oracle.oci.oci_waas_protection_settings – Manage a ProtectionSettings resource in Oracle Cloud Infrastructure¶
Note
This plugin is part of the oracle.oci collection (version 5.5.0).
You might already have this collection installed if you are using the ansible package.
It is not included in ansible-core.
To check whether it is installed, run ansible-galaxy collection list.
To install it, use: ansible-galaxy collection install oracle.oci.
To use it in a playbook, specify: oracle.oci.oci_waas_protection_settings.
New in version 2.9.0: of oracle.oci
Synopsis¶
- This module allows the user to update a ProtectionSettings resource in Oracle Cloud Infrastructure 
Requirements¶
The below requirements are needed on the host that executes this module.
- python >= 3.6 
- Python SDK for Oracle Cloud Infrastructure https://oracle-cloud-infrastructure-python-sdk.readthedocs.io 
Parameters¶
| Parameter | Choices/Defaults | Comments | 
|---|---|---|
| allowed_http_methods 
                    list
                     / elements=string                                             | 
 | The list of allowed HTTP methods. If unspecified, default to `[OPTIONS, GET, HEAD, POST]`. This setting only applies if a corresponding protection rule is enabled, such as the "Restrict HTTP Request Methods" rule (key: 911100). This parameter is updatable. | 
| api_user 
                    string
                                                                 | The OCID of the user, on whose behalf, OCI APIs are invoked. If not set, then the value of the OCI_USER_ID environment variable, if any, is used. This option is required if the user is not specified through a configuration file (See  config_file_location). To get the user's OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm. | |
| api_user_fingerprint 
                    string
                                                                 | Fingerprint for the key pair being used. If not set, then the value of the OCI_USER_FINGERPRINT environment variable, if any, is used. This option is required if the key fingerprint is not specified through a configuration file (See  config_file_location). To get the key pair's fingerprint value please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm. | |
| api_user_key_file 
                    string
                                                                 | Full path and filename of the private key (in PEM format). If not set, then the value of the OCI_USER_KEY_FILE variable, if any, is used. This option is required if the private key is not specified through a configuration file (See  config_file_location). If the key is encrypted with a pass-phrase, theapi_user_key_pass_phraseoption must also be provided. | |
| api_user_key_pass_phrase 
                    string
                                                                 | Passphrase used by the key referenced in  api_user_key_file, if it is encrypted. If not set, then the value of the OCI_USER_KEY_PASS_PHRASE variable, if any, is used. This option is required if the key passphrase is not specified through a configuration file (Seeconfig_file_location). | |
| auth_purpose 
                    string
                                                                 | 
 | The auth purpose which can be used in conjunction with 'auth_type=instance_principal'. The default auth_purpose for instance_principal is None. | 
| auth_type 
                    string
                                                                 | 
 | The type of authentication to use for making API requests. By default  auth_type="api_key"based authentication is performed and the API key (see api_user_key_file) in your config file will be used. If this 'auth_type' module option is not specified, the value of the OCI_ANSIBLE_AUTH_TYPE, if any, is used. Useauth_type="instance_principal"to use instance principal based authentication when running ansible playbooks within an OCI compute instance. | 
| block_action 
                    string
                                                                 | 
 | If `action` is set to `BLOCK`, this specifies how the traffic is blocked when detected as malicious by a protection rule. If unspecified, defaults to `SET_RESPONSE_CODE`. This parameter is updatable. | 
| block_error_page_code 
                    string
                                                                 | The error code to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. This parameter is updatable. | |
| block_error_page_description 
                    string
                                                                 | The description text to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `Access blocked by website owner. Please contact support.` This parameter is updatable. | |
| block_error_page_message 
                    string
                                                                 | The message to show on the error page when `action` is set to `BLOCK`, `blockAction` is set to `SHOW_ERROR_PAGE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to 'Access to the website is blocked.' This parameter is updatable. | |
| block_response_code 
                    integer
                                                                 | The response code returned when `action` is set to `BLOCK`, `blockAction` is set to `SET_RESPONSE_CODE`, and the traffic is detected as malicious by a protection rule. If unspecified, defaults to `403`. The list of available response codes: `400`, `401`, `403`, `405`, `409`, `411`, `412`, `413`, `414`, `415`, `416`, `500`, `501`, `502`, `503`, `504`, `507`. This parameter is updatable. | |
| cert_bundle 
                    string
                                                                 | The full path to a CA certificate bundle to be used for SSL verification. This will override the default CA certificate bundle. If not set, then the value of the OCI_ANSIBLE_CERT_BUNDLE variable, if any, is used. | |
| config_file_location 
                    string
                                                                 | Path to configuration file. If not set then the value of the OCI_CONFIG_FILE environment variable, if any, is used. Otherwise, defaults to ~/.oci/config. | |
| config_profile_name 
                    string
                                                                 | The profile to load from the config file referenced by  config_file_location. If not set, then the value of the OCI_CONFIG_PROFILE environment variable, if any, is used. Otherwise, defaults to the "DEFAULT" profile inconfig_file_location. | |
