aws_sdk_wafv2/operation/create_web_acl/
builders.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2pub use crate::operation::create_web_acl::_create_web_acl_output::CreateWebAclOutputBuilder;
3
4pub use crate::operation::create_web_acl::_create_web_acl_input::CreateWebAclInputBuilder;
5
6impl crate::operation::create_web_acl::builders::CreateWebAclInputBuilder {
7    /// Sends a request with this input using the given client.
8    pub async fn send_with(
9        self,
10        client: &crate::Client,
11    ) -> ::std::result::Result<
12        crate::operation::create_web_acl::CreateWebAclOutput,
13        ::aws_smithy_runtime_api::client::result::SdkError<
14            crate::operation::create_web_acl::CreateWebACLError,
15            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
16        >,
17    > {
18        let mut fluent_builder = client.create_web_acl();
19        fluent_builder.inner = self;
20        fluent_builder.send().await
21    }
22}
23/// Fluent builder constructing a request to `CreateWebACL`.
24///
25/// <p>Creates a <code>WebACL</code> per the specifications provided.</p>
26/// <p>A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has a statement that defines what to look for in web requests and an action that WAF applies to requests that match the statement. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <code>Rule</code>, <code>RuleGroup</code>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resource types include Amazon CloudFront distribution, Amazon API Gateway REST API, Application Load Balancer, AppSync GraphQL API, Amazon Cognito user pool, App Runner service, Amplify application, and Amazon Web Services Verified Access instance.</p>
27#[derive(::std::clone::Clone, ::std::fmt::Debug)]
28pub struct CreateWebACLFluentBuilder {
29    handle: ::std::sync::Arc<crate::client::Handle>,
30    inner: crate::operation::create_web_acl::builders::CreateWebAclInputBuilder,
31    config_override: ::std::option::Option<crate::config::Builder>,
32}
33impl
34    crate::client::customize::internal::CustomizableSend<
35        crate::operation::create_web_acl::CreateWebAclOutput,
36        crate::operation::create_web_acl::CreateWebACLError,
37    > for CreateWebACLFluentBuilder
38{
39    fn send(
40        self,
41        config_override: crate::config::Builder,
42    ) -> crate::client::customize::internal::BoxFuture<
43        crate::client::customize::internal::SendResult<
44            crate::operation::create_web_acl::CreateWebAclOutput,
45            crate::operation::create_web_acl::CreateWebACLError,
46        >,
47    > {
48        ::std::boxed::Box::pin(async move { self.config_override(config_override).send().await })
49    }
50}
51impl CreateWebACLFluentBuilder {
52    /// Creates a new `CreateWebACLFluentBuilder`.
53    pub(crate) fn new(handle: ::std::sync::Arc<crate::client::Handle>) -> Self {
54        Self {
55            handle,
56            inner: ::std::default::Default::default(),
57            config_override: ::std::option::Option::None,
58        }
59    }
60    /// Access the CreateWebACL as a reference.
61    pub fn as_input(&self) -> &crate::operation::create_web_acl::builders::CreateWebAclInputBuilder {
62        &self.inner
63    }
64    /// Sends the request and returns the response.
65    ///
66    /// If an error occurs, an `SdkError` will be returned with additional details that
67    /// can be matched against.
68    ///
69    /// By default, any retryable failures will be retried twice. Retry behavior
70    /// is configurable with the [RetryConfig](aws_smithy_types::retry::RetryConfig), which can be
71    /// set when configuring the client.
72    pub async fn send(
73        self,
74    ) -> ::std::result::Result<
75        crate::operation::create_web_acl::CreateWebAclOutput,
76        ::aws_smithy_runtime_api::client::result::SdkError<
77            crate::operation::create_web_acl::CreateWebACLError,
78            ::aws_smithy_runtime_api::client::orchestrator::HttpResponse,
79        >,
80    > {
81        let input = self
82            .inner
83            .build()
84            .map_err(::aws_smithy_runtime_api::client::result::SdkError::construction_failure)?;
85        let runtime_plugins = crate::operation::create_web_acl::CreateWebACL::operation_runtime_plugins(
86            self.handle.runtime_plugins.clone(),
87            &self.handle.conf,
88            self.config_override,
89        );
90        crate::operation::create_web_acl::CreateWebACL::orchestrate(&runtime_plugins, input).await
91    }
92
93    /// Consumes this builder, creating a customizable operation that can be modified before being sent.
