amazonka-wafv2-2.0: Amazon WAFV2 SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.WAFV2.Types.Body

Description

 
Synopsis

Documentation

data Body Source #

Inspect the body of the web request. The body immediately follows the request headers.

This is used to indicate the web request component to inspect, in the FieldToMatch specification.

See: newBody smart constructor.

Constructors

Body' 

Fields

  • oversizeHandling :: Maybe OversizeHandling

    What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.

    The options for oversize handling are the following:

    • CONTINUE - Inspect the body normally, according to the rule inspection criteria.
    • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
    • NO_MATCH - Treat the web request as not matching the rule statement.

    You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over 8 KB.

    Default: CONTINUE

Instances

Instances details
FromJSON Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

ToJSON Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Generic Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Associated Types

type Rep Body :: Type -> Type #

Methods

from :: Body -> Rep Body x #

to :: Rep Body x -> Body #

Read Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Show Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Methods

showsPrec :: Int -> Body -> ShowS #

show :: Body -> String #

showList :: [Body] -> ShowS #

NFData Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Methods

rnf :: Body -> () #

Eq Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Methods

(==) :: Body -> Body -> Bool #

(/=) :: Body -> Body -> Bool #

Hashable Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

Methods

hashWithSalt :: Int -> Body -> Int #

hash :: Body -> Int #

type Rep Body Source # 
Instance details

Defined in Amazonka.WAFV2.Types.Body

type Rep Body = D1 ('MetaData "Body" "Amazonka.WAFV2.Types.Body" "amazonka-wafv2-2.0-3v3WgpYn7RT5hSd6MsT5dN" 'False) (C1 ('MetaCons "Body'" 'PrefixI 'True) (S1 ('MetaSel ('Just "oversizeHandling") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe OversizeHandling))))

newBody :: Body Source #

Create a value of Body with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:oversizeHandling:Body', body_oversizeHandling - What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.

The options for oversize handling are the following:

  • CONTINUE - Inspect the body normally, according to the rule inspection criteria.
  • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
  • NO_MATCH - Treat the web request as not matching the rule statement.

You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over 8 KB.

Default: CONTINUE

body_oversizeHandling :: Lens' Body (Maybe OversizeHandling) Source #

What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.

The options for oversize handling are the following:

  • CONTINUE - Inspect the body normally, according to the rule inspection criteria.
  • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
  • NO_MATCH - Treat the web request as not matching the rule statement.

You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over 8 KB.

Default: CONTINUE