/** * <p> * Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. * </p> * * @param sqlInjectionMatchTuples * Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. * @return Returns a reference to this object so that method calls can be chained together. */ public SqlInjectionMatchSet withSqlInjectionMatchTuples(java.util.Collection<SqlInjectionMatchTuple> sqlInjectionMatchTuples) { setSqlInjectionMatchTuples(sqlInjectionMatchTuples); return this; }
/** * <p> * Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. * </p> * <p> * <b>NOTE:</b> This method appends the values to the existing list (if any). Use * {@link #setSqlInjectionMatchTuples(java.util.Collection)} or * {@link #withSqlInjectionMatchTuples(java.util.Collection)} if you want to override the existing values. * </p> * * @param sqlInjectionMatchTuples * Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code. * @return Returns a reference to this object so that method calls can be chained together. */ public SqlInjectionMatchSet withSqlInjectionMatchTuples(SqlInjectionMatchTuple... sqlInjectionMatchTuples) { if (this.sqlInjectionMatchTuples == null) { setSqlInjectionMatchTuples(new java.util.ArrayList<SqlInjectionMatchTuple>(sqlInjectionMatchTuples.length)); } for (SqlInjectionMatchTuple ele : sqlInjectionMatchTuples) { this.sqlInjectionMatchTuples.add(ele); } return this; }
sqlInjectionMatchSet.setSqlInjectionMatchTuples(new ListUnmarshaller<SqlInjectionMatchTuple>(SqlInjectionMatchTupleJsonUnmarshaller .getInstance()).unmarshall(context));
sqlInjectionMatchSet.setSqlInjectionMatchTuples(new ListUnmarshaller<SqlInjectionMatchTuple>(SqlInjectionMatchTupleJsonUnmarshaller .getInstance()).unmarshall(context));