94    pub fn customize(
95        self,
96    ) -> crate::client::customize::CustomizableOperation<
97        crate::operation::create_web_acl::CreateWebAclOutput,
98        crate::operation::create_web_acl::CreateWebACLError,
99        Self,
100    > {
101        crate::client::customize::CustomizableOperation::new(self)
102    }
103    pub(crate) fn config_override(mut self, config_override: impl ::std::convert::Into<crate::config::Builder>) -> Self {
104        self.set_config_override(::std::option::Option::Some(config_override.into()));
105        self
106    }
107
108    pub(crate) fn set_config_override(&mut self, config_override: ::std::option::Option<crate::config::Builder>) -> &mut Self {
109        self.config_override = config_override;
110        self
111    }
112    /// <p>The name of the web ACL. You cannot change the name of a web ACL after you create it.</p>
113    pub fn name(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
114        self.inner = self.inner.name(input.into());
115        self
116    }
117    /// <p>The name of the web ACL. You cannot change the name of a web ACL after you create it.</p>
118    pub fn set_name(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
119        self.inner = self.inner.set_name(input);
120        self
121    }
122    /// <p>The name of the web ACL. You cannot change the name of a web ACL after you create it.</p>
123    pub fn get_name(&self) -> &::std::option::Option<::std::string::String> {
124        self.inner.get_name()
125    }
126    /// <p>Specifies whether this is for a global resource type, such as a Amazon CloudFront distribution. For an Amplify application, use <code>CLOUDFRONT</code>.</p>
127    /// <p>To work with CloudFront, you must also specify the Region US East (N. Virginia) as follows:</p>
128    /// <ul>
129    /// <li>
130    /// <p>CLI - Specify the Region when you use the CloudFront scope: <code>--scope=CLOUDFRONT --region=us-east-1</code>.</p></li>
131    /// <li>
132    /// <p>API and SDKs - For all calls, use the Region endpoint us-east-1.</p></li>
133    /// </ul>
134    pub fn scope(mut self, input: crate::types::Scope) -> Self {
135        self.inner = self.inner.scope(input);
136        self
137    }
138    /// <p>Specifies whether this is for a global resource type, such as a Amazon CloudFront distribution. For an Amplify application, use <code>CLOUDFRONT</code>.</p>
139    /// <p>To work with CloudFront, you must also specify the Region US East (N. Virginia) as follows:</p>
140    /// <ul>
141    /// <li>
142    /// <p>CLI - Specify the Region when you use the CloudFront scope: <code>--scope=CLOUDFRONT --region=us-east-1</code>.</p></li>
143    /// <li>
144    /// <p>API and SDKs - For all calls, use the Region endpoint us-east-1.</p></li>
145    /// </ul>
146    pub fn set_scope(mut self, input: ::std::option::Option<crate::types::Scope>) -> Self {
147        self.inner = self.inner.set_scope(input);
148        self
149    }
150    /// <p>Specifies whether this is for a global resource type, such as a Amazon CloudFront distribution. For an Amplify application, use <code>CLOUDFRONT</code>.</p>
151    /// <p>To work with CloudFront, you must also specify the Region US East (N. Virginia) as follows:</p>
152    /// <ul>
153    /// <li>
154    /// <p>CLI - Specify the Region when you use the CloudFront scope: <code>--scope=CLOUDFRONT --region=us-east-1</code>.</p></li>
155    /// <li>
156    /// <p>API and SDKs - For all calls, use the Region endpoint us-east-1.</p></li>
157    /// </ul>
158    pub fn get_scope(&self) -> &::std::option::Option<crate::types::Scope> {
159        self.inner.get_scope()
160    }
161    /// <p>The action to perform if none of the <code>Rules</code> contained in the <code>WebACL</code> match.</p>
162    pub fn default_action(mut self, input: crate::types::DefaultAction) -> Self {
163        self.inner = self.inner.default_action(input);
164        self
165    }
166    /// <p>The action to perform if none of the <code>Rules</code> contained in the <code>WebACL</code> match.</p>
167    pub fn set_default_action(mut self, input: ::std::option::Option<crate::types::DefaultAction>) -> Self {
168        self.inner = self.inner.set_default_action(input);
169        self
170    }
171    /// <p>The action to perform if none of the <code>Rules</code> contained in the <code>WebACL</code> match.</p>
172    pub fn get_default_action(&self) -> &::std::option::Option<crate::types::DefaultAction> {
173        self.inner.get_default_action()
174    }
175    /// <p>A description of the web ACL that helps with identification.</p>
176    pub fn description(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
177        self.inner = self.inner.description(input.into());
178        self
179    }
180    /// <p>A description of the web ACL that helps with identification.</p>
181    pub fn set_description(mut self, input: ::std::option::Option<::std::string::String>) -> Self {
182        self.inner = self.inner.set_description(input);
183        self
184    }
185    /// <p>A description of the web ACL that helps with identification.</p>
186    pub fn get_description(&self) -> &::std::option::Option<::std::string::String> {
187        self.inner.get_description()
188    }
189    ///
190    /// Appends an item to `Rules`.
