Interface FilePaths.Builder
- All Superinterfaces:
Buildable
,CopyableBuilder<FilePaths.Builder,
,FilePaths> SdkBuilder<FilePaths.Builder,
,FilePaths> SdkPojo
- Enclosing class:
FilePaths
-
Method Summary
Modifier and TypeMethodDescriptionThe name of the infected or suspicious file corresponding to the hash.Path to the infected or suspicious file on the resource it was detected on.The hash value for the infected or suspicious file.resourceId
(String resourceId) The Amazon Resource Name (ARN) of the resource on which the threat was detected.Methods inherited from interface software.amazon.awssdk.utils.builder.CopyableBuilder
copy
Methods inherited from interface software.amazon.awssdk.utils.builder.SdkBuilder
applyMutation, build
Methods inherited from interface software.amazon.awssdk.core.SdkPojo
equalsBySdkFields, sdkFields
-
Method Details
-
filePath
Path to the infected or suspicious file on the resource it was detected on.
Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Parameters:
filePath
- Path to the infected or suspicious file on the resource it was detected on.Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
fileName
The name of the infected or suspicious file corresponding to the hash.
Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Parameters:
fileName
- The name of the infected or suspicious file corresponding to the hash.Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
resourceId
The Amazon Resource Name (ARN) of the resource on which the threat was detected.
Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Parameters:
resourceId
- The Amazon Resource Name (ARN) of the resource on which the threat was detected.Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-
hash
The hash value for the infected or suspicious file.
Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Parameters:
hash
- The hash value for the infected or suspicious file.Length Constraints: Minimum of 1 length. Maximum of 128 length.
- Returns:
- Returns a reference to this object so that method calls can be chained together.
-