Module Smaws_Client_WAF.CreateSqlInjectionMatchSet

val request : Smaws_Lib.Context.t -> create_sql_injection_match_set_request -> (create_sql_injection_match_set_response, [> Smaws_Lib.Protocols.AwsJson.error | `WAFDisallowedNameException of waf_disallowed_name_exception | `WAFInternalErrorException of waf_internal_error_exception | `WAFInvalidAccountException of waf_invalid_account_exception | `WAFInvalidParameterException of waf_invalid_parameter_exception | `WAFLimitsExceededException of waf_limits_exceeded_exception | `WAFStaleDataException of waf_stale_data_exception ]) Stdlib.result

This is AWS WAF Classic documentation. For more information, see AWS WAF Classic in the developer guide.

For the latest version of AWS WAF, use the AWS WAFV2 API and see the AWS WAF Developer Guide. With the latest version, AWS WAF has a single set of endpoints for regional and global use.

Creates a SqlInjectionMatchSet, which you use to allow, block, or count requests that contain snippets of SQL code in a specified part of web requests. AWS WAF searches for character sequences that are likely to be malicious strings.

To create and configure a SqlInjectionMatchSet, perform the following steps:

  1. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of a CreateSqlInjectionMatchSet request.
  2. Submit a CreateSqlInjectionMatchSet request.
  3. Use GetChangeToken to get the change token that you provide in the ChangeToken parameter of an UpdateSqlInjectionMatchSet request.
  4. Submit an UpdateSqlInjectionMatchSet request to specify the parts of web requests in which you want to allow, block, or count malicious SQL code.

For more information about how to use the AWS WAF API to allow or block HTTP requests, see the AWS WAF Developer Guide.