191    ///
192    /// To override the contents of this collection use [`set_rules`](Self::set_rules).
193    ///
194    /// <p>The <code>Rule</code> statements used to identify the web requests that you want to manage. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.</p>
195    pub fn rules(mut self, input: crate::types::Rule) -> Self {
196        self.inner = self.inner.rules(input);
197        self
198    }
199    /// <p>The <code>Rule</code> statements used to identify the web requests that you want to manage. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.</p>
200    pub fn set_rules(mut self, input: ::std::option::Option<::std::vec::Vec<crate::types::Rule>>) -> Self {
201        self.inner = self.inner.set_rules(input);
202        self
203    }
204    /// <p>The <code>Rule</code> statements used to identify the web requests that you want to manage. Each rule includes one top-level statement that WAF uses to identify matching web requests, and parameters that govern how WAF handles them.</p>
205    pub fn get_rules(&self) -> &::std::option::Option<::std::vec::Vec<crate::types::Rule>> {
206        self.inner.get_rules()
207    }
208    /// <p>Defines and enables Amazon CloudWatch metrics and web request sample collection.</p>
209    pub fn visibility_config(mut self, input: crate::types::VisibilityConfig) -> Self {
210        self.inner = self.inner.visibility_config(input);
211        self
212    }
213    /// <p>Defines and enables Amazon CloudWatch metrics and web request sample collection.</p>
214    pub fn set_visibility_config(mut self, input: ::std::option::Option<crate::types::VisibilityConfig>) -> Self {
215        self.inner = self.inner.set_visibility_config(input);
216        self
217    }
218    /// <p>Defines and enables Amazon CloudWatch metrics and web request sample collection.</p>
219    pub fn get_visibility_config(&self) -> &::std::option::Option<crate::types::VisibilityConfig> {
220        self.inner.get_visibility_config()
221    }
222    /// <p>Specifies data protection to apply to the web request data for the web ACL. This is a web ACL level data protection option.</p>
223    /// <p>The data protection that you configure for the web ACL alters the data that's available for any other data collection activity, including your WAF logging destinations, web ACL request sampling, and Amazon Security Lake data collection and management. Your other option for data protection is in the logging configuration, which only affects logging.</p>
224    pub fn data_protection_config(mut self, input: crate::types::DataProtectionConfig) -> Self {
225        self.inner = self.inner.data_protection_config(input);
226        self
227    }
228    /// <p>Specifies data protection to apply to the web request data for the web ACL. This is a web ACL level data protection option.</p>
229    /// <p>The data protection that you configure for the web ACL alters the data that's available for any other data collection activity, including your WAF logging destinations, web ACL request sampling, and Amazon Security Lake data collection and management. Your other option for data protection is in the logging configuration, which only affects logging.</p>
230    pub fn set_data_protection_config(mut self, input: ::std::option::Option<crate::types::DataProtectionConfig>) -> Self {
231        self.inner = self.inner.set_data_protection_config(input);
232        self
233    }
234    /// <p>Specifies data protection to apply to the web request data for the web ACL. This is a web ACL level data protection option.</p>
235    /// <p>The data protection that you configure for the web ACL alters the data that's available for any other data collection activity, including your WAF logging destinations, web ACL request sampling, and Amazon Security Lake data collection and management. Your other option for data protection is in the logging configuration, which only affects logging.</p>
236    pub fn get_data_protection_config(&self) -> &::std::option::Option<crate::types::DataProtectionConfig> {
237        self.inner.get_data_protection_config()
238    }
239    ///
240    /// Appends an item to `Tags`.
241    ///
242    /// To override the contents of this collection use [`set_tags`](Self::set_tags).
243    ///
244    /// <p>An array of key:value pairs to associate with the resource.</p>
245    pub fn tags(mut self, input: crate::types::Tag) -> Self {
246        self.inner = self.inner.tags(input);
247        self
248    }
249    /// <p>An array of key:value pairs to associate with the resource.</p>
250    pub fn set_tags(mut self, input: ::std::option::Option<::std::vec::Vec<crate::types::Tag>>) -> Self {
251        self.inner = self.inner.set_tags(input);
252        self
253    }
254    /// <p>An array of key:value pairs to associate with the resource.</p>
255    pub fn get_tags(&self) -> &::std::option::Option<::std::vec::Vec<crate::types::Tag>> {
256        self.inner.get_tags()
257    }
258    ///
259    /// Adds a key-value pair to `CustomResponseBodies`.
