All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.wafv2.model.Body Maven / Gradle / Ivy

/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.wafv2.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* Inspect the body of the web request. The body immediately follows the request headers. *

*

* This is used to indicate the web request component to inspect, in the FieldToMatch specification. *

* * @see AWS API Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class Body implements Serializable, Cloneable, StructuredPojo { /** *

* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than * the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. *

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the * request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and * web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE *

*/ private String oversizeHandling; /** *

* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than * the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. *

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the * request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and * web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE *

* * @param oversizeHandling * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is * larger than the limit, the underlying host service only forwards the contents that are below the limit to * WAF for inspection.

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection * criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to * the request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your * rule and web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE * @see OversizeHandling */ public void setOversizeHandling(String oversizeHandling) { this.oversizeHandling = oversizeHandling; } /** *

* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than * the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. *

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the * request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and * web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE *

* * @return What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is * larger than the limit, the underlying host service only forwards the contents that are below the limit to * WAF for inspection.

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection * criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to * the request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your * rule and web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE * @see OversizeHandling */ public String getOversizeHandling() { return this.oversizeHandling; } /** *

* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than * the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. *

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the * request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and * web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE *

* * @param oversizeHandling * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is * larger than the limit, the underlying host service only forwards the contents that are below the limit to * WAF for inspection.

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection * criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to * the request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your * rule and web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE * @return Returns a reference to this object so that method calls can be chained together. * @see OversizeHandling */ public Body withOversizeHandling(String oversizeHandling) { setOversizeHandling(oversizeHandling); return this; } /** *

* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than * the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. *

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the * request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and * web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE *

* * @param oversizeHandling * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire * contents of the web request body if the body exceeds the limit for the resource type. If the body is * larger than the limit, the underlying host service only forwards the contents that are below the limit to * WAF for inspection.

*

* The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront * distributions. For CloudFront distributions, you can increase the limit in the web ACL * AssociationConfig, for additional processing fees. *

*

* The options for oversize handling are the following: *

*
    *
  • *

    * CONTINUE - Inspect the available body contents normally, according to the rule inspection * criteria. *

    *
  • *
  • *

    * MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to * the request. *

    *
  • *
  • *

    * NO_MATCH - Treat the web request as not matching the rule statement. *

    *
  • *
*

* You can combine the MATCH or NO_MATCH settings for oversize handling with your * rule and web ACL action settings, so that you block any request whose body is over the limit. *

*

* Default: CONTINUE * @return Returns a reference to this object so that method calls can be chained together. * @see OversizeHandling */ public Body withOversizeHandling(OversizeHandling oversizeHandling) { this.oversizeHandling = oversizeHandling.toString(); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getOversizeHandling() != null) sb.append("OversizeHandling: ").append(getOversizeHandling()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof Body == false) return false; Body other = (Body) obj; if (other.getOversizeHandling() == null ^ this.getOversizeHandling() == null) return false; if (other.getOversizeHandling() != null && other.getOversizeHandling().equals(this.getOversizeHandling()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getOversizeHandling() == null) ? 0 : getOversizeHandling().hashCode()); return hashCode; } @Override public Body clone() { try { return (Body) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.wafv2.model.transform.BodyMarshaller.getInstance().marshall(this, protocolMarshaller); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy