You are viewing documentation for version 2 of the AWS SDK for Ruby. Version 3 documentation can be found here.
Class: Aws::WAFRegional::Types::SqlInjectionMatchTuple
- Inherits:
-
Struct
- Object
- Struct
- Aws::WAFRegional::Types::SqlInjectionMatchTuple
- Defined in:
- (unknown)
Overview
When passing SqlInjectionMatchTuple as input to an Aws::Client method, you can use a vanilla Hash:
{
field_to_match: { # required
type: "URI", # required, accepts URI, QUERY_STRING, HEADER, METHOD, BODY, SINGLE_QUERY_ARG, ALL_QUERY_ARGS
data: "MatchFieldData",
},
text_transformation: "NONE", # required, accepts NONE, COMPRESS_WHITE_SPACE, HTML_ENTITY_DECODE, LOWERCASE, CMD_LINE, URL_DECODE
}
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
Returned by:
Instance Attribute Summary collapse
-
#field_to_match ⇒ Types::FieldToMatch
Specifies where in a web request to look for snippets of malicious SQL code.
-
#text_transformation ⇒ String
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
Instance Attribute Details
#field_to_match ⇒ Types::FieldToMatch
Specifies where in a web request to look for snippets of malicious SQL code.
#text_transformation ⇒ String
Text transformations eliminate some of the unusual formatting that
attackers use in web requests in an effort to bypass AWS WAF. If you
specify a transformation, AWS WAF performs the transformation on
FieldToMatch
before inspecting it for a match.
You can only specify a single type of TextTransformation.
CMD_LINE
When you\'re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:
Delete the following characters: \ \" \' ^
Delete spaces before the following characters: / (
Replace the following characters with a space: , ;
Replace multiple spaces with one space
Convert uppercase letters (A-Z) to lowercase (a-z)
COMPRESS_WHITE_SPACE
Use this option to replace the following characters with a space character (decimal 32):
\f, formfeed, decimal 12
\t, tab, decimal 9
\n, newline, decimal 10
\r, carriage return, decimal 13
\v, vertical tab, decimal 11
non-breaking space, decimal 160
COMPRESS_WHITE_SPACE
also replaces multiple spaces with one space.
HTML_ENTITY_DECODE
Use this option to replace HTML-encoded characters with unencoded
characters. HTML_ENTITY_DECODE
performs the following operations:
Replaces
(ampersand)quot;
with"
Replaces
(ampersand)nbsp;
with a non-breaking space, decimal 160Replaces
(ampersand)lt;
with a \"less than\" symbolReplaces
(ampersand)gt;
with>
Replaces characters that are represented in hexadecimal format,
(ampersand)#xhhhh;
, with the corresponding charactersReplaces characters that are represented in decimal format,
(ampersand)#nnnn;
, with the corresponding characters
LOWERCASE
Use this option to convert uppercase letters (A-Z) to lowercase (a-z).
URL_DECODE
Use this option to decode a URL-encoded value.
NONE
Specify NONE
if you don\'t want to perform any text transformations.
Possible values:
- NONE
- COMPRESS_WHITE_SPACE
- HTML_ENTITY_DECODE
- LOWERCASE
- CMD_LINE
- URL_DECODE