260    ///
261    /// To override the contents of this collection use [`set_custom_response_bodies`](Self::set_custom_response_bodies).
262    ///
263    /// <p>A map of custom response keys and content bodies. When you create a rule with a block action, you can send a custom response to the web request. You define these for the web ACL, and then use them in the rules and default actions that you define in the web ACL.</p>
264    /// <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the <i>WAF Developer Guide</i>.</p>
265    /// <p>For information about the limits on count and size for custom request and response settings, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/limits.html">WAF quotas</a> in the <i>WAF Developer Guide</i>.</p>
266    pub fn custom_response_bodies(mut self, k: impl ::std::convert::Into<::std::string::String>, v: crate::types::CustomResponseBody) -> Self {
267        self.inner = self.inner.custom_response_bodies(k.into(), v);
268        self
269    }
270    /// <p>A map of custom response keys and content bodies. When you create a rule with a block action, you can send a custom response to the web request. You define these for the web ACL, and then use them in the rules and default actions that you define in the web ACL.</p>
271    /// <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the <i>WAF Developer Guide</i>.</p>
272    /// <p>For information about the limits on count and size for custom request and response settings, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/limits.html">WAF quotas</a> in the <i>WAF Developer Guide</i>.</p>
273    pub fn set_custom_response_bodies(
274        mut self,
275        input: ::std::option::Option<::std::collections::HashMap<::std::string::String, crate::types::CustomResponseBody>>,
276    ) -> Self {
277        self.inner = self.inner.set_custom_response_bodies(input);
278        self
279    }
280    /// <p>A map of custom response keys and content bodies. When you create a rule with a block action, you can send a custom response to the web request. You define these for the web ACL, and then use them in the rules and default actions that you define in the web ACL.</p>
281    /// <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the <i>WAF Developer Guide</i>.</p>
282    /// <p>For information about the limits on count and size for custom request and response settings, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/limits.html">WAF quotas</a> in the <i>WAF Developer Guide</i>.</p>
283    pub fn get_custom_response_bodies(
284        &self,
285    ) -> &::std::option::Option<::std::collections::HashMap<::std::string::String, crate::types::CustomResponseBody>> {
286        self.inner.get_custom_response_bodies()
287    }
288    /// <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations for rules that don't have their own <code>CaptchaConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>CaptchaConfig</code>.</p>
289    pub fn captcha_config(mut self, input: crate::types::CaptchaConfig) -> Self {
290        self.inner = self.inner.captcha_config(input);
291        self
292    }
293    /// <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations for rules that don't have their own <code>CaptchaConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>CaptchaConfig</code>.</p>
294    pub fn set_captcha_config(mut self, input: ::std::option::Option<crate::types::CaptchaConfig>) -> Self {
295        self.inner = self.inner.set_captcha_config(input);
296        self
297    }
298    /// <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations for rules that don't have their own <code>CaptchaConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>CaptchaConfig</code>.</p>
299    pub fn get_captcha_config(&self) -> &::std::option::Option<crate::types::CaptchaConfig> {
300        self.inner.get_captcha_config()
301    }
302    /// <p>Specifies how WAF should handle challenge evaluations for rules that don't have their own <code>ChallengeConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>ChallengeConfig</code>.</p>
303    pub fn challenge_config(mut self, input: crate::types::ChallengeConfig) -> Self {
304        self.inner = self.inner.challenge_config(input);
305        self
306    }
307    /// <p>Specifies how WAF should handle challenge evaluations for rules that don't have their own <code>ChallengeConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>ChallengeConfig</code>.</p>
308    pub fn set_challenge_config(mut self, input: ::std::option::Option<crate::types::ChallengeConfig>) -> Self {
309        self.inner = self.inner.set_challenge_config(input);
310        self
311    }
312    /// <p>Specifies how WAF should handle challenge evaluations for rules that don't have their own <code>ChallengeConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>ChallengeConfig</code>.</p>
313    pub fn get_challenge_config(&self) -> &::std::option::Option<crate::types::ChallengeConfig> {
314        self.inner.get_challenge_config()
315    }
316    ///
317    /// Appends an item to `TokenDomains`.
318    ///
319    /// To override the contents of this collection use [`set_token_domains`](Self::set_token_domains).
