Class SqlInjectionMatchSetSqlInjectionMatchTupleArgs
Inherited Members
System.Object.Equals(System.Object)
System.Object.Equals(System.Object, System.Object)
System.Object.GetHashCode()
System.Object.GetType()
System.Object.MemberwiseClone()
System.Object.ReferenceEquals(System.Object, System.Object)
System.Object.ToString()
Namespace: Pulumi.Aws.WafRegional.Inputs
Assembly: Pulumi.Aws.dll
Syntax
public sealed class SqlInjectionMatchSetSqlInjectionMatchTupleArgs : ResourceArgs
Constructors
View SourceSqlInjectionMatchSetSqlInjectionMatchTupleArgs()
Declaration
public SqlInjectionMatchSetSqlInjectionMatchTupleArgs()
Properties
View SourceFieldToMatch
Specifies where in a web request to look for snippets of malicious SQL code.
Declaration
public Input<SqlInjectionMatchSetSqlInjectionMatchTupleFieldToMatchArgs> FieldToMatch { get; set; }
Property Value
| Type | Description |
|---|---|
| Input<SqlInjectionMatchSetSqlInjectionMatchTupleFieldToMatchArgs> |
TextTransformation
Text transformations used to eliminate unusual formatting that attackers use in web requests in an effort to bypass AWS WAF.
If you specify a transformation, AWS WAF performs the transformation on field_to_match before inspecting a request for a match.
e.g. CMD_LINE, HTML_ENTITY_DECODE or NONE.
See docs
for all supported values.
Declaration
public Input<string> TextTransformation { get; set; }
Property Value
| Type | Description |
|---|---|
| Input<System.String> |