/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include A rule statement used to search web request components for matches with
* regular expressions. To use this, create a RegexPatternSet that specifies
* the expressions that you want to detect, then use the ARN of that set in this
* statement. A web request matches the pattern set rule statement if the request
* component matches any of the patterns in the set. To create a regex pattern set,
* see CreateRegexPatternSet. Each regex pattern set rule statement
* references a regex pattern set. You create and maintain the set independent of
* your rules. This allows you to use the single set in multiple rules. When you
* update the referenced set, WAF automatically updates all rules that reference
* it.See Also:
AWS
* API Reference
The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline const Aws::String& GetARN() const{ return m_aRN; } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline bool ARNHasBeenSet() const { return m_aRNHasBeenSet; } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline void SetARN(const Aws::String& value) { m_aRNHasBeenSet = true; m_aRN = value; } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline void SetARN(Aws::String&& value) { m_aRNHasBeenSet = true; m_aRN = std::move(value); } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline void SetARN(const char* value) { m_aRNHasBeenSet = true; m_aRN.assign(value); } /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline RegexPatternSetReferenceStatement& WithARN(const Aws::String& value) { SetARN(value); return *this;} /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline RegexPatternSetReferenceStatement& WithARN(Aws::String&& value) { SetARN(std::move(value)); return *this;} /** *The Amazon Resource Name (ARN) of the RegexPatternSet that this * statement references.
*/ inline RegexPatternSetReferenceStatement& WithARN(const char* value) { SetARN(value); return *this;} /** *The part of the web request that you want WAF to inspect.
*/ inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; } /** *The part of the web request that you want WAF to inspect.
*/ inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; } /** *The part of the web request that you want WAF to inspect.
*/ inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; } /** *The part of the web request that you want WAF to inspect.
*/ inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); } /** *The part of the web request that you want WAF to inspect.
*/ inline RegexPatternSetReferenceStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;} /** *The part of the web request that you want WAF to inspect.
*/ inline RegexPatternSetReferenceStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;} /** *Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.