All Downloads are FREE. Search and download functionalities are using the official Maven repository.

com.amazonaws.services.wafv2.model.SqliMatchStatement Maven / Gradle / Ivy

Go to download

The AWS Java SDK for AWS WAFV2 module holds the client classes that are used for communicating with AWS WAFV2 Service

There is a newer version: 1.12.767
Show newest version
/*
 * Copyright 2019-2024 Amazon.com, Inc. or its affiliates. All Rights Reserved.
 * 
 * Licensed under the Apache License, Version 2.0 (the "License"). You may not use this file except in compliance with
 * the License. A copy of the License is located at
 * 
 * http://aws.amazon.com/apache2.0
 * 
 * or in the "license" file accompanying this file. This file is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR
 * CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions
 * and limitations under the License.
 */
package com.amazonaws.services.wafv2.model;

import java.io.Serializable;
import javax.annotation.Generated;
import com.amazonaws.protocol.StructuredPojo;
import com.amazonaws.protocol.ProtocolMarshaller;

/**
 * 

* A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do * things like modify your database or extract data from it. *

* * @see AWS API * Documentation */ @Generated("com.amazonaws:aws-java-sdk-code-generator") public class SqliMatchStatement implements Serializable, Cloneable, StructuredPojo { /** *

* The part of the web request that you want WAF to inspect. *

*/ private FieldToMatch fieldToMatch; /** *

* Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to * bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule statements, * to transform request components before using them as custom aggregation keys. If you specify one or more * transformations to apply, WAF performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the transformed component contents. *

*/ private java.util.List textTransformations; /** *

* The sensitivity that you want WAF to use to inspect for SQL injection attacks. *

*

* HIGH detects more attacks, but might generate more false positives, especially if your web requests * frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the * WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against SQL * injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW *

*/ private String sensitivityLevel; /** *

* The part of the web request that you want WAF to inspect. *

* * @param fieldToMatch * The part of the web request that you want WAF to inspect. */ public void setFieldToMatch(FieldToMatch fieldToMatch) { this.fieldToMatch = fieldToMatch; } /** *

* The part of the web request that you want WAF to inspect. *

* * @return The part of the web request that you want WAF to inspect. */ public FieldToMatch getFieldToMatch() { return this.fieldToMatch; } /** *

* The part of the web request that you want WAF to inspect. *

* * @param fieldToMatch * The part of the web request that you want WAF to inspect. * @return Returns a reference to this object so that method calls can be chained together. */ public SqliMatchStatement withFieldToMatch(FieldToMatch fieldToMatch) { setFieldToMatch(fieldToMatch); return this; } /** *

* Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to * bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule statements, * to transform request components before using them as custom aggregation keys. If you specify one or more * transformations to apply, WAF performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the transformed component contents. *

* * @return Text transformations eliminate some of the unusual formatting that attackers use in web requests in an * effort to bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom aggregation keys. If you specify * one or more transformations to apply, WAF performs all transformations on the specified content, starting * from the lowest priority setting, and then uses the transformed component contents. */ public java.util.List getTextTransformations() { return textTransformations; } /** *

* Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to * bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule statements, * to transform request components before using them as custom aggregation keys. If you specify one or more * transformations to apply, WAF performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the transformed component contents. *

* * @param textTransformations * Text transformations eliminate some of the unusual formatting that attackers use in web requests in an * effort to bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom aggregation keys. If you specify * one or more transformations to apply, WAF performs all transformations on the specified content, starting * from the lowest priority setting, and then uses the transformed component contents. */ public void setTextTransformations(java.util.Collection textTransformations) { if (textTransformations == null) { this.textTransformations = null; return; } this.textTransformations = new java.util.ArrayList(textTransformations); } /** *

* Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to * bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule statements, * to transform request components before using them as custom aggregation keys. If you specify one or more * transformations to apply, WAF performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the transformed component contents. *

*

* NOTE: This method appends the values to the existing list (if any). Use * {@link #setTextTransformations(java.util.Collection)} or {@link #withTextTransformations(java.util.Collection)} * if you want to override the existing values. *

* * @param textTransformations * Text transformations eliminate some of the unusual formatting that attackers use in web requests in an * effort to bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom aggregation keys. If you specify * one or more transformations to apply, WAF performs all transformations on the specified content, starting * from the lowest priority setting, and then uses the transformed component contents. * @return Returns a reference to this object so that method calls can be chained together. */ public SqliMatchStatement withTextTransformations(TextTransformation... textTransformations) { if (this.textTransformations == null) { setTextTransformations(new java.util.ArrayList(textTransformations.length)); } for (TextTransformation ele : textTransformations) { this.textTransformations.add(ele); } return this; } /** *

* Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to * bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule statements, * to transform request components before using them as custom aggregation keys. If you specify one or more * transformations to apply, WAF performs all transformations on the specified content, starting from the lowest * priority setting, and then uses the transformed component contents. *

* * @param textTransformations * Text transformations eliminate some of the unusual formatting that attackers use in web requests in an * effort to bypass detection. Text transformations are used in rule match statements, to transform the * FieldToMatch request component before inspecting it, and they're used in rate-based rule * statements, to transform request components before using them as custom aggregation keys. If you specify * one or more transformations to apply, WAF performs all transformations on the specified content, starting * from the lowest priority setting, and then uses the transformed component contents. * @return Returns a reference to this object so that method calls can be chained together. */ public SqliMatchStatement withTextTransformations(java.util.Collection textTransformations) { setTextTransformations(textTransformations); return this; } /** *

* The sensitivity that you want WAF to use to inspect for SQL injection attacks. *

*

* HIGH detects more attacks, but might generate more false positives, especially if your web requests * frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the * WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against SQL * injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW *

* * @param sensitivityLevel * The sensitivity that you want WAF to use to inspect for SQL injection attacks.

