@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class Predicate extends Object implements Serializable, Cloneable, StructuredPojo
Specifies the ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet, and
SizeConstraintSet objects that you want to add to a Rule
and, for each object, indicates whether
you want to negate the settings, for example, requests that do NOT originate from the IP address 192.0.2.44.
Constructor and Description |
---|
Predicate() |
Modifier and Type | Method and Description |
---|---|
Predicate |
clone() |
boolean |
equals(Object obj) |
String |
getDataId()
A unique identifier for a predicate in a
Rule , such as ByteMatchSetId or
IPSetId . |
Boolean |
getNegated()
Set
Negated to False if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. |
String |
getType()
The type of predicate in a
Rule , such as ByteMatchSet or IPSet . |
int |
hashCode() |
Boolean |
isNegated()
Set
Negated to False if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setDataId(String dataId)
A unique identifier for a predicate in a
Rule , such as ByteMatchSetId or
IPSetId . |
void |
setNegated(Boolean negated)
Set
Negated to False if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. |
void |
setType(PredicateType type)
The type of predicate in a
Rule , such as ByteMatchSet or IPSet . |
void |
setType(String type)
The type of predicate in a
Rule , such as ByteMatchSet or IPSet . |
String |
toString()
Returns a string representation of this object; useful for testing and debugging.
|
Predicate |
withDataId(String dataId)
A unique identifier for a predicate in a
Rule , such as ByteMatchSetId or
IPSetId . |
Predicate |
withNegated(Boolean negated)
Set
Negated to False if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. |
Predicate |
withType(PredicateType type)
The type of predicate in a
Rule , such as ByteMatchSet or IPSet . |
Predicate |
withType(String type)
The type of predicate in a
Rule , such as ByteMatchSet or IPSet . |
public void setNegated(Boolean negated)
Set Negated
to False
if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on the
negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses except
192.0.2.44
.
negated
- Set Negated
to False
if you want AWS WAF to allow, block, or count requests
based on the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on the
negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses
except 192.0.2.44
.
public Boolean getNegated()
Set Negated
to False
if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on the
negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses except
192.0.2.44
.
Negated
to False
if you want AWS WAF to allow, block, or count requests
based on the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on
the negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses
except 192.0.2.44
.
public Predicate withNegated(Boolean negated)
Set Negated
to False
if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on the
negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses except
192.0.2.44
.
negated
- Set Negated
to False
if you want AWS WAF to allow, block, or count requests
based on the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on the
negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses
except 192.0.2.44
.
public Boolean isNegated()
Set Negated
to False
if you want AWS WAF to allow, block, or count requests based on
the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet, XssMatchSet,
or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on the
negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP address
192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses except
192.0.2.44
.
Negated
to False
if you want AWS WAF to allow, block, or count requests
based on the settings in the specified ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow or block requests based on that IP address.
Set Negated
to True
if you want AWS WAF to allow or block a request based on
the negation of the settings in the ByteMatchSet, IPSet, SqlInjectionMatchSet,
XssMatchSet, or SizeConstraintSet. For example, if an IPSet
includes the IP
address 192.0.2.44
, AWS WAF will allow, block, or count requests based on all IP addresses
except 192.0.2.44
.
public void setType(String type)
The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.
type
- The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.PredicateType
public String getType()
The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.
Rule
, such as ByteMatchSet
or IPSet
.PredicateType
public Predicate withType(String type)
The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.
type
- The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.PredicateType
public void setType(PredicateType type)
The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.
type
- The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.PredicateType
public Predicate withType(PredicateType type)
The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.
type
- The type of predicate in a Rule
, such as ByteMatchSet
or IPSet
.PredicateType
public void setDataId(String dataId)
A unique identifier for a predicate in a Rule
, such as ByteMatchSetId
or
IPSetId
. The ID is returned by the corresponding Create
or List
command.
dataId
- A unique identifier for a predicate in a Rule
, such as ByteMatchSetId
or
IPSetId
. The ID is returned by the corresponding Create
or List
command.public String getDataId()
A unique identifier for a predicate in a Rule
, such as ByteMatchSetId
or
IPSetId
. The ID is returned by the corresponding Create
or List
command.
Rule
, such as ByteMatchSetId
or
IPSetId
. The ID is returned by the corresponding Create
or List
command.public Predicate withDataId(String dataId)
A unique identifier for a predicate in a Rule
, such as ByteMatchSetId
or
IPSetId
. The ID is returned by the corresponding Create
or List
command.
dataId
- A unique identifier for a predicate in a Rule
, such as ByteMatchSetId
or
IPSetId
. The ID is returned by the corresponding Create
or List
command.public String toString()
toString
in class Object
Object.toString()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.Copyright © 2013 Amazon Web Services, Inc. All Rights Reserved.