| is_response_inspected 
                    boolean
                                                                 | 
 | Inspects the response body of origin responses. Can be used to detect leakage of sensitive data. If unspecified, defaults to `false`. **Note:** Only origin responses with a Content-Type matching a value in `mediaTypes` will be inspected. This parameter is updatable. | 
| max_argument_count 
                    integer
                                                                 | The maximum number of arguments allowed to be passed to your application before an action is taken. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to `255`. This setting only applies if a corresponding protection rule is enabled, such as the "Number of Arguments Limits" rule (key: 960335). Example: If `maxArgumentCount` to `2` for the Max Number of Arguments protection rule (key: 960335), the following requests would be blocked: `GET /myapp/path?query=one&query=two&query=three` `POST /myapp/path` with Body `{"argument1":"one","argument2":"two","argument3":"three"}` This parameter is updatable. | |
| max_name_length_per_argument 
                    integer
                                                                 | The maximum length allowed for each argument name, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to `400`. This setting only applies if a corresponding protection rule is enabled, such as the "Values Limits" rule (key: 960208). This parameter is updatable. | |
| max_response_size_in_ki_b 
                    integer
                                                                 | The maximum response size to be fully inspected, in binary kilobytes (KiB). Anything over this limit will be partially inspected. If unspecified, defaults to `1024`. This parameter is updatable. | |
| max_total_name_length_of_arguments 
                    integer
                                                                 | The maximum length allowed for the sum of the argument name and value, in characters. Arguements are query parameters or body parameters in a PUT or POST request. If unspecified, defaults to `64000`. This setting only applies if a corresponding protection rule is enabled, such as the "Total Arguments Limits" rule (key: 960341). This parameter is updatable. | |
| media_types 
                    list
                     / elements=string                                             | The list of media types to allow for inspection, if `isResponseInspected` is enabled. Only responses with MIME types in this list will be inspected. If unspecified, defaults to `["text/html", "text/plain", "text/xml"]`. Supported MIME types include: - text/html - text/plain - text/asp - text/css - text/x-script - application/json - text/webviewhtml - text/x-java-source - application/x-javascript - application/javascript - application/ecmascript - text/javascript - text/ecmascript - text/x-script.perl - text/x-script.phyton - application/plain - application/xml - text/xml This parameter is updatable. | |
| realm_specific_endpoint_template_enabled 
                    boolean
                                                                 | 
 | Enable/Disable realm specific endpoint template for service client. By Default, realm specific endpoint template is disabled. If not set, then the value of the OCI_REALM_SPECIFIC_SERVICE_ENDPOINT_TEMPLATE_ENABLED variable, if any, is used. | 
| recommendations_period_in_days 
                    integer
                                                                 | The length of time to analyze traffic traffic, in days. After the analysis period, `WafRecommendations` will be populated. If unspecified, defaults to `10`. Use `GET /waasPolicies/{waasPolicyId}/wafRecommendations` to view WAF recommendations. This parameter is updatable. | |
| region 
                    string
                                                                 | The Oracle Cloud Infrastructure region to use for all OCI API requests. If not set, then the value of the OCI_REGION variable, if any, is used. This option is required if the region is not specified through a configuration file (See  config_file_location). Please refer to https://docs.us-phoenix-1.oraclecloud.com/Content/General/Concepts/regions.htm for more information on OCI regions. | |
| state 
                    string
                                                                 | 
 | The state of the ProtectionSettings. Use state=present to update an existing a ProtectionSettings. | 
| tenancy 
                    string
                                                                 | OCID of your tenancy. If not set, then the value of the OCI_TENANCY variable, if any, is used. This option is required if the tenancy OCID is not specified through a configuration file (See  config_file_location). To get the tenancy OCID, please refer https://docs.us-phoenix-1.oraclecloud.com/Content/API/Concepts/apisigningkey.htm | |
| waas_policy_id 
                    string
                                             / required                     | The OCID of the WAAS policy. aliases: id | |
| wait 
                    boolean
                                                                 | 
 | Whether to wait for create or delete operation to complete. | 
| wait_timeout 
                    integer
                                                                 | Time, in seconds, to wait when wait=yes. Defaults to 1200 for most of the services but some services might have a longer wait timeout. | 
Notes¶
Note
- For OCI python sdk configuration, please refer to https://oracle-cloud-infrastructure-python-sdk.readthedocs.io/en/latest/configuration.html 
Examples¶
- name: Update protection_settings
  oci_waas_protection_settings:
    # required
    waas_policy_id: "ocid1.waaspolicy.oc1..xxxxxxEXAMPLExxxxxx"
    # optional
    block_action: SHOW_ERROR_PAGE
    block_response_code: 56
    block_error_page_message: block_error_page_message_example
    block_error_page_code: block_error_page_code_example
    block_error_page_description: block_error_page_description_example
    max_argument_count: 56
    max_name_length_per_argument: 56
    max_total_name_length_of_arguments: 56
    recommendations_period_in_days: 56
    is_response_inspected: true
    max_response_size_in_ki_b: 56
    allowed_http_methods: [ "OPTIONS" ]
    media_types: [ "media_types_example" ]
Return Values¶
Common return values are documented here, the following are the fields unique to this module:
Authors¶
- Oracle (@oracle)