Create Sql Injection Match Set
wafregional_create_sql_injection_match_set | R Documentation |
This is AWS WAF Classic documentation¶
Description¶
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Creates a SqlInjectionMatchSet, which you use to allow, block, or count requests that contain snippets of SQL code in a specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings.
To create and configure a SqlInjectionMatchSet
, perform the following
steps:
-
Use
get_change_token
to get the change token that you provide in theChangeToken
parameter of acreate_sql_injection_match_set
request. -
Submit a
create_sql_injection_match_set
request. -
Use
get_change_token
to get the change token that you provide in theChangeToken
parameter of anupdate_sql_injection_match_set
request. -
Submit an
update_sql_injection_match_set
request to specify the parts of web requests in which you want to allow, block, or count malicious SQL code.
For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide.
Usage¶
Arguments¶
Name
[required] A friendly name or description for the SqlInjectionMatchSet that you're creating. You can't change
Name
after you create theSqlInjectionMatchSet
.ChangeToken
[required] The value returned by the most recent call to
get_change_token
.
Value¶
A list with the following syntax:
list(
SqlInjectionMatchSet = list(
SqlInjectionMatchSetId = "string",
Name = "string",
SqlInjectionMatchTuples = list(
list(
FieldToMatch = list(
Type = "URI"|"QUERY_STRING"|"HEADER"|"METHOD"|"BODY"|"SINGLE_QUERY_ARG"|"ALL_QUERY_ARGS",
Data = "string"
),
TextTransformation = "NONE"|"COMPRESS_WHITE_SPACE"|"HTML_ENTITY_DECODE"|"LOWERCASE"|"CMD_LINE"|"URL_DECODE"
)
)
),
ChangeToken = "string"
)