aws-sdk-wafv2 1.110.0 → 1.111.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-wafv2/client.rb +98 -1
- data/lib/aws-sdk-wafv2/client_api.rb +26 -0
- data/lib/aws-sdk-wafv2/types.rb +314 -13
- data/lib/aws-sdk-wafv2.rb +1 -1
- data/sig/client.rbs +76 -0
- data/sig/types.rbs +28 -1
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz: '
|
3
|
+
metadata.gz: 16c4a613a2811c0ef62664488a672cdf019d94c82e0c78c3296f66509d18373d
|
4
|
+
data.tar.gz: '09450619c095fb4dfedd5e4b7a67bb93f17570abc3885ef348e7cd1822f07032'
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 3a6b7c59627c5c228a54d884acb476829057cfd9777e5778fead4d1e690ac32727014a238545636f59645c9936590cbe4980d5114b2c969d6f8b76683ee445ee
|
7
|
+
data.tar.gz: 6d5a464ff5b9f0ef250b98bfa65e67e36cacae276c73ebfb6f38cb33416f2f8eeac0b43233328a0fd044d55b736e596c4ea30f8dc892134dc769d4687c33f84a
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.111.0 (2025-06-11)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - WAF now provides two DDoS protection options: resource-level monitoring for Application Load Balancers and the AWSManagedRulesAntiDDoSRuleSet managed rule group for CloudFront distributions.
