Copyright | (c) 2013-2023 Brendan Hay |
---|---|
License | Mozilla Public License, v. 2.0. |
Maintainer | Brendan Hay |
Stability | auto-generated |
Portability | non-portable (GHC extensions) |
Safe Haskell | Safe-Inferred |
Language | Haskell2010 |
Synopsis
- data Body = Body' {}
- newBody :: Body
- body_oversizeHandling :: Lens' Body (Maybe OversizeHandling)
Documentation
Inspect the body of the web request. The body immediately follows the request headers.
This is used to indicate the web request component to inspect, in the FieldToMatch specification.
See: newBody
smart constructor.
Body' | |
|
Instances
FromJSON Body Source # | |
ToJSON Body Source # | |
Defined in Amazonka.WAFV2.Types.Body | |
Generic Body Source # | |
Read Body Source # | |
Show Body Source # | |
NFData Body Source # | |
Defined in Amazonka.WAFV2.Types.Body | |
Eq Body Source # | |
Hashable Body Source # | |
Defined in Amazonka.WAFV2.Types.Body | |
type Rep Body Source # | |
Defined in Amazonka.WAFV2.Types.Body type Rep Body = D1 ('MetaData "Body" "Amazonka.WAFV2.Types.Body" "amazonka-wafv2-2.0-3v3WgpYn7RT5hSd6MsT5dN" 'False) (C1 ('MetaCons "Body'" 'PrefixI 'True) (S1 ('MetaSel ('Just "oversizeHandling") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe OversizeHandling)))) |
Create a value of Body
with all optional fields omitted.
Use generic-lens or optics to modify other optional fields.
The following record fields are available, with the corresponding lenses provided for backwards compatibility:
$sel:oversizeHandling:Body'
, body_oversizeHandling
- What WAF should do if the body is larger than WAF can inspect. WAF does
not support inspecting the entire contents of the body of a web request
when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the
request body are forwarded to WAF by the underlying host service.
The options for oversize handling are the following:
CONTINUE
- Inspect the body normally, according to the rule inspection criteria.MATCH
- Treat the web request as matching the rule statement. WAF applies the rule action to the request.NO_MATCH
- Treat the web request as not matching the rule statement.
You can combine the MATCH
or NO_MATCH
settings for oversize handling
with your rule and web ACL action settings, so that you block any
request whose body is over 8 KB.
Default: CONTINUE
body_oversizeHandling :: Lens' Body (Maybe OversizeHandling) Source #
What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.
The options for oversize handling are the following:
CONTINUE
- Inspect the body normally, according to the rule inspection criteria.MATCH
- Treat the web request as matching the rule statement. WAF applies the rule action to the request.NO_MATCH
- Treat the web request as not matching the rule statement.
You can combine the MATCH
or NO_MATCH
settings for oversize handling
with your rule and web ACL action settings, so that you block any
request whose body is over 8 KB.
Default: CONTINUE