@Generated(value="com.amazonaws:aws-java-sdk-code-generator") public class SqliMatchStatement extends Object implements Serializable, Cloneable, StructuredPojo
A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.
Constructor and Description |
---|
SqliMatchStatement() |
Modifier and Type | Method and Description |
---|---|
SqliMatchStatement |
clone() |
boolean |
equals(Object obj) |
FieldToMatch |
getFieldToMatch()
The part of the web request that you want WAF to inspect.
|
String |
getSensitivityLevel()
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
|
List<TextTransformation> |
getTextTransformations()
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection.
|
int |
hashCode() |
void |
marshall(ProtocolMarshaller protocolMarshaller)
Marshalls this structured data using the given
ProtocolMarshaller . |
void |
setFieldToMatch(FieldToMatch fieldToMatch)
The part of the web request that you want WAF to inspect.
|
void |
setSensitivityLevel(String sensitivityLevel)
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
|
void |
setTextTransformations(Collection<TextTransformation> textTransformations)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection.
|
String |
toString()
Returns a string representation of this object.
|
SqliMatchStatement |
withFieldToMatch(FieldToMatch fieldToMatch)
The part of the web request that you want WAF to inspect.
|
SqliMatchStatement |
withSensitivityLevel(SensitivityLevel sensitivityLevel)
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
|
SqliMatchStatement |
withSensitivityLevel(String sensitivityLevel)
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
|
SqliMatchStatement |
withTextTransformations(Collection<TextTransformation> textTransformations)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection.
|
SqliMatchStatement |
withTextTransformations(TextTransformation... textTransformations)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection.
|
public void setFieldToMatch(FieldToMatch fieldToMatch)
The part of the web request that you want WAF to inspect.
fieldToMatch
- The part of the web request that you want WAF to inspect.public FieldToMatch getFieldToMatch()
The part of the web request that you want WAF to inspect.
public SqliMatchStatement withFieldToMatch(FieldToMatch fieldToMatch)
The part of the web request that you want WAF to inspect.
fieldToMatch
- The part of the web request that you want WAF to inspect.public List<TextTransformation> getTextTransformations()
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection. If you specify one or more transformations in a rule statement, WAF performs all
transformations on the content of the request component identified by FieldToMatch
, starting from
the lowest priority setting, before inspecting the content for a match.
FieldToMatch
,
starting from the lowest priority setting, before inspecting the content for a match.public void setTextTransformations(Collection<TextTransformation> textTransformations)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection. If you specify one or more transformations in a rule statement, WAF performs all
transformations on the content of the request component identified by FieldToMatch
, starting from
the lowest priority setting, before inspecting the content for a match.
textTransformations
- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an
effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs
all transformations on the content of the request component identified by FieldToMatch
,
starting from the lowest priority setting, before inspecting the content for a match.public SqliMatchStatement withTextTransformations(TextTransformation... textTransformations)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection. If you specify one or more transformations in a rule statement, WAF performs all
transformations on the content of the request component identified by FieldToMatch
, starting from
the lowest priority setting, before inspecting the content for a match.
NOTE: This method appends the values to the existing list (if any). Use
setTextTransformations(java.util.Collection)
or withTextTransformations(java.util.Collection)
if you want to override the existing values.
textTransformations
- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an
effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs
all transformations on the content of the request component identified by FieldToMatch
,
starting from the lowest priority setting, before inspecting the content for a match.public SqliMatchStatement withTextTransformations(Collection<TextTransformation> textTransformations)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to
bypass detection. If you specify one or more transformations in a rule statement, WAF performs all
transformations on the content of the request component identified by FieldToMatch
, starting from
the lowest priority setting, before inspecting the content for a match.
textTransformations
- Text transformations eliminate some of the unusual formatting that attackers use in web requests in an
effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs
all transformations on the content of the request component identified by FieldToMatch
,
starting from the lowest priority setting, before inspecting the content for a match.public void setSensitivityLevel(String sensitivityLevel)
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web requests
frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the
WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against SQL
injection attacks or that have a low tolerance for false positives.
Default: LOW
sensitivityLevel
- The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web
requests frequently contain unusual strings. For information about identifying and mitigating false
positives, see Testing and tuning
in the WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against
SQL injection attacks or that have a low tolerance for false positives.
Default: LOW
SensitivityLevel
public String getSensitivityLevel()
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web requests
frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the
WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against SQL
injection attacks or that have a low tolerance for false positives.
Default: LOW
HIGH
detects more attacks, but might generate more false positives, especially if your web
requests frequently contain unusual strings. For information about identifying and mitigating false
positives, see Testing and tuning
in the WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against
SQL injection attacks or that have a low tolerance for false positives.
Default: LOW
SensitivityLevel
public SqliMatchStatement withSensitivityLevel(String sensitivityLevel)
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web requests
frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the
WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against SQL
injection attacks or that have a low tolerance for false positives.
Default: LOW
sensitivityLevel
- The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web
requests frequently contain unusual strings. For information about identifying and mitigating false
positives, see Testing and tuning
in the WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against
SQL injection attacks or that have a low tolerance for false positives.
Default: LOW
SensitivityLevel
public SqliMatchStatement withSensitivityLevel(SensitivityLevel sensitivityLevel)
The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web requests
frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the
WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against SQL
injection attacks or that have a low tolerance for false positives.
Default: LOW
sensitivityLevel
- The sensitivity that you want WAF to use to inspect for SQL injection attacks.
HIGH
detects more attacks, but might generate more false positives, especially if your web
requests frequently contain unusual strings. For information about identifying and mitigating false
positives, see Testing and tuning
in the WAF Developer Guide.
LOW
is generally a better choice for resources that already have other protections against
SQL injection attacks or that have a low tolerance for false positives.
Default: LOW
SensitivityLevel
public String toString()
toString
in class Object
Object.toString()
public SqliMatchStatement clone()
public void marshall(ProtocolMarshaller protocolMarshaller)
StructuredPojo
ProtocolMarshaller
.marshall
in interface StructuredPojo
protocolMarshaller
- Implementation of ProtocolMarshaller
used to marshall this object's data.