Documentation ¶
Index ¶
Constants ¶
This section is empty.
Variables ¶
View Source
var AttackTypes = struct { Any AttackType CmdInjection AttackType JndiInjection AttackType SqlInjection AttackType Ssrf AttackType }{ "ANY", "CMD_INJECTION", "JNDI_INJECTION", "SQL_INJECTION", "SSRF", }
View Source
var BlockingStrategies = struct { Block BlockingStrategy Monitor BlockingStrategy Off BlockingStrategy }{ "BLOCK", "MONITOR", "OFF", }
Functions ¶
This section is empty.
Types ¶
type AttackHandling ¶
type AttackHandling struct {
BlockingStrategy BlockingStrategy `json:"blockingStrategy"` // Possible Values: `BLOCK`, `MONITOR`, `OFF`
}
func (*AttackHandling) MarshalHCL ¶
func (me *AttackHandling) MarshalHCL(properties hcl.Properties) error
func (*AttackHandling) UnmarshalHCL ¶
func (me *AttackHandling) UnmarshalHCL(decoder hcl.Decoder) error
type AttackType ¶
type AttackType string
type BlockingStrategy ¶
type BlockingStrategy string
type Criteria ¶
type Criteria struct { AttackType AttackType `json:"attackType"` // Possible Values: `ANY`, `CMD_INJECTION`, `JNDI_INJECTION`, `SQL_INJECTION`, `SSRF` ProcessGroup *string `json:"processGroup,omitempty"` // Process group }
func (*Criteria) MarshalHCL ¶
func (me *Criteria) MarshalHCL(properties hcl.Properties) error
type Metadata ¶
type Metadata struct {
Comment string `json:"comment"`
}
func (*Metadata) MarshalHCL ¶
func (me *Metadata) MarshalHCL(properties hcl.Properties) error
type Settings ¶
type Settings struct { AttackHandling *AttackHandling `json:"attackHandling"` // Step 2: Define attack control for chosen criteria Criteria *Criteria `json:"criteria"` // Step 1: Define criteria Enabled bool `json:"enabled"` // This setting is enabled (`true`) or disabled (`false`) Metadata *Metadata `json:"metadata"` // Step 3: Leave comment InsertAfter string `json:"-"` }
func (*Settings) MarshalHCL ¶
func (me *Settings) MarshalHCL(properties hcl.Properties) error
Click to show internal directories.
Click to hide internal directories.