Class FieldToMatch
- java.lang.Object
-
- software.amazon.awssdk.services.wafv2.model.FieldToMatch
-
- All Implemented Interfaces:
Serializable,SdkPojo,ToCopyableBuilder<FieldToMatch.Builder,FieldToMatch>
@Generated("software.amazon.awssdk:codegen") public final class FieldToMatch extends Object implements SdkPojo, Serializable, ToCopyableBuilder<FieldToMatch.Builder,FieldToMatch>
Specifies a web request component to be used in a rule match statement or in a logging configuration.
-
In a rule statement, this is the part of the web request that you want WAF to inspect. Include the single
FieldToMatchtype that you want to inspect, with additional specifications as needed, according to the type. You specify a single request component inFieldToMatchfor each rule statement that requires it. To inspect more than one component of the web request, create a separate rule statement for each component.Example JSON for a
QueryStringfield to match:"FieldToMatch": { "QueryString": {} }Example JSON for a
Methodfield to match specification:"FieldToMatch": { "Method": { "Name": "DELETE" } } -
In a logging configuration, this is used in the
RedactedFieldsproperty to specify a field to redact from the logging records. For this use case, note the following:-
Even though all
FieldToMatchsettings are available, the only valid settings for field redaction areUriPath,QueryString,SingleHeader, andMethod. -
In this documentation, the descriptions of the individual fields talk about specifying the web request component to inspect, but for field redaction, you are specifying the component type to redact from the logs.
-
If you have request sampling enabled, the redacted fields configuration for logging has no impact on sampling. The only way to exclude fields from request sampling is by disabling sampling in the web ACL visibility configuration.
-
- See Also:
- Serialized Form
-
-
Nested Class Summary
Nested Classes Modifier and Type Class Description static interfaceFieldToMatch.Builder
-
Method Summary
All Methods Static Methods Instance Methods Concrete Methods Modifier and Type Method Description AllQueryArgumentsallQueryArguments()Inspect all query arguments.Bodybody()Inspect the request body as plain text.static FieldToMatch.Builderbuilder()Cookiescookies()Inspect the request cookies.booleanequals(Object obj)booleanequalsBySdkFields(Object obj)<T> Optional<T>getValueForField(String fieldName, Class<T> clazz)inthashCode()HeaderOrderheaderOrder()Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection.Headersheaders()Inspect the request headers.JA3Fingerprintja3Fingerprint()Available for use with Amazon CloudFront distributions and Application Load Balancers.JsonBodyjsonBody()Inspect the request body as JSON.Methodmethod()Inspect the HTTP method.QueryStringqueryString()Inspect the query string.Map<String,SdkField<?>>sdkFieldNameToField()List<SdkField<?>>sdkFields()static Class<? extends FieldToMatch.Builder>serializableBuilderClass()SingleHeadersingleHeader()Inspect a single header.SingleQueryArgumentsingleQueryArgument()Inspect a single query argument.FieldToMatch.BuildertoBuilder()StringtoString()Returns a string representation of this object.UriPathuriPath()Inspect the request URI path.-
Methods inherited from class java.lang.Object
clone, finalize, getClass, notify, notifyAll, wait, wait, wait
-
Methods inherited from interface software.amazon.awssdk.utils.builder.ToCopyableBuilder
copy
-
-
-
-
Method Detail
-
singleHeader
public final SingleHeader singleHeader()
Inspect a single header. Provide the name of the header to inspect, for example,
User-AgentorReferer. This setting isn't case sensitive.Example JSON:
"SingleHeader": { "Name": "haystack" }Alternately, you can filter and inspect all headers with the
HeadersFieldToMatchsetting.- Returns:
- Inspect a single header. Provide the name of the header to inspect, for example,
User-AgentorReferer. This setting isn't case sensitive.Example JSON:
"SingleHeader": { "Name": "haystack" }Alternately, you can filter and inspect all headers with the
HeadersFieldToMatchsetting.
-
singleQueryArgument
public final SingleQueryArgument singleQueryArgument()
Inspect a single query argument. Provide the name of the query argument to inspect, such as UserName or SalesRegion. The name can be up to 30 characters long and isn't case sensitive.
Example JSON:
"SingleQueryArgument": { "Name": "myArgument" }- Returns:
- Inspect a single query argument. Provide the name of the query argument to inspect, such as
UserName or SalesRegion. The name can be up to 30 characters long and isn't case sensitive.
Example JSON:
"SingleQueryArgument": { "Name": "myArgument" }
-
allQueryArguments
public final AllQueryArguments allQueryArguments()
Inspect all query arguments.
- Returns:
- Inspect all query arguments.
-
uriPath
public final UriPath uriPath()
Inspect the request URI path. This is the part of the web request that identifies a resource, for example,
/images/daily-ad.jpg.- Returns:
- Inspect the request URI path. This is the part of the web request that identifies a resource, for
example,
/images/daily-ad.jpg.
