/* * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * * Licensed under the Apache License, Version 2.0 (the "License"). * You may not use this file except in compliance with the License. * A copy of the License is located at * * http://aws.amazon.com/apache2.0 * * or in the "license" file accompanying this file. This file is distributed * on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either * express or implied. See the License for the specific language governing * permissions and limitations under the License. */ /* * Do not modify this file. This file is generated from the wafv2-2019-07-29.normal.json service model. */ using System; using System.Collections.Generic; using System.Xml.Serialization; using System.Text; using System.IO; using System.Net; using Amazon.Runtime; using Amazon.Runtime.Internal; namespace Amazon.WAFV2.Model { /// /// A rule statement that inspects for malicious SQL code. Attackers insert malicious /// SQL code into web requests to do things like modify your database or extract data /// from it. /// public partial class SqliMatchStatement { private FieldToMatch _fieldToMatch; private SensitivityLevel _sensitivityLevel; private List _textTransformations = new List(); /// /// Gets and sets the property FieldToMatch. /// /// The part of the web request that you want WAF to inspect. /// /// [AWSProperty(Required=true)] public FieldToMatch FieldToMatch { get { return this._fieldToMatch; } set { this._fieldToMatch = value; } } // Check to see if FieldToMatch property is set internal bool IsSetFieldToMatch() { return this._fieldToMatch != null; } /// /// Gets and sets the property SensitivityLevel. /// /// The sensitivity that you want WAF to use to inspect for SQL injection attacks. /// /// /// /// HIGH detects more attacks, but might generate more false positives, /// especially if your web requests frequently contain unusual strings. For information /// about identifying and mitigating false positives, see Testing /// and tuning in the WAF Developer Guide. /// /// /// /// LOW is generally a better choice for resources that already have other /// protections against SQL injection attacks or that have a low tolerance for false positives. /// /// /// /// /// Default: LOW /// /// public SensitivityLevel SensitivityLevel { get { return this._sensitivityLevel; } set { this._sensitivityLevel = value; } } // Check to see if SensitivityLevel property is set internal bool IsSetSensitivityLevel() { return this._sensitivityLevel != null; } /// /// Gets and sets the property TextTransformations. /// /// Text transformations eliminate some of the unusual formatting that attackers use in /// web requests in an effort to bypass detection. Text transformations are used in rule /// match statements, to transform the FieldToMatch request component before /// inspecting it, and they're used in rate-based rule statements, to transform request /// components before using them as custom aggregation keys. If you specify one or more /// transformations to apply, WAF performs all transformations on the specified content, /// starting from the lowest priority setting, and then uses the component contents. /// /// [AWSProperty(Required=true, Min=1)] public List TextTransformations { get { return this._textTransformations; } set { this._textTransformations = value; } } // Check to see if TextTransformations property is set internal bool IsSetTextTransformations() { return this._textTransformations != null && this._textTransformations.Count > 0; } } }