Skip to content

Commit ef10077

Browse files
author
AWS
committed
AWS WAFV2 Update: Added the regex match rule statement, for matching web requests against a single regular expression.
1 parent 6b44254 commit ef10077

File tree

2 files changed

+33
-0
lines changed

2 files changed

+33
-0
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS WAFV2",
4+
"contributor": "",
5+
"description": "Added the regex match rule statement, for matching web requests against a single regular expression."
6+
}

services/wafv2/src/main/resources/codegen-resources/service-2.json

Lines changed: 27 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3534,6 +3534,29 @@
35343534
},
35353535
"documentation":"<p>A single regular expression. This is used in a <a>RegexPatternSet</a>.</p>"
35363536
},
3537+
"RegexMatchStatement":{
3538+
"type":"structure",
3539+
"required":[
3540+
"RegexString",
3541+
"FieldToMatch",
3542+
"TextTransformations"
3543+
],
3544+
"members":{
3545+
"RegexString":{
3546+
"shape":"RegexPatternString",
3547+
"documentation":"<p>The string representing the regular expression.</p>"
3548+
},
3549+
"FieldToMatch":{
3550+
"shape":"FieldToMatch",
3551+
"documentation":"<p>The part of a web request that you want WAF to inspect. For more information, see <a>FieldToMatch</a>. </p>"
3552+
},
3553+
"TextTransformations":{
3554+
"shape":"TextTransformations",
3555+
"documentation":"<p>Text transformations eliminate some of the unusual formatting that attackers use in web requests in an effort to bypass detection. If you specify one or more transformations in a rule statement, WAF performs all transformations on the content of the request component identified by <code>FieldToMatch</code>, starting from the lowest priority setting, before inspecting the content for a match.</p>"
3556+
}
3557+
},
3558+
"documentation":"<p>A rule statement used to search web request components for a match against a single regular expression. </p>"
3559+
},
35373560
"RegexPatternSet":{
35383561
"type":"structure",
35393562
"members":{
@@ -4035,6 +4058,10 @@
40354058
"LabelMatchStatement":{
40364059
"shape":"LabelMatchStatement",
40374060
"documentation":"<p>A rule statement that defines a string match search against labels that have been added to the web request by rules that have already run in the web ACL. </p> <p>The label match statement provides the label or namespace string to search for. The label string can represent a part or all of the fully qualified label name that had been added to the web request. Fully qualified labels have a prefix, optional namespaces, and label name. The prefix identifies the rule group or web ACL context of the rule that added the label. If you do not provide the fully qualified name in your label match string, WAF performs the search for labels that were added in the same context as the label match statement. </p>"
4061+
},
4062+
"RegexMatchStatement":{
4063+
"shape":"RegexMatchStatement",
4064+
"documentation":"<p>A rule statement used to search web request components for a match against a single regular expression. </p>"
40384065
}
40394066
},
40404067
"documentation":"<p>The processing guidance for a <a>Rule</a>, used by WAF to determine whether a web request matches the rule. </p>"

0 commit comments

Comments
 (0)