aws_wafregional_xss_match_set
Provides a WAF Regional XSS Match Set Resource for use with Application Load Balancer.
Example Usage
resource "aws_wafregional_xss_match_set" "xss_match_set" { name = "xss_match_set" xss_match_tuple { text_transformation = "NONE" field_to_match { type = "URI" } } xss_match_tuple { text_transformation = "NONE" field_to_match { type = "QUERY_STRING" } } }
Argument Reference
The following arguments are supported:
-
name
- (Required) The name of the set -
xss_match_tuple
- (Optional) The parts of web requests that you want to inspect for cross-site scripting attacks.
Nested fields
xss_match_tuple
-
field_to_match
- (Required) Specifies where in a web request to look for cross-site scripting attacks. -
text_transformation
- (Required) Which text transformation, if any, to perform on the web request before inspecting the request for cross-site scripting attacks.
field_to_match
-
data
- (Optional) When the value oftype
isHEADER
, enter the name of the header that you want the WAF to search, for example,User-Agent
orReferer
. If the value oftype
is any other value, omitdata
. -
type
- (Required) The part of the web request that you want AWS WAF to search for a specified string. e.g.HEADER
orMETHOD
Attributes Reference
In addition to all arguments above, the following attributes are exported:
-
id
- The ID of the Regional WAF XSS Match Set.
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/aws/r/wafregional_xss_match_set.html