com.pulumi.aws.wafregional.kotlin.inputs.SqlInjectionMatchSetSqlInjectionMatchTupleArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-aws-kotlin Show documentation
Show all versions of pulumi-aws-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.aws.wafregional.kotlin.inputs
import com.pulumi.aws.wafregional.inputs.SqlInjectionMatchSetSqlInjectionMatchTupleArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.jvm.JvmName
/**
*
* @property fieldToMatch Specifies where in a web request to look for snippets of malicious SQL code.
* @property textTransformation Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
* If you specify a transformation, AWS WAF performs the transformation on `field_to_match` before inspecting a request for a match.
* e.g., `CMD_LINE`, `HTML_ENTITY_DECODE` or `NONE`.
* See [docs](https://docs.aws.amazon.com/waf/latest/APIReference/API_regional_SqlInjectionMatchTuple.html#WAF-Type-regional_SqlInjectionMatchTuple-TextTransformation)
* for all supported values.
*/
public data class SqlInjectionMatchSetSqlInjectionMatchTupleArgs(
public val fieldToMatch: Output,
public val textTransformation: Output,
) :
ConvertibleToJava {
override fun toJava(): com.pulumi.aws.wafregional.inputs.SqlInjectionMatchSetSqlInjectionMatchTupleArgs =
com.pulumi.aws.wafregional.inputs.SqlInjectionMatchSetSqlInjectionMatchTupleArgs.builder()
.fieldToMatch(fieldToMatch.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.textTransformation(textTransformation.applyValue({ args0 -> args0 })).build()
}
/**
* Builder for [SqlInjectionMatchSetSqlInjectionMatchTupleArgs].
*/
@PulumiTagMarker
public class SqlInjectionMatchSetSqlInjectionMatchTupleArgsBuilder internal constructor() {
private var fieldToMatch: Output? =
null
private var textTransformation: Output? = null
/**
* @param value Specifies where in a web request to look for snippets of malicious SQL code.
*/
@JvmName("crruhuibhxemapdi")
public suspend fun fieldToMatch(`value`: Output) {
this.fieldToMatch = value
}
/**
* @param value Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
* If you specify a transformation, AWS WAF performs the transformation on `field_to_match` before inspecting a request for a match.
* e.g., `CMD_LINE`, `HTML_ENTITY_DECODE` or `NONE`.
* See [docs](https://docs.aws.amazon.com/waf/latest/APIReference/API_regional_SqlInjectionMatchTuple.html#WAF-Type-regional_SqlInjectionMatchTuple-TextTransformation)
* for all supported values.
*/
@JvmName("tejwcmgccpnqxcpb")
public suspend fun textTransformation(`value`: Output) {
this.textTransformation = value
}
/**
* @param value Specifies where in a web request to look for snippets of malicious SQL code.
*/
@JvmName("emldhuiyxeajivma")
public suspend fun fieldToMatch(`value`: SqlInjectionMatchSetSqlInjectionMatchTupleFieldToMatchArgs) {
val toBeMapped = value
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.fieldToMatch = mapped
}
/**
* @param argument Specifies where in a web request to look for snippets of malicious SQL code.
*/
@JvmName("cflvqitmvognyytd")
public suspend fun fieldToMatch(argument: suspend SqlInjectionMatchSetSqlInjectionMatchTupleFieldToMatchArgsBuilder.() -> Unit) {
val toBeMapped =
SqlInjectionMatchSetSqlInjectionMatchTupleFieldToMatchArgsBuilder().applySuspend {
argument()
}.build()
val mapped = of(toBeMapped)
this.fieldToMatch = mapped
}
/**
* @param value Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
* If you specify a transformation, AWS WAF performs the transformation on `field_to_match` before inspecting a request for a match.
* e.g., `CMD_LINE`, `HTML_ENTITY_DECODE` or `NONE`.
* See [docs](https://docs.aws.amazon.com/waf/latest/APIReference/API_regional_SqlInjectionMatchTuple.html#WAF-Type-regional_SqlInjectionMatchTuple-TextTransformation)
* for all supported values.
*/
@JvmName("yhmgydrgnlycaosg")
public suspend fun textTransformation(`value`: String) {
val toBeMapped = value
val mapped = toBeMapped.let({ args0 -> of(args0) })
this.textTransformation = mapped
}
internal fun build(): SqlInjectionMatchSetSqlInjectionMatchTupleArgs =
SqlInjectionMatchSetSqlInjectionMatchTupleArgs(
fieldToMatch = fieldToMatch ?: throw PulumiNullFieldException("fieldToMatch"),
textTransformation = textTransformation ?: throw PulumiNullFieldException("textTransformation"),
)
}
© 2015 - 2024 Weber Informatics LLC | Privacy Policy