waf.proto

Package: waf.plugins.gloo.solo.io

Types:

Source File: github.com/solo-io/gloo/projects/gloo/api/v1/enterprise/plugins/waf/waf.proto

Settings

"disabled": bool
"coreRuleSet": .waf.plugins.gloo.solo.io.CoreRuleSet
"ruleSets": []envoy.config.filter.http.modsecurity.v2.RuleSet
Field Type Description Default
disabled bool Disable waf on this resource (if omitted defaults to false). If a route/virtual host is configured with WAF, you must explicitly disable its WAF, i.e., it will not inherit the disabled status of its parent.
coreRuleSet .waf.plugins.gloo.solo.io.CoreRuleSet Add OWASP core rule set if nil will not be added.
ruleSets []envoy.config.filter.http.modsecurity.v2.RuleSet Custom rule sets rules to add.

CoreRuleSet

"customSettingsString": string
"customSettingsFile": string
Field Type Description Default
customSettingsString string String representing the core rule set custom config options. Only one of customSettingsString or customSettingsFile can be set.
customSettingsFile string String representing the core rule set custom config options. Only one of customSettingsFile or customSettingsString can be set.

VhostSettings

TODO(kdorosh) delete this once we stop supporting opaque configuration under extensions

"disabled": bool
"settings": .waf.plugins.gloo.solo.io.Settings
Field Type Description Default
disabled bool Disable waf on this virtual host.
settings .waf.plugins.gloo.solo.io.Settings

RouteSettings

TODO(kdorosh) delete this once we stop supporting opaque configuration under extensions

"disabled": bool
"settings": .waf.plugins.gloo.solo.io.Settings
Field Type Description Default
disabled bool Disable waf on this route.
settings .waf.plugins.gloo.solo.io.Settings