|
8
|
+
|
4
9
|
1.110.0 (2025-06-05)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.111.0
|
data/lib/aws-sdk-wafv2/client.rb
CHANGED
@@ -1253,6 +1253,20 @@ module Aws::WAFV2
|
|
1253
1253
|
# },
|
1254
1254
|
# enable_regex_in_path: false,
|
1255
1255
|
# },
|
1256
|
+
# aws_managed_rules_anti_d_do_s_rule_set: {
|
1257
|
+
# client_side_action_config: { # required
|
1258
|
+
# challenge: { # required
|
1259
|
+
# usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
|
1260
|
+
# sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
|
1261
|
+
# exempt_uri_regular_expressions: [
|
1262
|
+
# {
|
1263
|
+
# regex_string: "RegexPatternString",
|
1264
|
+
# },
|
1265
|
+
# ],
|
1266
|
+
# },
|
1267
|
+
# },
|
1268
|
+
# sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
|
1269
|
+
# },
|
1256
1270
|
# },
|
1257
1271
|
# ],
|
1258
1272
|
# rule_action_overrides: [
|
@@ -2471,6 +2485,20 @@ module Aws::WAFV2
|
|
2471
2485
|
# },
|
2472
2486
|
# enable_regex_in_path: false,
|
2473
2487
|
# },
|
2488
|
+
# aws_managed_rules_anti_d_do_s_rule_set: {
|
2489
|
+
# client_side_action_config: { # required
|
2490
|
+
# challenge: { # required
|
2491
|
+
# usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
|
2492
|
+
# sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
|
2493
|
+
# exempt_uri_regular_expressions: [
|
2494
|
+
# {
|
2495
|
+
# regex_string: "RegexPatternString",
|
2496
|
+
# },
|
2497
|
+
# ],
|
2498
|
+
# },
|
2499
|
+
# },
|
2500
|
+
# sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
|
2501
|
+
# },
|
2474
2502
|
# },
|
2475
2503
|
# ],
|
2476
2504
|
# rule_action_overrides: [
|
@@ -2871,6 +2899,14 @@ module Aws::WAFV2
|
|
2871
2899
|
#
|
2872
2900
|
# [1]: http://aws.amazon.com/waf/pricing/
|
2873
2901
|
#
|
2902
|
+
# @option params [Types::OnSourceDDoSProtectionConfig] :on_source_d_do_s_protection_config
|
2903
|
+
# Specifies the type of DDoS protection to apply to web request data for
|
2904
|
+
# a web ACL. For most scenarios, it is recommended to use the default
|
2905
|
+
# protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is associated with
|
2906
|
+
# multiple Application Load Balancers, the changes you make to DDoS
|
2907
|
+
# protection in that web ACL will apply to all associated Application
|
2908
|
+
# Load Balancers.
|
2909
|
+
#
|
2874
2910
|
# @return [Types::CreateWebACLResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2875
2911
|
#
|
2876
2912
|
# * {Types::CreateWebACLResponse#summary #summary} => Types::WebACLSummary
|
@@ -3544,6 +3580,20 @@ module Aws::WAFV2
|
|
3544
3580
|
# },
|
3545
3581
|
# enable_regex_in_path: false,
|
3546
3582
|
# },
|
3583
|
+
# aws_managed_rules_anti_d_do_s_rule_set: {
|
3584
|
+
# client_side_action_config: { # required
|
3585
|
+
# challenge: { # required
|
3586
|
+
# usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
|
3587
|
+
# sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
|
3588
|
+
# exempt_uri_regular_expressions: [
|
3589
|
+
# {
|
3590
|
+
# regex_string: "RegexPatternString",
|
3591
|
+
# },
|
3592
|
+
# ],
|
3593
|
+
# },
|
3594
|
+
# },
|
3595
|
+
# sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
|
3596
|
+
# },
|
3547
3597
|
# },
|
3548
3598
|
# ],
|
3549
3599
|
# rule_action_overrides: [
|
@@ -3826,6 +3876,9 @@ module Aws::WAFV2
|
|
3826
3876
|
# },
|
3827
3877
|
# },
|
3828
3878
|
# },
|
3879
|
+
# on_source_d_do_s_protection_config: {
|
3880
|
+
# alb_low_reputation_mode: "ACTIVE_UNDER_DDOS", # required, accepts ACTIVE_UNDER_DDOS, ALWAYS_ON
|
3881
|
+
# },
|
3829
3882
|
# })
|
3830
3883
|
#
|
3831
3884
|
# @example Response structure
|
@@ -5358,6 +5411,11 @@ module Aws::WAFV2
|
|
5358
5411
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_acfp_rule_set.response_inspection.json.failure_values #=> Array
|
5359
5412
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_acfp_rule_set.response_inspection.json.failure_values[0] #=> String
|
5360
5413
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_acfp_rule_set.enable_regex_in_path #=> Boolean
|
5414
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.usage_of_action #=> String, one of "ENABLED", "DISABLED"
|
5415
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.sensitivity #=> String, one of "LOW", "MEDIUM", "HIGH"
|
5416
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.exempt_uri_regular_expressions #=> Array
|
5417
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.exempt_uri_regular_expressions[0].regex_string #=> String
|
5418
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.sensitivity_to_block #=> String, one of "LOW", "MEDIUM", "HIGH"
|
5361
5419
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
5362
5420
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
5363
5421
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -8053,6 +8111,20 @@ module Aws::WAFV2
