Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

ResponseInspection

import type { ResponseInspection } from "https://aws-api.deno.dev/v0.4/services/wafv2.ts?docs=full";

The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates.

The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time.

Note: Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.

This is part of the AWSManagedRulesATPRuleSet configuration in ManagedRuleGroupConfig.

Enable login response inspection by configuring exactly one component of the response to inspect. You can't configure more than one. If you don't configure any of the response inspection options, response inspection is disabled.

interface ResponseInspection {
BodyContains?: ResponseInspectionBodyContains | null;
Header?: ResponseInspectionHeader | null;
Json?: ResponseInspectionJson | null;
StatusCode?: ResponseInspectionStatusCode | null;
}

§Properties

§

Configures inspection of the response body. WAF can inspect the first 65,536 bytes (64 KB) of the response body.

§

Configures inspection of the response JSON. WAF can inspect the first 65,536 bytes (64 KB) of the response JSON.

§

Configures inspection of the response status code.