/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include <aws/wafv2/WAFV2_EXPORTS.h> #include <aws/wafv2/WAFV2Request.h> #include <aws/core/utils/memory/stl/AWSString.h> #include <utility> namespace Aws { namespace WAFV2 { namespace Model { /** */ class PutPermissionPolicyRequest : public WAFV2Request { public: AWS_WAFV2_API PutPermissionPolicyRequest(); // Service request name is the Operation name which will send this request out, // each operation should has unique request name, so that we can get operation's name from this request. // Note: this is not true for response, multiple operations may have the same response name, // so we can not get operation's name from response. inline virtual const char* GetServiceRequestName() const override { return "PutPermissionPolicy"; } AWS_WAFV2_API Aws::String SerializePayload() const override; AWS_WAFV2_API Aws::Http::HeaderValueCollection GetRequestSpecificHeaders() const override; /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline const Aws::String& GetResourceArn() const{ return m_resourceArn; } /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline bool ResourceArnHasBeenSet() const { return m_resourceArnHasBeenSet; } /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline void SetResourceArn(const Aws::String& value) { m_resourceArnHasBeenSet = true; m_resourceArn = value; } /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline void SetResourceArn(Aws::String&& value) { m_resourceArnHasBeenSet = true; m_resourceArn = std::move(value); } /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline void SetResourceArn(const char* value) { m_resourceArnHasBeenSet = true; m_resourceArn.assign(value); } /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline PutPermissionPolicyRequest& WithResourceArn(const Aws::String& value) { SetResourceArn(value); return *this;} /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline PutPermissionPolicyRequest& WithResourceArn(Aws::String&& value) { SetResourceArn(std::move(value)); return *this;} /** * <p>The Amazon Resource Name (ARN) of the <a>RuleGroup</a> to which you want to * attach the policy.</p> */ inline PutPermissionPolicyRequest& WithResourceArn(const char* value) { SetResourceArn(value); return *this;} /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline const Aws::String& GetPolicy() const{ return m_policy; } /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline bool PolicyHasBeenSet() const { return m_policyHasBeenSet; } /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline void SetPolicy(const Aws::String& value) { m_policyHasBeenSet = true; m_policy = value; } /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline void SetPolicy(Aws::String&& value) { m_policyHasBeenSet = true; m_policy = std::move(value); } /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline void SetPolicy(const char* value) { m_policyHasBeenSet = true; m_policy.assign(value); } /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline PutPermissionPolicyRequest& WithPolicy(const Aws::String& value) { SetPolicy(value); return *this;} /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline PutPermissionPolicyRequest& WithPolicy(Aws::String&& value) { SetPolicy(std::move(value)); return *this;} /** * <p>The policy to attach to the specified rule group. </p> <p>The policy * specifications must conform to the following:</p> <ul> <li> <p>The policy must * be composed using IAM Policy version 2012-10-17.</p> </li> <li> <p>The policy * must include specifications for <code>Effect</code>, <code>Action</code>, and * <code>Principal</code>.</p> </li> <li> <p> <code>Effect</code> must specify * <code>Allow</code>.</p> </li> <li> <p> <code>Action</code> must specify * <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and * <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify * <code>wafv2:GetRuleGroup</code>. WAF rejects any extra actions or wildcard * actions in the policy.</p> </li> <li> <p>The policy must not include a * <code>Resource</code> parameter.</p> </li> </ul> <p>For more information, see <a * href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html">IAM * Policies</a>. </p> */ inline PutPermissionPolicyRequest& WithPolicy(const char* value) { SetPolicy(value); return *this;} private: Aws::String m_resourceArn; bool m_resourceArnHasBeenSet = false; Aws::String m_policy; bool m_policyHasBeenSet = false; }; } // namespace Model } // namespace WAFV2 } // namespace Aws