fn type_id(&self) -> TypeId

Gets the TypeId of self. Read more
Source§

impl<T> Borrow<T> for T
where T: ?Sized,

Source§

fn borrow(&self) -> &T

Immutably borrows from an owned value. Read more
Source§

impl<T> BorrowMut<T> for T
where T: ?Sized,

Source§

fn borrow_mut(&mut self) -> &mut T

Mutably borrows from an owned value. Read more
Source§

impl<T> CloneToUninit for T
where T: Clone,

Source§

unsafe fn clone_to_uninit(&self, dest: *mut u8)

🔬This is a nightly-only experimental API. (clone_to_uninit)
Performs copy-assignment from self to dest. Read more
Source§

impl<T> From<T> for T

Source§

fn from(t: T) -> T

Returns the argument unchanged.

Source§

impl<T> Instrument for T

Source§

fn instrument(self, span: Span) -> Instrumented<Self>

Instruments this type with the provided Span, returning an Instrumented wrapper. Read more
Source§

fn in_current_span(self) -> Instrumented<Self>

Instruments this type with the current Span, returning an Instrumented wrapper. Read more
Source§

impl<T, U> Into<U> for T
where U: From<T>,

Source§

fn into(self) -> U

Calls U::from(self).

That is, this conversion is whatever the implementation of From<T> for U chooses to do.

Source§

impl<T> PolicyExt for T
where T: ?Sized,

Source§

fn and<P, B, E>(self, other: P) -> And<T, P>
where T: Policy<B, E>, P: Policy<B, E>,

Create a new Policy that returns Action::Follow only if self and other return Action::Follow. Read more
Source§

fn or<P, B, E>(self, other: P) -> Or<T, P>
where T: Policy<B, E>, P: Policy<B, E>,

Create a new Policy that returns Action::Follow if either self or other returns Action::Follow. Read more
Source§

impl<T> ToOwned for T
where T: Clone,

Source§

type Owned = T

The resulting type after obtaining ownership.
Source§

fn to_owned(&self) -> T

Creates owned data from borrowed data, usually by cloning. Read more
Source§

fn clone_into(&self, target: &mut T)

Uses borrowed data to replace owned data, usually by cloning. Read more
Source§

impl<T, U> TryFrom<U> for T
where U: Into<T>,

Source§

type Error = Infallible

The type returned in the event of a conversion error.
Source§

fn try_from(value: U) -> Result<T, <T as TryFrom<U>>::Error>

Performs the conversion.
Source§

impl<T, U> TryInto<U> for T
where U: TryFrom<T>,

Source§

type Error = <U as TryFrom<T>>::Error

The type returned in the event of a conversion error.
Source§

fn try_into(self) -> Result<U, <U as TryFrom<T>>::Error>

Performs the conversion.
Source§

impl<V, T> VZip<V> for T
where V: MultiLane<T>,

Source§

fn vzip(self) -> V

Source§

impl<T> WithSubscriber for T

Source§

fn with_subscriber<S>(self, subscriber: S) -> WithDispatch<Self>
where S: Into<Dispatch>,

Attaches the provided Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

fn with_current_subscriber(self) -> WithDispatch<Self>

Attaches the current default Subscriber to this type, returning a WithDispatch wrapper. Read more
Source§

impl<T> DeserializeOwned for T
where T: for<'de> Deserialize<'de>,