All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.pulumi.awsnative.wafv2.kotlin.inputs.RuleGroupBodyArgs.kt Maven / Gradle / Ivy

@file:Suppress("NAME_SHADOWING", "DEPRECATION")

package com.pulumi.awsnative.wafv2.kotlin.inputs

import com.pulumi.awsnative.wafv2.inputs.RuleGroupBodyArgs.builder
import com.pulumi.awsnative.wafv2.kotlin.enums.RuleGroupOversizeHandling
import com.pulumi.core.Output
import com.pulumi.core.Output.of
import com.pulumi.kotlin.ConvertibleToJava
import com.pulumi.kotlin.PulumiTagMarker
import kotlin.Suppress
import kotlin.jvm.JvmName

/**
 * The body of a web request. This immediately follows the request headers.
 * @property oversizeHandling What AWS WAF should do if the body is larger than AWS WAF can inspect.
 * AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection.
 * - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes).
 * - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL `AssociationConfig` , for additional processing fees.
 * The options for oversize handling are the following:
 * - `CONTINUE` - Inspect the available body contents normally, according to the rule inspection criteria.
 * - `MATCH` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
 * - `NO_MATCH` - Treat the web request as not matching the rule statement.
 * You can combine the `MATCH` or `NO_MATCH` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
 * Default: `CONTINUE`
 */
public data class RuleGroupBodyArgs(
    public val oversizeHandling: Output? = null,
) : ConvertibleToJava {
    override fun toJava(): com.pulumi.awsnative.wafv2.inputs.RuleGroupBodyArgs =
        com.pulumi.awsnative.wafv2.inputs.RuleGroupBodyArgs.builder()
            .oversizeHandling(
                oversizeHandling?.applyValue({ args0 ->
                    args0.let({ args0 ->
                        args0.toJava()
                    })
                }),
            ).build()
}

/**
 * Builder for [RuleGroupBodyArgs].
 */
@PulumiTagMarker
public class RuleGroupBodyArgsBuilder internal constructor() {
    private var oversizeHandling: Output? = null

    /**
     * @param value What AWS WAF should do if the body is larger than AWS WAF can inspect.
     * AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection.
     * - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes).
     * - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL `AssociationConfig` , for additional processing fees.
     * The options for oversize handling are the following:
     * - `CONTINUE` - Inspect the available body contents normally, according to the rule inspection criteria.
     * - `MATCH` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
     * - `NO_MATCH` - Treat the web request as not matching the rule statement.
     * You can combine the `MATCH` or `NO_MATCH` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
     * Default: `CONTINUE`
     */
    @JvmName("tbqhndqbqdbdvepu")
    public suspend fun oversizeHandling(`value`: Output) {
        this.oversizeHandling = value
    }

    /**
     * @param value What AWS WAF should do if the body is larger than AWS WAF can inspect.
     * AWS WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to AWS WAF for inspection.
     * - For Application Load Balancer and AWS AppSync , the limit is fixed at 8 KB (8,192 bytes).
     * - For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL `AssociationConfig` , for additional processing fees.
     * The options for oversize handling are the following:
     * - `CONTINUE` - Inspect the available body contents normally, according to the rule inspection criteria.
     * - `MATCH` - Treat the web request as matching the rule statement. AWS WAF applies the rule action to the request.
     * - `NO_MATCH` - Treat the web request as not matching the rule statement.
     * You can combine the `MATCH` or `NO_MATCH` settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit.
     * Default: `CONTINUE`
     */
    @JvmName("plxuisybqikohmhg")
    public suspend fun oversizeHandling(`value`: RuleGroupOversizeHandling?) {
        val toBeMapped = value
        val mapped = toBeMapped?.let({ args0 -> of(args0) })
        this.oversizeHandling = mapped
    }

    internal fun build(): RuleGroupBodyArgs = RuleGroupBodyArgs(
        oversizeHandling = oversizeHandling,
    )
}




© 2015 - 2025 Weber Informatics LLC | Privacy Policy