com.pulumi.aws.wafv2.kotlin.inputs.RuleGroupRuleStatementSqliMatchStatementArgs.kt Maven / Gradle / Ivy
Go to download
Show more of this group Show more artifacts with this name
Show all versions of pulumi-aws-kotlin Show documentation
Show all versions of pulumi-aws-kotlin Show documentation
Build cloud applications and infrastructure by combining the safety and reliability of infrastructure as code with the power of the Kotlin programming language.
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.aws.wafv2.kotlin.inputs
import com.pulumi.aws.wafv2.inputs.RuleGroupRuleStatementSqliMatchStatementArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
*
* @property fieldToMatch The part of a web request that you want AWS WAF to inspect. See Field to Match below for details.
* @property sensitivityLevel Sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. Valid values include: `LOW`, `HIGH`.
* @property textTransformations Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
* At least one required.
* See Text Transformation below for details.
*/
public data class RuleGroupRuleStatementSqliMatchStatementArgs(
public val fieldToMatch: Output? = null,
public val sensitivityLevel: Output? = null,
public val textTransformations: Output>,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.aws.wafv2.inputs.RuleGroupRuleStatementSqliMatchStatementArgs =
com.pulumi.aws.wafv2.inputs.RuleGroupRuleStatementSqliMatchStatementArgs.builder()
.fieldToMatch(fieldToMatch?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.sensitivityLevel(sensitivityLevel?.applyValue({ args0 -> args0 }))
.textTransformations(
textTransformations.applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 -> args0.toJava() })
})
}),
).build()
}
/**
* Builder for [RuleGroupRuleStatementSqliMatchStatementArgs].
*/
@PulumiTagMarker
public class RuleGroupRuleStatementSqliMatchStatementArgsBuilder internal constructor() {
private var fieldToMatch: Output? = null
private var sensitivityLevel: Output? = null
private var textTransformations:
Output>? = null
/**
* @param value The part of a web request that you want AWS WAF to inspect. See Field to Match below for details.
*/
@JvmName("ejegsfyottwkhgfi")
public suspend fun fieldToMatch(`value`: Output) {
this.fieldToMatch = value
}
/**
* @param value Sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. Valid values include: `LOW`, `HIGH`.
*/
@JvmName("kxidgpewldydxoxh")
public suspend fun sensitivityLevel(`value`: Output) {
this.sensitivityLevel = value
}
/**
* @param value Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
* At least one required.
* See Text Transformation below for details.
*/
@JvmName("toxbuscjpuymjqwd")
public suspend fun textTransformations(`value`: Output>) {
this.textTransformations = value
}
@JvmName("lximlvxrouhuijxu")
public suspend fun textTransformations(vararg values: Output) {
this.textTransformations = Output.all(values.asList())
}
/**
* @param values Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection.
* At least one required.
* See Text Transformation below for details.
*/
@JvmName("ppfqmdgxxommablp")
public suspend fun textTransformations(values: List
© 2015 - 2024 Weber Informatics LLC | Privacy Policy