320    ///
321    /// <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
322    /// <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code></p>
323    /// <p>Public suffixes aren't allowed. For example, you can't use <code>gov.au</code> or <code>co.uk</code> as token domains.</p>
324    pub fn token_domains(mut self, input: impl ::std::convert::Into<::std::string::String>) -> Self {
325        self.inner = self.inner.token_domains(input.into());
326        self
327    }
328    /// <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
329    /// <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code></p>
330    /// <p>Public suffixes aren't allowed. For example, you can't use <code>gov.au</code> or <code>co.uk</code> as token domains.</p>
331    pub fn set_token_domains(mut self, input: ::std::option::Option<::std::vec::Vec<::std::string::String>>) -> Self {
332        self.inner = self.inner.set_token_domains(input);
333        self
334    }
335    /// <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
336    /// <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code></p>
337    /// <p>Public suffixes aren't allowed. For example, you can't use <code>gov.au</code> or <code>co.uk</code> as token domains.</p>
338    pub fn get_token_domains(&self) -> &::std::option::Option<::std::vec::Vec<::std::string::String>> {
339        self.inner.get_token_domains()
340    }
341    /// <p>Specifies custom configurations for the associations between the web ACL and protected resources.</p>
342    /// <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes).</p><note>
343    /// <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
344    /// </note>
345    /// <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
346    pub fn association_config(mut self, input: crate::types::AssociationConfig) -> Self {
347        self.inner = self.inner.association_config(input);
348        self
349    }
350    /// <p>Specifies custom configurations for the associations between the web ACL and protected resources.</p>
351    /// <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes).</p><note>
352    /// <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
353    /// </note>
354    /// <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
355    pub fn set_association_config(mut self, input: ::std::option::Option<crate::types::AssociationConfig>) -> Self {
356        self.inner = self.inner.set_association_config(input);
357        self
358    }
359    /// <p>Specifies custom configurations for the associations between the web ACL and protected resources.</p>
360    /// <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes).</p><note>
361    /// <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
362    /// </note>
363    /// <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
364    pub fn get_association_config(&self) -> &::std::option::Option<crate::types::AssociationConfig> {
365        self.inner.get_association_config()
366    }
367    /// <p>Specifies the type of DDoS protection to apply to web request data for a web ACL. For most scenarios, it is recommended to use the default protection level, <code>ACTIVE_UNDER_DDOS</code>. If a web ACL is associated with multiple Application Load Balancers, the changes you make to DDoS protection in that web ACL will apply to all associated Application Load Balancers.</p>
368    pub fn on_source_d_do_s_protection_config(mut self, input: crate::types::OnSourceDDoSProtectionConfig) -> Self {
369        self.inner = self.inner.on_source_d_do_s_protection_config(input);
370        self
371    }
372    /// <p>Specifies the type of DDoS protection to apply to web request data for a web ACL. For most scenarios, it is recommended to use the default protection level, <code>ACTIVE_UNDER_DDOS</code>. If a web ACL is associated with multiple Application Load Balancers, the changes you make to DDoS protection in that web ACL will apply to all associated Application Load Balancers.</p>
373    pub fn set_on_source_d_do_s_protection_config(mut self, input: ::std::option::Option<crate::types::OnSourceDDoSProtectionConfig>) -> Self {
374        self.inner = self.inner.set_on_source_d_do_s_protection_config(input);
375        self
376    }
377    /// <p>Specifies the type of DDoS protection to apply to web request data for a web ACL. For most scenarios, it is recommended to use the default protection level, <code>ACTIVE_UNDER_DDOS</code>. If a web ACL is associated with multiple Application Load Balancers, the changes you make to DDoS protection in that web ACL will apply to all associated Application Load Balancers.</p>
378    pub fn get_on_source_d_do_s_protection_config(&self) -> &::std::option::Option<crate::types::OnSourceDDoSProtectionConfig> {
379        self.inner.get_on_source_d_do_s_protection_config()
380    }
381    /// <p>Configures the ability for the WAF console to store and retrieve application attributes during the web ACL creation process. Application attributes help WAF give recommendations for protection packs.</p>
382    pub fn application_config(mut self, input: crate::types::ApplicationConfig) -> Self {
383        self.inner = self.inner.application_config(input);
384        self
385    }
386    /// <p>Configures the ability for the WAF console to store and retrieve application attributes during the web ACL creation process. Application attributes help WAF give recommendations for protection packs.</p>
387    pub fn set_application_config(mut self, input: ::std::option::Option<crate::types::ApplicationConfig>) -> Self {
388        self.inner = self.inner.set_application_config(input);
389        self
390    }
391    /// <p>Configures the ability for the WAF console to store and retrieve application attributes during the web ACL creation process. Application attributes help WAF give recommendations for protection packs.</p>
392    pub fn get_application_config(&self) -> &::std::option::Option<crate::types::ApplicationConfig> {
393        self.inner.get_application_config()
394    }
395}