/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include This is the latest version of AWS WAF, named AWS WAFV2,
* released in November, 2019. For information, including how to migrate your AWS
* WAF resources from the prior release, see the AWS
* WAF Developer Guide. A rule statement used to search web
* request components for matches with regular expressions. To use this, create a
* RegexPatternSet that specifies the expressions that you want to detect,
* then use the ARN of that set in this statement. A web request matches the
* pattern set rule statement if the request component matches any of the patterns
* in the set. To create a regex pattern set, see CreateRegexPatternSet. Each regex pattern set rule statement references a regex pattern set. You
* create and maintain the set independent of your rules. This allows you to use
* the single set in multiple rules. When you update the referenced set, AWS WAF
* automatically updates all rules that reference it.See Also:
AWS
* API Reference
The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline const Aws::String& GetARN() const{ return m_aRN; } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline bool ARNHasBeenSet() const { return m_aRNHasBeenSet; } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline void SetARN(const Aws::String& value) { m_aRNHasBeenSet = true; m_aRN = value; } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline void SetARN(Aws::String&& value) { m_aRNHasBeenSet = true; m_aRN = std::move(value); } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline void SetARN(const char* value) { m_aRNHasBeenSet = true; m_aRN.assign(value); } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline RegexPatternSetReferenceStatement& WithARN(const Aws::String& value) { SetARN(value); return *this;} /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline RegexPatternSetReferenceStatement& WithARN(Aws::String&& value) { SetARN(std::move(value)); return *this;} /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline RegexPatternSetReferenceStatement& WithARN(const char* value) { SetARN(value); return *this;} /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline RegexPatternSetReferenceStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;} /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline RegexPatternSetReferenceStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;} /** *Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.