*

* HIGH detects more attacks, but might generate more false positives, especially if your web * requests frequently contain unusual strings. For information about identifying and mitigating false * positives, see Testing and tuning * in the WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against * SQL injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW * @see SensitivityLevel */ public void setSensitivityLevel(String sensitivityLevel) { this.sensitivityLevel = sensitivityLevel; } /** *

* The sensitivity that you want WAF to use to inspect for SQL injection attacks. *

*

* HIGH detects more attacks, but might generate more false positives, especially if your web requests * frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the * WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against SQL * injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW *

* * @return The sensitivity that you want WAF to use to inspect for SQL injection attacks.

*

* HIGH detects more attacks, but might generate more false positives, especially if your web * requests frequently contain unusual strings. For information about identifying and mitigating false * positives, see Testing and tuning * in the WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against * SQL injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW * @see SensitivityLevel */ public String getSensitivityLevel() { return this.sensitivityLevel; } /** *

* The sensitivity that you want WAF to use to inspect for SQL injection attacks. *

*

* HIGH detects more attacks, but might generate more false positives, especially if your web requests * frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the * WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against SQL * injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW *

* * @param sensitivityLevel * The sensitivity that you want WAF to use to inspect for SQL injection attacks.

*

* HIGH detects more attacks, but might generate more false positives, especially if your web * requests frequently contain unusual strings. For information about identifying and mitigating false * positives, see Testing and tuning * in the WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against * SQL injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW * @return Returns a reference to this object so that method calls can be chained together. * @see SensitivityLevel */ public SqliMatchStatement withSensitivityLevel(String sensitivityLevel) { setSensitivityLevel(sensitivityLevel); return this; } /** *

* The sensitivity that you want WAF to use to inspect for SQL injection attacks. *

*

* HIGH detects more attacks, but might generate more false positives, especially if your web requests * frequently contain unusual strings. For information about identifying and mitigating false positives, see Testing and tuning in the * WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against SQL * injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW *

* * @param sensitivityLevel * The sensitivity that you want WAF to use to inspect for SQL injection attacks.

*

* HIGH detects more attacks, but might generate more false positives, especially if your web * requests frequently contain unusual strings. For information about identifying and mitigating false * positives, see Testing and tuning * in the WAF Developer Guide. *

*

* LOW is generally a better choice for resources that already have other protections against * SQL injection attacks or that have a low tolerance for false positives. *

*

* Default: LOW * @return Returns a reference to this object so that method calls can be chained together. * @see SensitivityLevel */ public SqliMatchStatement withSensitivityLevel(SensitivityLevel sensitivityLevel) { this.sensitivityLevel = sensitivityLevel.toString(); return this; } /** * Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be * redacted from this string using a placeholder value. * * @return A string representation of this object. * * @see java.lang.Object#toString() */ @Override public String toString() { StringBuilder sb = new StringBuilder(); sb.append("{"); if (getFieldToMatch() != null) sb.append("FieldToMatch: ").append(getFieldToMatch()).append(","); if (getTextTransformations() != null) sb.append("TextTransformations: ").append(getTextTransformations()).append(","); if (getSensitivityLevel() != null) sb.append("SensitivityLevel: ").append(getSensitivityLevel()); sb.append("}"); return sb.toString(); } @Override public boolean equals(Object obj) { if (this == obj) return true; if (obj == null) return false; if (obj instanceof SqliMatchStatement == false) return false; SqliMatchStatement other = (SqliMatchStatement) obj; if (other.getFieldToMatch() == null ^ this.getFieldToMatch() == null) return false; if (other.getFieldToMatch() != null && other.getFieldToMatch().equals(this.getFieldToMatch()) == false) return false; if (other.getTextTransformations() == null ^ this.getTextTransformations() == null) return false; if (other.getTextTransformations() != null && other.getTextTransformations().equals(this.getTextTransformations()) == false) return false; if (other.getSensitivityLevel() == null ^ this.getSensitivityLevel() == null) return false; if (other.getSensitivityLevel() != null && other.getSensitivityLevel().equals(this.getSensitivityLevel()) == false) return false; return true; } @Override public int hashCode() { final int prime = 31; int hashCode = 1; hashCode = prime * hashCode + ((getFieldToMatch() == null) ? 0 : getFieldToMatch().hashCode()); hashCode = prime * hashCode + ((getTextTransformations() == null) ? 0 : getTextTransformations().hashCode()); hashCode = prime * hashCode + ((getSensitivityLevel() == null) ? 0 : getSensitivityLevel().hashCode()); return hashCode; } @Override public SqliMatchStatement clone() { try { return (SqliMatchStatement) super.clone(); } catch (CloneNotSupportedException e) { throw new IllegalStateException("Got a CloneNotSupportedException from Object.clone() " + "even though we're Cloneable!", e); } } @com.amazonaws.annotation.SdkInternalApi @Override public void marshall(ProtocolMarshaller protocolMarshaller) { com.amazonaws.services.wafv2.model.transform.SqliMatchStatementMarshaller.getInstance().marshall(this, protocolMarshaller); } }





© 2015 - 2024 Weber Informatics LLC | Privacy Policy