SqliMatchStatement class
Attackers sometimes insert malicious SQL code into web requests in an effort
to extract data from your database. To allow or block web requests that
appear to contain malicious SQL code, create one or more SQL injection match
conditions. An SQL injection match condition identifies the part of web
requests, such as the URI or the query string, that you want AWS WAF to
inspect. Later in the process, when you create a web ACL, you specify
whether to allow or block requests that appear to contain malicious SQL
code.
Constructors
-
SqliMatchStatement({required FieldToMatch fieldToMatch, required List<
TextTransformation> textTransformations}) -
SqliMatchStatement.fromJson(Map<
String, dynamic> json) -
factory
Properties
- fieldToMatch → FieldToMatch
-
The part of a web request that you want AWS WAF to inspect. For more
information, see FieldToMatch.
final
- hashCode → int
-
The hash code for this object.
no setterinherited
- runtimeType → Type
-
A representation of the runtime type of the object.
no setterinherited
-
textTransformations
→ List<
TextTransformation> -
Text transformations eliminate some of the unusual formatting that attackers
use in web requests in an effort to bypass detection. If you specify one or
more transformations in a rule statement, AWS WAF performs all
transformations on the content of the request component identified by
FieldToMatch
, starting from the lowest priority setting, before inspecting the content for a match.final
Methods
-
noSuchMethod(
Invocation invocation) → dynamic -
Invoked when a nonexistent method or property is accessed.
inherited
-
toJson(
) → Map< String, dynamic> -
toString(
) → String -
A string representation of this object.
inherited
Operators
-
operator ==(
Object other) → bool -
The equality operator.
inherited