amazonka-wafv2-2.0: Amazon WAFV2 SDK.
Copyright(c) 2013-2023 Brendan Hay
LicenseMozilla Public License, v. 2.0.
MaintainerBrendan Hay
Stabilityauto-generated
Portabilitynon-portable (GHC extensions)
Safe HaskellSafe-Inferred
LanguageHaskell2010

Amazonka.WAFV2.Types.JsonBody

Description

 
Synopsis

Documentation

data JsonBody Source #

Inspect the body of the web request as JSON. The body immediately follows the request headers.

This is used to indicate the web request component to inspect, in the FieldToMatch specification.

Use the specifications in this object to indicate which parts of the JSON body to inspect using the rule's inspection criteria. WAF inspects only the parts of the JSON that result from the matches that you indicate.

Example JSON: "JsonBody": { "MatchPattern": { "All": {} }, "MatchScope": "ALL" }

See: newJsonBody smart constructor.

Constructors

JsonBody' 

Fields

  • invalidFallbackBehavior :: Maybe BodyParsingFallbackBehavior

    What WAF should do if it fails to completely parse the JSON body. The options are the following:

    • EVALUATE_AS_STRING - Inspect the body as plain text. WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string.
    • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
    • NO_MATCH - Treat the web request as not matching the rule statement.

    If you don't provide this setting, WAF parses and evaluates the content only up to the first parsing failure that it encounters.

    WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array.

    WAF parses the JSON in the following examples as two valid key, value pairs:

    • Missing comma: {"key1":"value1""key2":"value2"}
    • Missing colon: {"key1":"value1","key2""value2"}
    • Extra colons: {"key1"::"value1","key2""value2"}
  • oversizeHandling :: Maybe OversizeHandling

    What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.

    The options for oversize handling are the following:

    • CONTINUE - Inspect the body normally, according to the rule inspection criteria.
    • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
    • NO_MATCH - Treat the web request as not matching the rule statement.

    You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over 8 KB.

    Default: CONTINUE

  • matchPattern :: JsonMatchPattern

    The patterns to look for in the JSON body. WAF inspects the results of these pattern matches against the rule inspection criteria.

  • matchScope :: JsonMatchScope

    The parts of the JSON to match against using the MatchPattern. If you specify All, WAF matches against keys and values.

Instances

Instances details
FromJSON JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

ToJSON JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

Generic JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

Associated Types

type Rep JsonBody :: Type -> Type #

Methods

from :: JsonBody -> Rep JsonBody x #

to :: Rep JsonBody x -> JsonBody #

Read JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

Show JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

NFData JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

Methods

rnf :: JsonBody -> () #

Eq JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

Hashable JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

Methods

hashWithSalt :: Int -> JsonBody -> Int #

hash :: JsonBody -> Int #

type Rep JsonBody Source # 
Instance details

Defined in Amazonka.WAFV2.Types.JsonBody

type Rep JsonBody = D1 ('MetaData "JsonBody" "Amazonka.WAFV2.Types.JsonBody" "amazonka-wafv2-2.0-3v3WgpYn7RT5hSd6MsT5dN" 'False) (C1 ('MetaCons "JsonBody'" 'PrefixI 'True) ((S1 ('MetaSel ('Just "invalidFallbackBehavior") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe BodyParsingFallbackBehavior)) :*: S1 ('MetaSel ('Just "oversizeHandling") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 (Maybe OversizeHandling))) :*: (S1 ('MetaSel ('Just "matchPattern") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 JsonMatchPattern) :*: S1 ('MetaSel ('Just "matchScope") 'NoSourceUnpackedness 'NoSourceStrictness 'DecidedStrict) (Rec0 JsonMatchScope))))

newJsonBody Source #

Create a value of JsonBody with all optional fields omitted.

Use generic-lens or optics to modify other optional fields.

The following record fields are available, with the corresponding lenses provided for backwards compatibility:

$sel:invalidFallbackBehavior:JsonBody', jsonBody_invalidFallbackBehavior - What WAF should do if it fails to completely parse the JSON body. The options are the following:

  • EVALUATE_AS_STRING - Inspect the body as plain text. WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string.
  • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
  • NO_MATCH - Treat the web request as not matching the rule statement.

If you don't provide this setting, WAF parses and evaluates the content only up to the first parsing failure that it encounters.

WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array.

WAF parses the JSON in the following examples as two valid key, value pairs:

  • Missing comma: {"key1":"value1""key2":"value2"}
  • Missing colon: {"key1":"value1","key2""value2"}
  • Extra colons: {"key1"::"value1","key2""value2"}

$sel:oversizeHandling:JsonBody', jsonBody_oversizeHandling - What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.

The options for oversize handling are the following:

  • CONTINUE - Inspect the body normally, according to the rule inspection criteria.
  • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
  • NO_MATCH - Treat the web request as not matching the rule statement.

You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over 8 KB.

Default: CONTINUE

$sel:matchPattern:JsonBody', jsonBody_matchPattern - The patterns to look for in the JSON body. WAF inspects the results of these pattern matches against the rule inspection criteria.

$sel:matchScope:JsonBody', jsonBody_matchScope - The parts of the JSON to match against using the MatchPattern. If you specify All, WAF matches against keys and values.

jsonBody_invalidFallbackBehavior :: Lens' JsonBody (Maybe BodyParsingFallbackBehavior) Source #

What WAF should do if it fails to completely parse the JSON body. The options are the following:

  • EVALUATE_AS_STRING - Inspect the body as plain text. WAF applies the text transformations and inspection criteria that you defined for the JSON inspection to the body text string.
  • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
  • NO_MATCH - Treat the web request as not matching the rule statement.

If you don't provide this setting, WAF parses and evaluates the content only up to the first parsing failure that it encounters.

WAF does its best to parse the entire JSON body, but might be forced to stop for reasons such as invalid characters, duplicate keys, truncation, and any content whose root node isn't an object or an array.

WAF parses the JSON in the following examples as two valid key, value pairs:

  • Missing comma: {"key1":"value1""key2":"value2"}
  • Missing colon: {"key1":"value1","key2""value2"}
  • Extra colons: {"key1"::"value1","key2""value2"}

jsonBody_oversizeHandling :: Lens' JsonBody (Maybe OversizeHandling) Source #

What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the body of a web request when the body exceeds 8 KB (8192 bytes). Only the first 8 KB of the request body are forwarded to WAF by the underlying host service.

The options for oversize handling are the following:

  • CONTINUE - Inspect the body normally, according to the rule inspection criteria.
  • MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request.
  • NO_MATCH - Treat the web request as not matching the rule statement.

You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over 8 KB.

Default: CONTINUE

jsonBody_matchPattern :: Lens' JsonBody JsonMatchPattern Source #

The patterns to look for in the JSON body. WAF inspects the results of these pattern matches against the rule inspection criteria.

jsonBody_matchScope :: Lens' JsonBody JsonMatchScope Source #

The parts of the JSON to match against using the MatchPattern. If you specify All, WAF matches against keys and values.