|
|
8053
8111
|
# },
|
8054
8112
|
# enable_regex_in_path: false,
|
8055
8113
|
# },
|
8114
|
+
# aws_managed_rules_anti_d_do_s_rule_set: {
|
8115
|
+
# client_side_action_config: { # required
|
8116
|
+
# challenge: { # required
|
8117
|
+
# usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
|
8118
|
+
# sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
|
8119
|
+
# exempt_uri_regular_expressions: [
|
8120
|
+
# {
|
8121
|
+
# regex_string: "RegexPatternString",
|
8122
|
+
# },
|
8123
|
+
# ],
|
8124
|
+
# },
|
8125
|
+
# },
|
8126
|
+
# sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
|
8127
|
+
# },
|
8056
8128
|
# },
|
8057
8129
|
# ],
|
8058
8130
|
# rule_action_overrides: [
|
@@ -8497,6 +8569,14 @@ module Aws::WAFV2
|
|
8497
8569
|
#
|
8498
8570
|
# [1]: http://aws.amazon.com/waf/pricing/
|
8499
8571
|
#
|
8572
|
+
# @option params [Types::OnSourceDDoSProtectionConfig] :on_source_d_do_s_protection_config
|
8573
|
+
# Specifies the type of DDoS protection to apply to web request data for
|
8574
|
+
# a web ACL. For most scenarios, it is recommended to use the default
|
8575
|
+
# protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is associated with
|
8576
|
+
# multiple Application Load Balancers, the changes you make to DDoS
|
8577
|
+
# protection in that web ACL will apply to all associated Application
|
8578
|
+
# Load Balancers.
|
8579
|
+
#
|
8500
8580
|
# @return [Types::UpdateWebACLResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
8501
8581
|
#
|
8502
8582
|
# * {Types::UpdateWebACLResponse#next_lock_token #next_lock_token} => String
|
@@ -9171,6 +9251,20 @@ module Aws::WAFV2
|
|
9171
9251
|
# },
|
9172
9252
|
# enable_regex_in_path: false,
|
9173
9253
|
# },
|
9254
|
+
# aws_managed_rules_anti_d_do_s_rule_set: {
|
9255
|
+
# client_side_action_config: { # required
|
9256
|
+
# challenge: { # required
|
9257
|
+
# usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
|
9258
|
+
# sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
|
9259
|
+
# exempt_uri_regular_expressions: [
|
9260
|
+
# {
|
9261
|
+
# regex_string: "RegexPatternString",
|
9262
|
+
# },
|
9263
|
+
# ],
|
9264
|
+
# },
|
9265
|
+
# },
|
9266
|
+
# sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
|
9267
|
+
# },
|
9174
9268
|
# },
|
9175
9269
|
# ],
|
9176
9270
|
# rule_action_overrides: [
|
@@ -9448,6 +9542,9 @@ module Aws::WAFV2
|
|
9448
9542
|
# },
|
9449
9543
|
# },
|
9450
9544
|
# },
|
9545
|
+
# on_source_d_do_s_protection_config: {
|
9546
|
+
# alb_low_reputation_mode: "ACTIVE_UNDER_DDOS", # required, accepts ACTIVE_UNDER_DDOS, ALWAYS_ON
|
9547
|
+
# },
|
9451
9548
|
# })
|
9452
9549
|
#
|
9453
9550
|
# @example Response structure
|
@@ -9481,7 +9578,7 @@ module Aws::WAFV2
|
|
9481
9578
|
tracer: tracer
|
9482
9579
|
)
|
9483
9580
|
context[:gem_name] = 'aws-sdk-wafv2'
|
9484
|
-
context[:gem_version] = '1.
|
9581
|
+
context[:gem_version] = '1.111.0'
|
9485
9582
|
Seahorse::Client::Request.new(handlers, context)
|
9486
9583
|
end
|
9487
9584
|
|
@@ -22,6 +22,7 @@ module Aws::WAFV2
|
|
22
22
|
ASN = Shapes::IntegerShape.new(name: 'ASN')
|
23
23
|
AWSManagedRulesACFPRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesACFPRuleSet')
|
24
24
|
AWSManagedRulesATPRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesATPRuleSet')
|
25
|
+
AWSManagedRulesAntiDDoSRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesAntiDDoSRuleSet')
|
25
26
|
AWSManagedRulesBotControlRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesBotControlRuleSet')
|
26
27
|
Action = Shapes::StringShape.new(name: 'Action')
|
27
28
|
ActionCondition = Shapes::StructureShape.new(name: 'ActionCondition')
|
@@ -52,6 +53,8 @@ module Aws::WAFV2
|
|
52
53
|
ChallengeResponse = Shapes::StructureShape.new(name: 'ChallengeResponse')
|
53
54
|
CheckCapacityRequest = Shapes::StructureShape.new(name: 'CheckCapacityRequest')
|
54
55
|
CheckCapacityResponse = Shapes::StructureShape.new(name: 'CheckCapacityResponse')
|
