AWS services or capabilities described in AWS Documentation may vary by region/location. Click Getting Started with Amazon AWS to see specific differences applicable to the China (Beijing) Region.

You are viewing documentation for version 2 of the AWS SDK for Ruby. Version 3 documentation can be found here.

Class: Aws::WAFRegional::Types::XssMatchSet

Inherits:
Struct
  • Object
show all
Defined in:
(unknown)

Overview

This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.

For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.

A complex type that contains XssMatchTuple objects, which specify the parts of web requests that you want AWS WAF to inspect for cross-site scripting attacks and, if you want AWS WAF to inspect a header, the name of the header. If a XssMatchSet contains more than one XssMatchTuple object, a request needs to include cross-site scripting attacks in only one of the specified parts of the request to be considered a match.

Returned by:

Instance Attribute Summary collapse

Instance Attribute Details

#nameString

The name, if any, of the XssMatchSet.

Returns:

  • (String)

    The name, if any, of the XssMatchSet.

#xss_match_set_idString

A unique identifier for an XssMatchSet. You use XssMatchSetId to get information about an XssMatchSet (see GetXssMatchSet), update an XssMatchSet (see UpdateXssMatchSet), insert an XssMatchSet into a Rule or delete one from a Rule (see UpdateRule), and delete an XssMatchSet from AWS WAF (see DeleteXssMatchSet).

XssMatchSetId is returned by CreateXssMatchSet and by ListXssMatchSets.

Returns:

  • (String)

    A unique identifier for an XssMatchSet.

#xss_match_tuplesArray<Types::XssMatchTuple>

Specifies the parts of web requests that you want to inspect for cross-site scripting attacks.

Returns:

  • (Array<Types::XssMatchTuple>)

    Specifies the parts of web requests that you want to inspect for cross-site scripting attacks.