Statement class

The processing guidance for a Rule, used by AWS WAF to determine whether a web request matches the rule.

Constructors

Statement({AndStatement? andStatement, ByteMatchStatement? byteMatchStatement, GeoMatchStatement? geoMatchStatement, IPSetReferenceStatement? iPSetReferenceStatement, ManagedRuleGroupStatement? managedRuleGroupStatement, NotStatement? notStatement, OrStatement? orStatement, RateBasedStatement? rateBasedStatement, RegexPatternSetReferenceStatement? regexPatternSetReferenceStatement, RuleGroupReferenceStatement? ruleGroupReferenceStatement, SizeConstraintStatement? sizeConstraintStatement, SqliMatchStatement? sqliMatchStatement, XssMatchStatement? xssMatchStatement})
Statement.fromJson(Map<String, dynamic> json)
factory

Properties

andStatement AndStatement?
A logical rule statement used to combine other rule statements with AND logic. You provide more than one Statement within the AndStatement.
final
byteMatchStatement ByteMatchStatement?
A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is refered to as a string match statement.
final
geoMatchStatement GeoMatchStatement?
A rule statement used to identify web requests based on country of origin.
final
hashCode int
The hash code for this object.
no setterinherited
iPSetReferenceStatement IPSetReferenceStatement?
A rule statement used to detect web requests coming from particular IP addresses or address ranges. To use this, create an IPSet that specifies the addresses you want to detect, then use the ARN of that set in this statement. To create an IP set, see CreateIPSet.
final
managedRuleGroupStatement ManagedRuleGroupStatement?
A rule statement used to run the rules that are defined in a managed rule group. To use this, provide the vendor name and the name of the rule group in this statement. You can retrieve the required names by calling ListAvailableManagedRuleGroups.
final
notStatement NotStatement?
A logical rule statement used to negate the results of another rule statement. You provide one Statement within the NotStatement.
final
orStatement OrStatement?
A logical rule statement used to combine other rule statements with OR logic. You provide more than one Statement within the OrStatement.
final
rateBasedStatement RateBasedStatement?
A rate-based rule tracks the rate of requests for each originating IP address, and triggers the rule action when the rate exceeds a limit that you specify on the number of requests in any 5-minute time span. You can use this to put a temporary block on requests from an IP address that is sending excessive requests.
final
regexPatternSetReferenceStatement RegexPatternSetReferenceStatement?
A rule statement used to search web request components for matches with regular expressions. To use this, create a RegexPatternSet that specifies the expressions that you want to detect, then use the ARN of that set in this statement. A web request matches the pattern set rule statement if the request component matches any of the patterns in the set. To create a regex pattern set, see CreateRegexPatternSet.
final
ruleGroupReferenceStatement RuleGroupReferenceStatement?
A rule statement used to run the rules that are defined in a RuleGroup. To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement.
final
runtimeType Type
A representation of the runtime type of the object.
no setterinherited
sizeConstraintStatement SizeConstraintStatement?
A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
final
sqliMatchStatement SqliMatchStatement?
Attackers sometimes insert malicious SQL code into web requests in an effort to extract data from your database. To allow or block web requests that appear to contain malicious SQL code, create one or more SQL injection match conditions. An SQL injection match condition identifies the part of web requests, such as the URI or the query string, that you want AWS WAF to inspect. Later in the process, when you create a web ACL, you specify whether to allow or block requests that appear to contain malicious SQL code.
final
xssMatchStatement XssMatchStatement?
A rule statement that defines a cross-site scripting (XSS) match search for AWS WAF to apply to web requests. XSS attacks are those where the attacker uses vulnerabilities in a benign website as a vehicle to inject malicious client-site scripts into other legitimate web browsers. The XSS match statement provides the location in requests that you want AWS WAF to search and text transformations to use on the search area before AWS WAF searches for character sequences that are likely to be malicious strings.
final

Methods

noSuchMethod(Invocation invocation) → dynamic
Invoked when a nonexistent method or property is accessed.
inherited
toJson() Map<String, dynamic>
toString() String
A string representation of this object.
inherited

Operators

operator ==(Object other) bool
The equality operator.
inherited