182 lines
8.3 KiB
C
182 lines
8.3 KiB
C
|
|
/**
|
|||
|
|
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
|
|||
|
|
* SPDX-License-Identifier: Apache-2.0.
|
|||
|
|
*/
|
|||
|
|
|
|||
|
|
#pragma once
|
|||
|
|
#include <aws/wafv2/WAFV2_EXPORTS.h>
|
|||
|
|
#include <aws/wafv2/model/FieldToMatch.h>
|
|||
|
|
#include <aws/core/utils/memory/stl/AWSVector.h>
|
|||
|
|
#include <aws/wafv2/model/TextTransformation.h>
|
|||
|
|
#include <utility>
|
|||
|
|
|
|||
|
|
namespace Aws
|
|||
|
|
{
|
|||
|
|
namespace Utils
|
|||
|
|
{
|
|||
|
|
namespace Json
|
|||
|
|
{
|
|||
|
|
class JsonValue;
|
|||
|
|
class JsonView;
|
|||
|
|
} // namespace Json
|
|||
|
|
} // namespace Utils
|
|||
|
|
namespace WAFV2
|
|||
|
|
{
|
|||
|
|
namespace Model
|
|||
|
|
{
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>This is the latest version of <b>AWS WAF</b>, named AWS WAFV2,
|
|||
|
|
* released in November, 2019. For information, including how to migrate your AWS
|
|||
|
|
* WAF resources from the prior release, see the <a
|
|||
|
|
* href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">AWS
|
|||
|
|
* WAF Developer Guide</a>. </p> <p>A rule statement that defines a
|
|||
|
|
* cross-site scripting (XSS) match search for AWS WAF to apply to web requests.
|
|||
|
|
* XSS attacks are those where the attacker uses vulnerabilities in a benign
|
|||
|
|
* website as a vehicle to inject malicious client-site scripts into other
|
|||
|
|
* legitimate web browsers. The XSS match statement provides the location in
|
|||
|
|
* requests that you want AWS WAF to search and text transformations to use on the
|
|||
|
|
* search area before AWS WAF searches for character sequences that are likely to
|
|||
|
|
* be malicious strings. </p><p><h3>See Also:</h3> <a
|
|||
|
|
* href="http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/XssMatchStatement">AWS
|
|||
|
|
* API Reference</a></p>
|
|||
|
|
*/
|
|||
|
|
class AWS_WAFV2_API XssMatchStatement
|
|||
|
|
{
|
|||
|
|
public:
|
|||
|
|
XssMatchStatement();
|
|||
|
|
XssMatchStatement(Aws::Utils::Json::JsonView jsonValue);
|
|||
|
|
XssMatchStatement& operator=(Aws::Utils::Json::JsonView jsonValue);
|
|||
|
|
Aws::Utils::Json::JsonValue Jsonize() const;
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The part of a web request that you want AWS WAF to inspect. For more
|
|||
|
|
* information, see <a>FieldToMatch</a>. </p>
|
|||
|
|
*/
|
|||
|
|
inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The part of a web request that you want AWS WAF to inspect. For more
|
|||
|
|
* information, see <a>FieldToMatch</a>. </p>
|
|||
|
|
*/
|
|||
|
|
inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The part of a web request that you want AWS WAF to inspect. For more
|
|||
|
|
* information, see <a>FieldToMatch</a>. </p>
|
|||
|
|
*/
|
|||
|
|
inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The part of a web request that you want AWS WAF to inspect. For more
|
|||
|
|
* information, see <a>FieldToMatch</a>. </p>
|
|||
|
|
*/
|
|||
|
|
inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The part of a web request that you want AWS WAF to inspect. For more
|
|||
|
|
* information, see <a>FieldToMatch</a>. </p>
|
|||
|
|
*/
|
|||
|
|
inline XssMatchStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>The part of a web request that you want AWS WAF to inspect. For more
|
|||
|
|
* information, see <a>FieldToMatch</a>. </p>
|
|||
|
|
*/
|
|||
|
|
inline XssMatchStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline const Aws::Vector<TextTransformation>& GetTextTransformations() const{ return m_textTransformations; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline bool TextTransformationsHasBeenSet() const { return m_textTransformationsHasBeenSet; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetTextTransformations(const Aws::Vector<TextTransformation>& value) { m_textTransformationsHasBeenSet = true; m_textTransformations = value; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline void SetTextTransformations(Aws::Vector<TextTransformation>&& value) { m_textTransformationsHasBeenSet = true; m_textTransformations = std::move(value); }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline XssMatchStatement& WithTextTransformations(const Aws::Vector<TextTransformation>& value) { SetTextTransformations(value); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline XssMatchStatement& WithTextTransformations(Aws::Vector<TextTransformation>&& value) { SetTextTransformations(std::move(value)); return *this;}
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline XssMatchStatement& AddTextTransformations(const TextTransformation& value) { m_textTransformationsHasBeenSet = true; m_textTransformations.push_back(value); return *this; }
|
|||
|
|
|
|||
|
|
/**
|
|||
|
|
* <p>Text transformations eliminate some of the unusual formatting that attackers
|
|||
|
|
* use in web requests in an effort to bypass detection. If you specify one or more
|
|||
|
|
* transformations in a rule statement, AWS WAF performs all transformations on the
|
|||
|
|
* content of the request component identified by <code>FieldToMatch</code>,
|
|||
|
|
* starting from the lowest priority setting, before inspecting the content for a
|
|||
|
|
* match.</p>
|
|||
|
|
*/
|
|||
|
|
inline XssMatchStatement& AddTextTransformations(TextTransformation&& value) { m_textTransformationsHasBeenSet = true; m_textTransformations.push_back(std::move(value)); return *this; }
|
|||
|
|
|
|||
|
|
private:
|
|||
|
|
|
|||
|
|
FieldToMatch m_fieldToMatch;
|
|||
|
|
bool m_fieldToMatchHasBeenSet;
|
|||
|
|
|
|||
|
|
Aws::Vector<TextTransformation> m_textTransformations;
|
|||
|
|
bool m_textTransformationsHasBeenSet;
|
|||
|
|
};
|
|||
|
|
|
|||
|
|
} // namespace Model
|
|||
|
|
} // namespace WAFV2
|
|||
|
|
} // namespace Aws
|