interface CfnWebACLProps
Language | Type name |
---|---|
![]() | Amazon.CDK.AWS.WAFv2.CfnWebACLProps |
![]() | github.com/aws/aws-cdk-go/awscdk/v2/awswafv2#CfnWebACLProps |
![]() | software.amazon.awscdk.services.wafv2.CfnWebACLProps |
![]() | aws_cdk.aws_wafv2.CfnWebACLProps |
![]() | aws-cdk-lib » aws_wafv2 » CfnWebACLProps |
Properties for defining a CfnWebACL
.
See also: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html
Example
// The generated example for this type would exceed 500 lines,
// and has been elided for readability.
Properties
Name | Type | Description |
---|---|---|
default | IResolvable | Default | The action to perform if none of the Rules contained in the WebACL match. |
scope | string | Specifies whether this is for an Amazon CloudFront distribution or for a regional application. |
visibility | IResolvable | Visibility | Defines and enables Amazon CloudWatch metrics and web request sample collection. |
association | IResolvable | Association | Specifies custom configurations for the associations between the web ACL and protected resources. |
captcha | IResolvable | Captcha | Specifies how AWS WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. |
challenge | IResolvable | Challenge | Specifies how AWS WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. |
custom | IResolvable | { [string]: IResolvable | Custom } | A map of custom response keys and content bodies. |
description? | string | A description of the web ACL that helps with identification. |
name? | string | The name of the web ACL. |
rules? | IResolvable | IResolvable | Rule [] | The rule statements used to identify the web requests that you want to manage. |
tags? | Cfn [] | Key:value pairs associated with an AWS resource. |
token | string[] | Specifies the domains that AWS WAF should accept in a web request token. |
defaultAction
Type:
IResolvable
|
Default
The action to perform if none of the Rules
contained in the WebACL
match.
scope
Type:
string
Specifies whether this is for an Amazon CloudFront distribution or for a regional application.
A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AWS AppSync GraphQL API, an Amazon Cognito user pool, an AWS App Runner service, or an AWS Verified Access instance. Valid Values are CLOUDFRONT
and REGIONAL
.
For
CLOUDFRONT
, you must create your WAFv2 resources in the US East (N. Virginia) Region,us-east-1
.
For information about how to define the association of the web ACL with your resource, see WebACLAssociation
.
visibilityConfig
Type:
IResolvable
|
Visibility
Defines and enables Amazon CloudWatch metrics and web request sample collection.
associationConfig?
Type:
IResolvable
|
Association
(optional)
Specifies custom configurations for the associations between the web ACL and protected resources.
Use this to customize the maximum size of the request body that your protected resources forward to AWS WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes).
You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see AWS WAF Pricing .
For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes).
captchaConfig?
Type:
IResolvable
|
Captcha
(optional)
Specifies how AWS WAF should handle CAPTCHA
evaluations for rules that don't have their own CaptchaConfig
settings.
If you don't specify this, AWS WAF uses its default settings for CaptchaConfig
.
challengeConfig?
Type:
IResolvable
|
Challenge
(optional)
Specifies how AWS WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig
settings.
If you don't specify this, AWS WAF uses its default settings for ChallengeConfig
.
customResponseBodies?
Type:
IResolvable
| { [string]:
IResolvable
|
Custom
}
(optional)
A map of custom response keys and content bodies.
When you create a rule with a block action, you can send a custom response to the web request. You define these for the web ACL, and then use them in the rules and default actions that you define in the web ACL.
For information about customizing web requests and responses, see Customizing web requests and responses in AWS WAF in the AWS WAF Developer Guide .
For information about the limits on count and size for custom request and response settings, see AWS WAF quotas in the AWS WAF Developer Guide .
description?
Type:
string
(optional)
A description of the web ACL that helps with identification.
name?
Type:
string
(optional)
The name of the web ACL.
You cannot change the name of a web ACL after you create it.
rules?
Type:
IResolvable
|
IResolvable
|
Rule
[]
(optional)
The rule statements used to identify the web requests that you want to manage.
Each rule includes one top-level statement that AWS WAF uses to identify matching web requests, and parameters that govern how AWS WAF handles them.
tags?
Type:
Cfn
[]
(optional)
Key:value pairs associated with an AWS resource.
The key:value pair can be anything you define. Typically, the tag key represents a category (such as "environment") and the tag value represents a specific value within that category (such as "test," "development," or "production"). You can add up to 50 tags to each AWS resource.
To modify tags on existing resources, use the AWS WAF APIs or command line interface. With AWS CloudFormation , you can only add tags to AWS WAF resources during resource creation.
tokenDomains?
Type:
string[]
(optional)
Specifies the domains that AWS WAF should accept in a web request token.
This enables the use of tokens across multiple protected websites. When AWS WAF provides a token, it uses the domain of the AWS resource that the web ACL is protecting. If you don't specify a list of token domains, AWS WAF accepts tokens only for the domain of the protected resource. With a token domain list, AWS WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.