[ aws . waf-regional ]
Note
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Returns the SqlInjectionMatchSet that is specified by SqlInjectionMatchSetId
.
See also: AWS API Documentation
See ‘aws help’ for descriptions of global parameters.
get-sql-injection-match-set
--sql-injection-match-set-id <value>
[--cli-input-json | --cli-input-yaml]
[--generate-cli-skeleton <value>]
--sql-injection-match-set-id
(string)
The
SqlInjectionMatchSetId
of the SqlInjectionMatchSet that you want to get.SqlInjectionMatchSetId
is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets .
--cli-input-json
| --cli-input-yaml
(string)
Reads arguments from the JSON string provided. The JSON string follows the format provided by --generate-cli-skeleton
. If other arguments are provided on the command line, those values will override the JSON-provided values. It is not possible to pass arbitrary binary values using a JSON-provided value as the string will be taken literally. This may not be specified along with --cli-input-yaml
.
--generate-cli-skeleton
(string)
Prints a JSON skeleton to standard output without sending an API request. If provided with no value or the value input
, prints a sample input JSON that can be used as an argument for --cli-input-json
. Similarly, if provided yaml-input
it will print a sample input YAML that can be used with --cli-input-yaml
. If provided with the value output
, it validates the command inputs and returns a sample output JSON for that command. The generated JSON skeleton is not stable between versions of the AWS CLI and there are no backwards compatibility guarantees in the JSON skeleton generated.
See ‘aws help’ for descriptions of global parameters.
SqlInjectionMatchSet -> (structure)
Information about the SqlInjectionMatchSet that you specified in the
GetSqlInjectionMatchSet
request. For more information, see the following topics:
SqlInjectionMatchSet : Contains
Name
,SqlInjectionMatchSetId
, and an array ofSqlInjectionMatchTuple
objectsSqlInjectionMatchTuple : Each
SqlInjectionMatchTuple
object containsFieldToMatch
andTextTransformation
FieldToMatch : Contains
Data
andType
SqlInjectionMatchSetId -> (string)
A unique identifier for a
SqlInjectionMatchSet
. You useSqlInjectionMatchSetId
to get information about aSqlInjectionMatchSet
(see GetSqlInjectionMatchSet ), update aSqlInjectionMatchSet
(see UpdateSqlInjectionMatchSet ), insert aSqlInjectionMatchSet
into aRule
or delete one from aRule
(see UpdateRule ), and delete aSqlInjectionMatchSet
from AWS WAF (see DeleteSqlInjectionMatchSet ).
SqlInjectionMatchSetId
is returned by CreateSqlInjectionMatchSet and by ListSqlInjectionMatchSets .Name -> (string)
The name, if any, of the
SqlInjectionMatchSet
.SqlInjectionMatchTuples -> (list)
Specifies the parts of web requests that you want to inspect for snippets of malicious SQL code.
(structure)
Note
This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.
For the latest version of AWS WAF , use the AWS WAFV2 API and see the AWS WAF Developer Guide . With the latest version, AWS WAF has a single set of endpoints for regional and global use.
Specifies the part of a web request that you want AWS WAF to inspect for snippets of malicious SQL code and, if you want AWS WAF to inspect a header, the name of the header.
FieldToMatch -> (structure)
Specifies where in a web request to look for snippets of malicious SQL code.
Type -> (string)
The part of the web request that you want AWS WAF to search for a specified string. Parts of a request that you can search include the following:
HEADER
: A specified request header, for example, the value of theUser-Agent
orReferer
header. If you chooseHEADER
for the type, specify the name of the header inData
.
METHOD
: The HTTP method, which indicated the type of operation that the request is asking the origin to perform. Amazon CloudFront supports the following methods:DELETE
,GET
,HEAD
,OPTIONS
,PATCH
,POST
, andPUT
.
QUERY_STRING
: A query string, which is the part of a URL that appears after a?
character, if any.
URI
: The part of a web request that identifies a resource, for example,/images/daily-ad.jpg
.
BODY
: The part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. The request body immediately follows the request headers. Note that only the first8192
bytes of the request body are forwarded to AWS WAF for inspection. To allow or block requests based on the length of the body, you can create a size constraint set. For more information, see CreateSizeConstraintSet .
SINGLE_QUERY_ARG
: The parameter in the query string that you will inspect, such as UserName or SalesRegion . The maximum length forSINGLE_QUERY_ARG
is 30 characters.
ALL_QUERY_ARGS
: Similar toSINGLE_QUERY_ARG
, but rather than inspecting a single parameter, AWS WAF will inspect all parameters within the query for the value or regex pattern that you specify inTargetString
.Data -> (string)
When the value of
Type
isHEADER
, enter the name of the header that you want AWS WAF to search, for example,User-Agent
orReferer
. The name of the header is not case sensitive.When the value of
Type
isSINGLE_QUERY_ARG
, enter the name of the parameter that you want AWS WAF to search, for example,UserName
orSalesRegion
. The parameter name is not case sensitive.If the value of
Type
is any other value, omitData
.TextTransformation -> (string)
Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass AWS WAF. If you specify a transformation, AWS WAF performs the transformation on
FieldToMatch
before inspecting it for a match.You can only specify a single type of TextTransformation.
CMD_LINE
When you’re concerned that attackers are injecting an operating system command line command and using unusual formatting to disguise some or all of the command, use this option to perform the following transformations:
Delete the following characters: ” ‘ ^
Delete spaces before the following characters: / (
Replace the following characters with a space: , ;
Replace multiple spaces with one space
Convert uppercase letters (A-Z) to lowercase (a-z)
COMPRESS_WHITE_SPACE
Use this option to replace the following characters with a space character (decimal 32):
f, formfeed, decimal 12
t, tab, decimal 9
n, newline, decimal 10
r, carriage return, decimal 13
v, vertical tab, decimal 11
non-breaking space, decimal 160
COMPRESS_WHITE_SPACE
also replaces multiple spaces with one space.HTML_ENTITY_DECODE
Use this option to replace HTML-encoded characters with unencoded characters.
HTML_ENTITY_DECODE
performs the following operations:
Replaces
(ampersand)quot;
with"
Replaces
(ampersand)nbsp;
with a non-breaking space, decimal 160Replaces
(ampersand)lt;
with a “less than” symbolReplaces
(ampersand)gt;
with>
Replaces characters that are represented in hexadecimal format,
(ampersand)#xhhhh;
, with the corresponding charactersReplaces characters that are represented in decimal format,
(ampersand)#nnnn;
, with the corresponding charactersLOWERCASE
Use this option to convert uppercase letters (A-Z) to lowercase (a-z).
URL_DECODE
Use this option to decode a URL-encoded value.
NONE
Specify
NONE
if you don’t want to perform any text transformations.