/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ /* * Do not modify this file. This file is generated from the waf-2015-08-24.normal.json service model. */ using System; using System.Collections.Generic; using System.Xml.Serialization; using System.Text; using System.IO; using System.Net; using Amazon.Runtime; using Amazon.Runtime.Internal; namespace Amazon.WAF.Model { /// /// /// /// This is AWS WAF Classic documentation. For more information, see AWS /// WAF Classic in the developer guide. /// /// /// /// For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS /// WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints /// for regional and global use. /// /// /// /// Specifies the part of a web request that you want AWS WAF to inspect for snippets /// of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the /// header. /// /// public partial class SqlInjectionMatchTuple { private FieldToMatch _fieldToMatch; private TextTransformation _textTransformation; /// /// Gets and sets the property FieldToMatch. /// /// Specifies where in a web request to look for snippets of malicious SQL code. /// /// [AWSProperty(Required=true)] public FieldToMatch FieldToMatch { get { return this._fieldToMatch; } set { this._fieldToMatch = value; } } // Check to see if FieldToMatch property is set internal bool IsSetFieldToMatch() { return this._fieldToMatch != null; } /// /// Gets and sets the property TextTransformation. /// /// Text transformations eliminate some of the unusual formatting that attackers use in /// web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS /// WAF performs the transformation on FieldToMatch before inspecting it /// for a match. /// /// /// /// You can only specify a single type of TextTransformation. /// /// /// /// CMD_LINE /// /// /// /// When you're concerned that attackers are injecting an operating system command line /// command and using unusual formatting to disguise some or all of the command, use this /// option to perform the following transformations: /// /// /// /// COMPRESS_WHITE_SPACE /// /// /// /// Use this option to replace the following characters with a space character (decimal /// 32): /// /// /// /// COMPRESS_WHITE_SPACE also replaces multiple spaces with one space. /// /// /// /// HTML_ENTITY_DECODE /// /// /// /// Use this option to replace HTML-encoded characters with unencoded characters. HTML_ENTITY_DECODE /// performs the following operations: /// /// /// /// LOWERCASE /// /// /// /// Use this option to convert uppercase letters (A-Z) to lowercase (a-z). /// /// /// /// URL_DECODE /// /// /// /// Use this option to decode a URL-encoded value. /// /// /// /// NONE /// /// /// /// Specify NONE if you don't want to perform any text transformations. /// /// [AWSProperty(Required=true)] public TextTransformation TextTransformation { get { return this._textTransformation; } set { this._textTransformation = value; } } // Check to see if TextTransformation property is set internal bool IsSetTextTransformation() { return this._textTransformation != null; } } }