WebAclStatementArgs

data class WebAclStatementArgs(val andStatement: Output<WebAclAndStatementArgs>? = null, val byteMatchStatement: Output<WebAclByteMatchStatementArgs>? = null, val geoMatchStatement: Output<WebAclGeoMatchStatementArgs>? = null, val ipSetReferenceStatement: Output<WebAclIpSetReferenceStatementArgs>? = null, val labelMatchStatement: Output<WebAclLabelMatchStatementArgs>? = null, val managedRuleGroupStatement: Output<WebAclManagedRuleGroupStatementArgs>? = null, val notStatement: Output<WebAclNotStatementArgs>? = null, val orStatement: Output<WebAclOrStatementArgs>? = null, val rateBasedStatement: Output<WebAclRateBasedStatementArgs>? = null, val regexMatchStatement: Output<WebAclRegexMatchStatementArgs>? = null, val regexPatternSetReferenceStatement: Output<WebAclRegexPatternSetReferenceStatementArgs>? = null, val ruleGroupReferenceStatement: Output<WebAclRuleGroupReferenceStatementArgs>? = null, val sizeConstraintStatement: Output<WebAclSizeConstraintStatementArgs>? = null, val sqliMatchStatement: Output<WebAclSqliMatchStatementArgs>? = null, val xssMatchStatement: Output<WebAclXssMatchStatementArgs>? = null) : ConvertibleToJava<WebAclStatementArgs>

First level statement that contains conditions, such as ByteMatch, SizeConstraint, etc

Constructors

Link copied to clipboard
constructor(andStatement: Output<WebAclAndStatementArgs>? = null, byteMatchStatement: Output<WebAclByteMatchStatementArgs>? = null, geoMatchStatement: Output<WebAclGeoMatchStatementArgs>? = null, ipSetReferenceStatement: Output<WebAclIpSetReferenceStatementArgs>? = null, labelMatchStatement: Output<WebAclLabelMatchStatementArgs>? = null, managedRuleGroupStatement: Output<WebAclManagedRuleGroupStatementArgs>? = null, notStatement: Output<WebAclNotStatementArgs>? = null, orStatement: Output<WebAclOrStatementArgs>? = null, rateBasedStatement: Output<WebAclRateBasedStatementArgs>? = null, regexMatchStatement: Output<WebAclRegexMatchStatementArgs>? = null, regexPatternSetReferenceStatement: Output<WebAclRegexPatternSetReferenceStatementArgs>? = null, ruleGroupReferenceStatement: Output<WebAclRuleGroupReferenceStatementArgs>? = null, sizeConstraintStatement: Output<WebAclSizeConstraintStatementArgs>? = null, sqliMatchStatement: Output<WebAclSqliMatchStatementArgs>? = null, xssMatchStatement: Output<WebAclXssMatchStatementArgs>? = null)

Properties

Link copied to clipboard

A logical rule statement used to combine other rule statements with AND logic. You provide more than one Statement within the AndStatement .

Link copied to clipboard

A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.

Link copied to clipboard

A rule statement that labels web requests by country and region and that matches against web requests based on country code. A geo match rule labels every request that it inspects regardless of whether it finds a match.

Link copied to clipboard

A rule statement used to detect web requests coming from particular IP addresses or address ranges. To use this, create an IPSet that specifies the addresses you want to detect, then use the ARN of that set in this statement. Each IP set rule statement references an IP set. You create and maintain the set independent of your rules. This allows you to use the single set in multiple rules. When you update the referenced set, AWS WAF automatically updates all rules that reference it.

Link copied to clipboard

A rule statement to match against labels that have been added to the web request by rules that have already run in the web ACL. The label match statement provides the label or namespace string to search for. The label string can represent a part or all of the fully qualified label name that had been added to the web request. Fully qualified labels have a prefix, optional namespaces, and label name. The prefix identifies the rule group or web ACL context of the rule that added the label. If you do not provide the fully qualified name in your label match string, AWS WAF performs the search for labels that were added in the same context as the label match statement.

Link copied to clipboard

A rule statement used to run the rules that are defined in a managed rule group. To use this, provide the vendor name and the name of the rule group in this statement. You can retrieve the required names through the API call ListAvailableManagedRuleGroups . You cannot nest a ManagedRuleGroupStatement , for example for use inside a NotStatement or OrStatement . It can only be referenced as a top-level statement within a rule.

Link copied to clipboard

A logical rule statement used to negate the results of another rule statement. You provide one Statement within the NotStatement .

Link copied to clipboard
val orStatement: Output<WebAclOrStatementArgs>? = null

A logical rule statement used to combine other rule statements with OR logic. You provide more than one Statement within the OrStatement .

Link copied to clipboard

A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance.

Link copied to clipboard

A rule statement used to search web request components for a match against a single regular expression.

Link copied to clipboard

A rule statement used to search web request components for matches with regular expressions. To use this, create a RegexPatternSet that specifies the expressions that you want to detect, then use the ARN of that set in this statement. A web request matches the pattern set rule statement if the request component matches any of the patterns in the set. Each regex pattern set rule statement references a regex pattern set. You create and maintain the set independent of your rules. This allows you to use the single set in multiple rules. When you update the referenced set, AWS WAF automatically updates all rules that reference it.

Link copied to clipboard

A rule statement used to run the rules that are defined in a RuleGroup . To use this, create a rule group with your rules, then provide the ARN of the rule group in this statement. You cannot nest a RuleGroupReferenceStatement , for example for use inside a NotStatement or OrStatement . You cannot use a rule group reference statement inside another rule group. You can only reference a rule group as a top-level statement within a rule that you define in a web ACL.

Link copied to clipboard

A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure AWS WAF to inspect the request body, AWS WAF inspects only the number of bytes in the body up to the limit for the web ACL and protected resource type. If you know that the request body for your web requests should never exceed the inspection limit, you can use a size constraint statement to block requests that have a larger request body size. For more information about the inspection limits, see Body and JsonBody settings for the FieldToMatch data type. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.

Link copied to clipboard

A rule statement that inspects for malicious SQL code. Attackers insert malicious SQL code into web requests to do things like modify your database or extract data from it.

Link copied to clipboard

A rule statement that inspects for cross-site scripting (XSS) attacks. In XSS attacks, the attacker uses vulnerabilities in a benign website as a vehicle to inject malicious client-site scripts into other legitimate web browsers.

Functions

Link copied to clipboard
open override fun toJava(): WebAclStatementArgs