56
|
+
ClientSideAction = Shapes::StructureShape.new(name: 'ClientSideAction')
|
57
|
+
ClientSideActionConfig = Shapes::StructureShape.new(name: 'ClientSideActionConfig')
|
55
58
|
ComparisonOperator = Shapes::StringShape.new(name: 'ComparisonOperator')
|
56
59
|
Condition = Shapes::StructureShape.new(name: 'Condition')
|
57
60
|
Conditions = Shapes::ListShape.new(name: 'Conditions')
|
@@ -242,6 +245,7 @@ module Aws::WAFV2
|
|
242
245
|
LoggingConfigurations = Shapes::ListShape.new(name: 'LoggingConfigurations')
|
243
246
|
LoggingFilter = Shapes::StructureShape.new(name: 'LoggingFilter')
|
244
247
|
LoginPathString = Shapes::StringShape.new(name: 'LoginPathString')
|
248
|
+
LowReputationMode = Shapes::StringShape.new(name: 'LowReputationMode')
|
245
249
|
ManagedProductDescriptor = Shapes::StructureShape.new(name: 'ManagedProductDescriptor')
|
246
250
|
ManagedProductDescriptors = Shapes::ListShape.new(name: 'ManagedProductDescriptors')
|
247
251
|
ManagedRuleGroupConfig = Shapes::StructureShape.new(name: 'ManagedRuleGroupConfig')
|
@@ -262,6 +266,7 @@ module Aws::WAFV2
|
|
262
266
|
NextMarker = Shapes::StringShape.new(name: 'NextMarker')
|
263
267
|
NoneAction = Shapes::StructureShape.new(name: 'NoneAction')
|
264
268
|
NotStatement = Shapes::StructureShape.new(name: 'NotStatement')
|
269
|
+
OnSourceDDoSProtectionConfig = Shapes::StructureShape.new(name: 'OnSourceDDoSProtectionConfig')
|
265
270
|
OrStatement = Shapes::StructureShape.new(name: 'OrStatement')
|
266
271
|
OutputUrl = Shapes::StringShape.new(name: 'OutputUrl')
|
267
272
|
OverrideAction = Shapes::StructureShape.new(name: 'OverrideAction')
|
@@ -363,6 +368,7 @@ module Aws::WAFV2
|
|
363
368
|
Scope = Shapes::StringShape.new(name: 'Scope')
|
364
369
|
SearchString = Shapes::BlobShape.new(name: 'SearchString')
|
365
370
|
SensitivityLevel = Shapes::StringShape.new(name: 'SensitivityLevel')
|
371
|
+
SensitivityToAct = Shapes::StringShape.new(name: 'SensitivityToAct')
|
366
372
|
SingleCookieName = Shapes::StringShape.new(name: 'SingleCookieName')
|
367
373
|
SingleHeader = Shapes::StructureShape.new(name: 'SingleHeader')
|
368
374
|
SingleQueryArgument = Shapes::StructureShape.new(name: 'SingleQueryArgument')
|
@@ -410,6 +416,7 @@ module Aws::WAFV2
|
|
410
416
|
UpdateWebACLResponse = Shapes::StructureShape.new(name: 'UpdateWebACLResponse')
|
411
417
|
UriFragment = Shapes::StructureShape.new(name: 'UriFragment')
|
412
418
|
UriPath = Shapes::StructureShape.new(name: 'UriPath')
|
419
|
+
UsageOfAction = Shapes::StringShape.new(name: 'UsageOfAction')
|
413
420
|
UsernameField = Shapes::StructureShape.new(name: 'UsernameField')
|
414
421
|
VendorName = Shapes::StringShape.new(name: 'VendorName')
|
415
422
|
VersionKeyString = Shapes::StringShape.new(name: 'VersionKeyString')
|
@@ -463,6 +470,10 @@ module Aws::WAFV2
|
|
463
470
|
AWSManagedRulesATPRuleSet.add_member(:enable_regex_in_path, Shapes::ShapeRef.new(shape: Boolean, location_name: "EnableRegexInPath"))
|
464
471
|
AWSManagedRulesATPRuleSet.struct_class = Types::AWSManagedRulesATPRuleSet
|
465
472
|
|
473
|
+
AWSManagedRulesAntiDDoSRuleSet.add_member(:client_side_action_config, Shapes::ShapeRef.new(shape: ClientSideActionConfig, required: true, location_name: "ClientSideActionConfig"))
|
474
|
+
AWSManagedRulesAntiDDoSRuleSet.add_member(:sensitivity_to_block, Shapes::ShapeRef.new(shape: SensitivityToAct, location_name: "SensitivityToBlock"))
|
475
|
+
AWSManagedRulesAntiDDoSRuleSet.struct_class = Types::AWSManagedRulesAntiDDoSRuleSet
|
476
|
+
|
466
477
|
AWSManagedRulesBotControlRuleSet.add_member(:inspection_level, Shapes::ShapeRef.new(shape: InspectionLevel, required: true, location_name: "InspectionLevel"))
|
467
478
|
AWSManagedRulesBotControlRuleSet.add_member(:enable_machine_learning, Shapes::ShapeRef.new(shape: EnableMachineLearning, location_name: "EnableMachineLearning"))
|
468
479
|
AWSManagedRulesBotControlRuleSet.struct_class = Types::AWSManagedRulesBotControlRuleSet
|
