/** * Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved. * SPDX-License-Identifier: Apache-2.0. */ #pragma once #include #include #include #include #include namespace Aws { namespace Utils { namespace Json { class JsonValue; class JsonView; } // namespace Json } // namespace Utils namespace WAFV2 { namespace Model { /** *

This is the latest version of AWS WAF, named AWS WAFV2, * released in November, 2019. For information, including how to migrate your AWS * WAF resources from the prior release, see the AWS * WAF Developer Guide.

A rule statement that defines a * cross-site scripting (XSS) match search for AWS WAF to apply to web requests. * XSS attacks are those where the attacker uses vulnerabilities in a benign * website as a vehicle to inject malicious client-site scripts into other * legitimate web browsers. The XSS match statement provides the location in * requests that you want AWS WAF to search and text transformations to use on the * search area before AWS WAF searches for character sequences that are likely to * be malicious strings.

See Also:

AWS * API Reference

*/ class AWS_WAFV2_API XssMatchStatement { public: XssMatchStatement(); XssMatchStatement(Aws::Utils::Json::JsonView jsonValue); XssMatchStatement& operator=(Aws::Utils::Json::JsonView jsonValue); Aws::Utils::Json::JsonValue Jsonize() const; /** *

The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.

*/ inline const FieldToMatch& GetFieldToMatch() const{ return m_fieldToMatch; } /** *

The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.

*/ inline bool FieldToMatchHasBeenSet() const { return m_fieldToMatchHasBeenSet; } /** *

The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.

*/ inline void SetFieldToMatch(const FieldToMatch& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = value; } /** *

The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.

*/ inline void SetFieldToMatch(FieldToMatch&& value) { m_fieldToMatchHasBeenSet = true; m_fieldToMatch = std::move(value); } /** *

The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.

*/ inline XssMatchStatement& WithFieldToMatch(const FieldToMatch& value) { SetFieldToMatch(value); return *this;} /** *

The part of a web request that you want AWS WAF to inspect. For more * information, see FieldToMatch.

*/ inline XssMatchStatement& WithFieldToMatch(FieldToMatch&& value) { SetFieldToMatch(std::move(value)); return *this;} /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline const Aws::Vector& GetTextTransformations() const{ return m_textTransformations; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline bool TextTransformationsHasBeenSet() const { return m_textTransformationsHasBeenSet; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline void SetTextTransformations(const Aws::Vector& value) { m_textTransformationsHasBeenSet = true; m_textTransformations = value; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline void SetTextTransformations(Aws::Vector&& value) { m_textTransformationsHasBeenSet = true; m_textTransformations = std::move(value); } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline XssMatchStatement& WithTextTransformations(const Aws::Vector& value) { SetTextTransformations(value); return *this;} /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline XssMatchStatement& WithTextTransformations(Aws::Vector&& value) { SetTextTransformations(std::move(value)); return *this;} /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline XssMatchStatement& AddTextTransformations(const TextTransformation& value) { m_textTransformationsHasBeenSet = true; m_textTransformations.push_back(value); return *this; } /** *

Text transformations eliminate some of the unusual formatting that attackers * use in web requests in an effort to bypass detection. If you specify one or more * transformations in a rule statement, AWS WAF performs all transformations on the * content of the request component identified by FieldToMatch, * starting from the lowest priority setting, before inspecting the content for a * match.

*/ inline XssMatchStatement& AddTextTransformations(TextTransformation&& value) { m_textTransformationsHasBeenSet = true; m_textTransformations.push_back(std::move(value)); return *this; } private: FieldToMatch m_fieldToMatch; bool m_fieldToMatchHasBeenSet; Aws::Vector m_textTransformations; bool m_textTransformationsHasBeenSet; }; } // namespace Model } // namespace WAFV2 } // namespace Aws