
com.pulumi.aws.wafv2.kotlin.inputs.WebAclRuleStatementSqliMatchStatementArgs.kt Maven / Gradle / Ivy
@file:Suppress("NAME_SHADOWING", "DEPRECATION")
package com.pulumi.aws.wafv2.kotlin.inputs
import com.pulumi.aws.wafv2.inputs.WebAclRuleStatementSqliMatchStatementArgs.builder
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiNullFieldException
import com.pulumi.kotlin.PulumiTagMarker
import com.pulumi.kotlin.applySuspend
import kotlin.String
import kotlin.Suppress
import kotlin.Unit
import kotlin.collections.List
import kotlin.jvm.JvmName
/**
*
* @property fieldToMatch Part of a web request that you want AWS WAF to inspect. See `field_to_match` below for details.
* @property sensitivityLevel Sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. Valid values include: `LOW`, `HIGH`.
* @property textTransformations Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. At least one transformation is required. See `text_transformation` below for details.
*/
public data class WebAclRuleStatementSqliMatchStatementArgs(
public val fieldToMatch: Output? = null,
public val sensitivityLevel: Output? = null,
public val textTransformations: Output>,
) : ConvertibleToJava {
override fun toJava(): com.pulumi.aws.wafv2.inputs.WebAclRuleStatementSqliMatchStatementArgs =
com.pulumi.aws.wafv2.inputs.WebAclRuleStatementSqliMatchStatementArgs.builder()
.fieldToMatch(fieldToMatch?.applyValue({ args0 -> args0.let({ args0 -> args0.toJava() }) }))
.sensitivityLevel(sensitivityLevel?.applyValue({ args0 -> args0 }))
.textTransformations(
textTransformations.applyValue({ args0 ->
args0.map({ args0 ->
args0.let({ args0 -> args0.toJava() })
})
}),
).build()
}
/**
* Builder for [WebAclRuleStatementSqliMatchStatementArgs].
*/
@PulumiTagMarker
public class WebAclRuleStatementSqliMatchStatementArgsBuilder internal constructor() {
private var fieldToMatch: Output? = null
private var sensitivityLevel: Output? = null
private var textTransformations:
Output>? = null
/**
* @param value Part of a web request that you want AWS WAF to inspect. See `field_to_match` below for details.
*/
@JvmName("ngygbtfkcumaphnb")
public suspend fun fieldToMatch(`value`: Output) {
this.fieldToMatch = value
}
/**
* @param value Sensitivity that you want AWS WAF to use to inspect for SQL injection attacks. Valid values include: `LOW`, `HIGH`.
*/
@JvmName("ygabufvjehyxdccg")
public suspend fun sensitivityLevel(`value`: Output) {
this.sensitivityLevel = value
}
/**
* @param value Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. At least one transformation is required. See `text_transformation` below for details.
*/
@JvmName("vibejkqtlrlqljtn")
public suspend fun textTransformations(`value`: Output>) {
this.textTransformations = value
}
@JvmName("nshaoeyjvjjyotbo")
public suspend fun textTransformations(vararg values: Output) {
this.textTransformations = Output.all(values.asList())
}
/**
* @param values Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. At least one transformation is required. See `text_transformation` below for details.
*/
@JvmName("nfixttcjxprmqqdy")
public suspend fun textTransformations(values: List
© 2015 - 2025 Weber Informatics LLC | Privacy Policy