/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include #include namespace Aws { namespace Utils { namespace Json { class JsonValue; class JsonView; } // namespace Json } // namespace Utils namespace WAFV2 { namespace Model { /** *

A rule statement that inspects for malicious SQL code. Attackers insert * malicious SQL code into web requests to do things like modify your database or * extract data from it.

See Also:

AWS * API Reference

*/ class SqliMatchStatement { public: AWS_WAFV2_API SqliMatchStatement(); AWS_WAFV2_API SqliMatchStatement(Aws::Utils::Json::JsonView jsonValue); AWS_WAFV2_API SqliMatchStatement& operator=(Aws::Utils::Json::JsonView jsonValue); AWS_WAFV2_API Aws::Utils::Json::JsonValue Jsonize() const; /** *

The part of the web request that you want WAF to inspect.

*/ inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; } /** *

The part of the web request that you want WAF to inspect.

*/ inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; } /** *

The part of the web request that you want WAF to inspect.

*/ inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; } /** *

The part of the web request that you want WAF to inspect.

*/ inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); } /** *

The part of the web request that you want WAF to inspect.

*/ inline SqliMatchStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;} /** *

The part of the web request that you want WAF to inspect.

*/ inline SqliMatchStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;} /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline const Aws::Vector& GetTextTransformations() const{ return m_textTransformations; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline bool TextTransformationsHasBeenSet() const { return m_textTransformationsHasBeenSet; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline void SetTextTransformations(const Aws::Vector& value) { m_textTransformationsHasBeenSet = true; m_textTransformations = value; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline void SetTextTransformations(Aws::Vector&& value) { m_textTransformationsHasBeenSet = true; m_textTransformations = std::move(value); } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline SqliMatchStatement& WithTextTransformations(const Aws::Vector& value) { SetTextTransformations(value); return *this;} /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline SqliMatchStatement& WithTextTransformations(Aws::Vector&& value) { SetTextTransformations(std::move(value)); return *this;} /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline SqliMatchStatement& AddTextTransformations(const TextTransformation& value) { m_textTransformationsHasBeenSet = true; m_textTransformations.push_back(value); return *this; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. Text transformations are * used in rule match statements, to transform the FieldToMatch * request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom * aggregation keys. If you specify one or more transformations to apply, WAF * performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the component contents.

*/ inline SqliMatchStatement& AddTextTransformations(TextTransformation&& value) { m_textTransformationsHasBeenSet = true; m_textTransformations.push_back(std::move(value)); return *this; } /** *

The sensitivity that you want WAF to use to inspect for SQL injection * attacks.

HIGH detects more attacks, but might generate * more false positives, especially if your web requests frequently contain unusual * strings. For information about identifying and mitigating false positives, see * Testing * and tuning in the WAF Developer Guide.

LOW is * generally a better choice for resources that already have other protections * against SQL injection attacks or that have a low tolerance for false positives. *

Default: LOW

*/ inline const SensitivityLevel& GetSensitivityLevel() const{ return m_sensitivityLevel; } /** *

The sensitivity that you want WAF to use to inspect for SQL injection * attacks.

HIGH detects more attacks, but might generate * more false positives, especially if your web requests frequently contain unusual * strings. For information about identifying and mitigating false positives, see * Testing * and tuning in the WAF Developer Guide.

LOW is * generally a better choice for resources that already have other protections * against SQL injection attacks or that have a low tolerance for false positives. *

Default: LOW

*/ inline bool SensitivityLevelHasBeenSet() const { return m_sensitivityLevelHasBeenSet; } /** *

The sensitivity that you want WAF to use to inspect for SQL injection * attacks.

HIGH detects more attacks, but might generate * more false positives, especially if your web requests frequently contain unusual * strings. For information about identifying and mitigating false positives, see * Testing * and tuning in the WAF Developer Guide.

LOW is * generally a better choice for resources that already have other protections * against SQL injection attacks or that have a low tolerance for false positives. *

Default: LOW

*/ inline void SetSensitivityLevel(const SensitivityLevel& value) { m_sensitivityLevelHasBeenSet = true; m_sensitivityLevel = value; } /** *

The sensitivity that you want WAF to use to inspect for SQL injection * attacks.

HIGH detects more attacks, but might generate * more false positives, especially if your web requests frequently contain unusual * strings. For information about identifying and mitigating false positives, see * Testing * and tuning in the WAF Developer Guide.

LOW is * generally a better choice for resources that already have other protections * against SQL injection attacks or that have a low tolerance for false positives. *

Default: LOW

*/ inline void SetSensitivityLevel(SensitivityLevel&& value) { m_sensitivityLevelHasBeenSet = true; m_sensitivityLevel = std::move(value); } /** *

The sensitivity that you want WAF to use to inspect for SQL injection * attacks.

HIGH detects more attacks, but might generate * more false positives, especially if your web requests frequently contain unusual * strings. For information about identifying and mitigating false positives, see * Testing * and tuning in the WAF Developer Guide.

LOW is * generally a better choice for resources that already have other protections * against SQL injection attacks or that have a low tolerance for false positives. *

Default: LOW

*/ inline SqliMatchStatement& WithSensitivityLevel(const SensitivityLevel& value) { SetSensitivityLevel(value); return *this;} /** *

The sensitivity that you want WAF to use to inspect for SQL injection * attacks.

HIGH detects more attacks, but might generate * more false positives, especially if your web requests frequently contain unusual * strings. For information about identifying and mitigating false positives, see * Testing * and tuning in the WAF Developer Guide.

LOW is * generally a better choice for resources that already have other protections * against SQL injection attacks or that have a low tolerance for false positives. *

Default: LOW

*/ inline SqliMatchStatement& WithSensitivityLevel(SensitivityLevel&& value) { SetSensitivityLevel(std::move(value)); return *this;} private: FieldToMatch m_fieldToMatch; bool m_fieldToMatchHasBeenSet = false; Aws::Vector m_textTransformations; bool m_textTransformationsHasBeenSet = false; SensitivityLevel m_sensitivityLevel; bool m_sensitivityLevelHasBeenSet = false; }; } // namespace Model } // namespace WAFV2 } // namespace Aws