/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include This is the latest version of AWS WAF, named AWS WAFV2,
* released in November, 2019. For information, including how to migrate your AWS
* WAF resources from the prior release, see the AWS
* WAF Developer Guide. Attackers sometimes insert malicious
* SQL code into web requests in an effort to extract data from your database. To
* allow or block web requests that appear to contain malicious SQL code, create
* one or more SQL injection match conditions. An SQL injection match condition
* identifies the part of web requests, such as the URI or the query string, that
* you want AWS WAF to inspect. Later in the process, when you create a web ACL,
* you specify whether to allow or block requests that appear to contain malicious
* SQL code.See Also:
AWS
* API Reference
The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); } /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline SqliMatchStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;} /** *The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.
*/ inline SqliMatchStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;} /** *Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.
Text transformations eliminate some of the unusual formatting that attackers
* use in web requests in an effort to bypass detection. If you specify one or more
* transformations in a rule statement, AWS WAF performs all transformations on the
* content of the request component identified by FieldToMatch,
* starting from the lowest priority setting, before inspecting the content for a
* match.