You are viewing documentation for version 2 of the AWS SDK for Ruby. Version 3 documentation can be found here.
Class: Aws::WAFRegional::Types::SqlInjectionMatchSetUpdate
- Inherits:
-
Struct
- Object
- Struct
- Aws::WAFRegional::Types::SqlInjectionMatchSetUpdate
- Defined in:
- (unknown)
Overview
When passing SqlInjectionMatchSetUpdate as input to an Aws::Client method, you can use a vanilla Hash:
{
action: "INSERT", # required, accepts INSERT, DELETE
sql_injection_match_tuple: { # required
field_to_match: { # required
type: "URI", # required, accepts URI, QUERY_STRING, HEADER, METHOD, BODY, SINGLE_QUERY_ARG, ALL_QUERY_ARGS
data: "MatchFieldData",
},
text_transformation: "NONE", # required, accepts NONE, COMPRESS_WHITE_SPACE, HTML_ENTITY_DECODE, LOWERCASE, CMD_LINE, URL_DECODE
},
}
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide. For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Specifies the part of a web request that you want to inspect for snippets of malicious SQL code and indicates whether you want to add the specification to a SqlInjectionMatchSet or delete it from a SqlInjectionMatchSet
.
Instance Attribute Summary collapse
-
#action ⇒ String
Specify
INSERT
to add a SqlInjectionMatchSetUpdate to a SqlInjectionMatchSet. -
#sql_injection_match_tuple ⇒ Types::SqlInjectionMatchTuple
Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
Instance Attribute Details
#action ⇒ String
Specify INSERT
to add a SqlInjectionMatchSetUpdate to a
SqlInjectionMatchSet. Use DELETE
to remove a
SqlInjectionMatchSetUpdate
from a SqlInjectionMatchSet
.
Possible values:
- INSERT
- DELETE
#sql_injection_match_tuple ⇒ Types::SqlInjectionMatchTuple
Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.