/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include A rule statement that inspects for cross-site scripting (XSS) attacks. In XSS
* attacks, the attacker uses vulnerabilities in a benign website as a vehicle to
* inject malicious client-site scripts into other legitimate web browsers.
* See Also:
AWS
* API Reference
The part of the web request that you want WAF to inspect.
*/ inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; } /** *The part of the web request that you want WAF to inspect.
*/ inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; } /** *The part of the web request that you want WAF to inspect.
*/ inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; } /** *The part of the web request that you want WAF to inspect.
*/ inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); } /** *The part of the web request that you want WAF to inspect.
*/ inline XssMatchStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;} /** *The part of the web request that you want WAF to inspect.
*/ inline XssMatchStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;} /** *Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. Text transformations are
* used in rule match statements, to transform the FieldToMatch
* request component before inspecting it, and they're used in rate-based rule
* statements, to transform request components before using them as custom
* aggregation keys. If you specify one or more transformations to apply, WAF
* performs all transformations on the specified content, starting from the lowest
* priority setting, and then uses the component contents.