-
queryString
public final QueryString queryString()
Inspect the query string. This is the part of a URL that appears after a
?character, if any.- Returns:
- Inspect the query string. This is the part of a URL that appears after a
?character, if any.
-
body
public final Body body()
Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection.
-
For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
-
For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL
AssociationConfig, for additional processing fees.
For information about how to handle oversized request bodies, see the
Bodyobject configuration.- Returns:
- Inspect the request body as plain text. The request body immediately follows the request headers. This is
the part of a request that contains any additional data that you want to send to your web server as the
HTTP request body, such as data from a form.
WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection.
-
For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
-
For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL
AssociationConfig, for additional processing fees.
For information about how to handle oversized request bodies, see the
Bodyobject configuration. -
-
-
method
public final Method method()
Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
- Returns:
- Inspect the HTTP method. The method indicates the type of operation that the request is asking the origin to perform.
-
jsonBody
public final JsonBody jsonBody()
Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form.
WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection.
-
For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
-
For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL
AssociationConfig, for additional processing fees.
For information about how to handle oversized request bodies, see the
JsonBodyobject configuration.- Returns:
- Inspect the request body as JSON. The request body immediately follows the request headers. This is the
part of a request that contains any additional data that you want to send to your web server as the HTTP
request body, such as data from a form.
WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service only forwards the contents that are within the limit to WAF for inspection.
-
For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).
-
For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and you can increase the limit for each resource type in the web ACL
AssociationConfig, for additional processing fees.
For information about how to handle oversized request bodies, see the
JsonBodyobject configuration. -
-
-
headers
public final Headers headers()
Inspect the request headers. You must configure scope and pattern matching filters in the
Headersobject, to define the set of headers to and the parts of the headers that WAF inspects.Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the
Headersobject. WAF applies the pattern matching filters to the headers that it receives from the underlying host service.- Returns:
- Inspect the request headers. You must configure scope and pattern matching filters in the
Headersobject, to define the set of headers to and the parts of the headers that WAF inspects.Only the first 8 KB (8192 bytes) of a request's headers and only the first 200 headers are forwarded to WAF for inspection by the underlying host service. You must configure how to handle any oversize header content in the
Headersobject. WAF applies the pattern matching filters to the headers that it receives from the underlying host service.
-
cookies
public final Cookies cookies()
Inspect the request cookies. You must configure scope and pattern matching filters in the
Cookiesobject, to define the set of cookies and the parts of the cookies that WAF inspects.Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the
Cookiesobject. WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.- Returns:
- Inspect the request cookies. You must configure scope and pattern matching filters in the
Cookiesobject, to define the set of cookies and the parts of the cookies that WAF inspects.Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the
Cookiesobject. WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
-
headerOrder
public final HeaderOrder headerOrder()
Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection. WAF generates the string and then uses that as the field to match component in its inspection. WAF separates the header names in the string using colons and no added spaces, for example
host:user-agent:accept:authorization:referer.- Returns:
- Inspect a string containing the list of the request's header names, ordered as they appear in the web
request that WAF receives for inspection. WAF generates the string and then uses that as the field to
match component in its inspection. WAF separates the header names in the string using colons and no added
spaces, for example
host:user-agent:accept:authorization:referer.
-
ja3Fingerprint
public final JA3Fingerprint ja3Fingerprint()
Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information.
You can use this choice only with a string match
ByteMatchStatementwith thePositionalConstraintset toEXACTLY.You can obtain the JA3 fingerprint for client requests from the web ACL logs. If WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the WAF Developer Guide.
Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
- Returns:
- Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the
request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello
of an incoming request. This fingerprint serves as a unique identifier for the client's TLS
configuration. WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello
information for the calculation. Almost all web requests include this information.
You can use this choice only with a string match
ByteMatchStatementwith thePositionalConstraintset toEXACTLY.You can obtain the JA3 fingerprint for client requests from the web ACL logs. If WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the WAF Developer Guide.
Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
-
toBuilder
public FieldToMatch.Builder toBuilder()
- Specified by:
toBuilderin interfaceToCopyableBuilder<FieldToMatch.Builder,FieldToMatch>
-
builder
public static FieldToMatch.Builder builder()
-
serializableBuilderClass
public static Class<? extends FieldToMatch.Builder> serializableBuilderClass()
-
equalsBySdkFields
public final boolean equalsBySdkFields(Object obj)
- Specified by:
equalsBySdkFieldsin interfaceSdkPojo
-
toString
public final String toString()
Returns a string representation of this object. This is useful for testing and debugging. Sensitive data will be redacted from this string using a placeholder value.
-
sdkFieldNameToField
public final Map<String,SdkField<?>> sdkFieldNameToField()
- Specified by:
sdkFieldNameToFieldin interfaceSdkPojo
-
-