
com.pulumi.aws.wafv2.kotlin.inputs.RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgs.kt Maven / Gradle / Ivy
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.aws.wafv2.kotlin.inputs
import com.pulumi.aws.wafv2.inputs.RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
*
* @property fieldToMatch The part of a web request that you want AWS WAF to inspect. See Field to Match below for details.
* @property sensitivityLevel Sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. Valid values include: `LOW`, `HIGH`.
* @property textTransformations Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
* At least one required.
* See Text Transformation below for details.
*/
public data class RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgs(
public val fieldToMatch: Output? =
null,
public val sensitivityLevel: Output? = null,
public val textTransformations: Output>,
) :
ConvertibleToJava {
override fun toJava(): com.pulumi.aws.wafv2.inputs.RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgs =
com.pulumi.aws.wafv2.inputs.RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgs.builder()
.fieldToMatch(fieldToMatch?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.sensitivityLevel(sensitivityLevel?.applyValue({ args0 -> args0 }))
.textTransformations(
textTransformations.applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 -> args0.toJava() })
})
}),
).build()
}
/**
* Builder for [RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgs].
*/
@PulumiTagMarker
public class RuleGroupRuleStatementRateBasedStatementScopeDownStatementSqliMatchStatementArgsBuilder
internal constructor() {
private var fieldToMatch:
Output? =
null
private var sensitivityLevel: Output? = null
private var textTransformations:
Output>? =
null
/**
* @param value The part of a web request that you want AWS WAF to inspect. See Field to Match below for details.
*/
@JvmName("mslesosrfjmtpojp")
public suspend fun fieldToMatch(`value`: Output) {
this.fieldToMatch = value
}
/**
* @param value Sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. Valid values include: `LOW`, `HIGH`.
*/
@JvmName("vlhkknnioxhmdjua")
public suspend fun sensitivityLevel(`value`: Output) {
this.sensitivityLevel = value
}
/**
* @param value Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
* At least one required.
* See Text Transformation below for details.
*/
@JvmName("bwjxqmgclhlgynne")
public suspend fun textTransformations(`value`: Output>) {
this.textTransformations = value
}
@JvmName("nxsgmutiglgeuyis")
public suspend fun textTransformations(vararg values: Output) {
this.textTransformations = Output.all(values.asList())
}
/**
* @param values Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
* At least one required.
* See Text Transformation below for details.
*/
@JvmName("xwxtgqrxhehbeeqm")
public suspend fun textTransformations(values: List
© 2015 - 2025 Weber Informatics LLC | Privacy Policy