@@ -541,6 +552,14 @@ module Aws::WAFV2
|
|
541
552
|
CheckCapacityResponse.add_member(:capacity, Shapes::ShapeRef.new(shape: ConsumedCapacity, location_name: "Capacity"))
|
542
553
|
CheckCapacityResponse.struct_class = Types::CheckCapacityResponse
|
543
554
|
|
555
|
+
ClientSideAction.add_member(:usage_of_action, Shapes::ShapeRef.new(shape: UsageOfAction, required: true, location_name: "UsageOfAction"))
|
556
|
+
ClientSideAction.add_member(:sensitivity, Shapes::ShapeRef.new(shape: SensitivityToAct, location_name: "Sensitivity"))
|
557
|
+
ClientSideAction.add_member(:exempt_uri_regular_expressions, Shapes::ShapeRef.new(shape: RegularExpressionList, location_name: "ExemptUriRegularExpressions"))
|
558
|
+
ClientSideAction.struct_class = Types::ClientSideAction
|
559
|
+
|
560
|
+
ClientSideActionConfig.add_member(:challenge, Shapes::ShapeRef.new(shape: ClientSideAction, required: true, location_name: "Challenge"))
|
561
|
+
ClientSideActionConfig.struct_class = Types::ClientSideActionConfig
|
562
|
+
|
544
563
|
Condition.add_member(:action_condition, Shapes::ShapeRef.new(shape: ActionCondition, location_name: "ActionCondition"))
|
545
564
|
Condition.add_member(:label_name_condition, Shapes::ShapeRef.new(shape: LabelNameCondition, location_name: "LabelNameCondition"))
|
546
565
|
Condition.struct_class = Types::Condition
|
@@ -618,6 +637,7 @@ module Aws::WAFV2
|
|
618
637
|
CreateWebACLRequest.add_member(:challenge_config, Shapes::ShapeRef.new(shape: ChallengeConfig, location_name: "ChallengeConfig"))
|
619
638
|
CreateWebACLRequest.add_member(:token_domains, Shapes::ShapeRef.new(shape: TokenDomains, location_name: "TokenDomains"))
|
620
639
|
CreateWebACLRequest.add_member(:association_config, Shapes::ShapeRef.new(shape: AssociationConfig, location_name: "AssociationConfig"))
|
640
|
+
CreateWebACLRequest.add_member(:on_source_d_do_s_protection_config, Shapes::ShapeRef.new(shape: OnSourceDDoSProtectionConfig, location_name: "OnSourceDDoSProtectionConfig"))
|
621
641
|
CreateWebACLRequest.struct_class = Types::CreateWebACLRequest
|
622
642
|
|
623
643
|
CreateWebACLResponse.add_member(:summary, Shapes::ShapeRef.new(shape: WebACLSummary, location_name: "Summary"))
|
@@ -1163,6 +1183,7 @@ module Aws::WAFV2
|
|
1163
1183
|
ManagedRuleGroupConfig.add_member(:aws_managed_rules_bot_control_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesBotControlRuleSet, location_name: "AWSManagedRulesBotControlRuleSet"))
|
1164
1184
|
ManagedRuleGroupConfig.add_member(:aws_managed_rules_atp_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesATPRuleSet, location_name: "AWSManagedRulesATPRuleSet"))
|
1165
1185
|
ManagedRuleGroupConfig.add_member(:aws_managed_rules_acfp_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesACFPRuleSet, location_name: "AWSManagedRulesACFPRuleSet"))
|
1186
|
+
ManagedRuleGroupConfig.add_member(:aws_managed_rules_anti_d_do_s_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesAntiDDoSRuleSet, location_name: "AWSManagedRulesAntiDDoSRuleSet"))
|
1166
1187
|
ManagedRuleGroupConfig.struct_class = Types::ManagedRuleGroupConfig
|
1167
1188
|
|
1168
1189
|
ManagedRuleGroupConfigs.member = Shapes::ShapeRef.new(shape: ManagedRuleGroupConfig)
|
@@ -1230,6 +1251,9 @@ module Aws::WAFV2
|
|
1230
1251
|
NotStatement.add_member(:statement, Shapes::ShapeRef.new(shape: Statement, required: true, location_name: "Statement"))
|
1231
1252
|
NotStatement.struct_class = Types::NotStatement
|
1232
1253
|
|
1254
|
+
OnSourceDDoSProtectionConfig.add_member(:alb_low_reputation_mode, Shapes::ShapeRef.new(shape: LowReputationMode, required: true, location_name: "ALBLowReputationMode"))
|
1255
|
+
OnSourceDDoSProtectionConfig.struct_class = Types::OnSourceDDoSProtectionConfig
|
1256
|
+
|
1233
1257
|
OrStatement.add_member(:statements, Shapes::ShapeRef.new(shape: Statements, required: true, location_name: "Statements"))
|
1234
1258
|
OrStatement.struct_class = Types::OrStatement
|
1235
1259
|
|
@@ -1645,6 +1669,7 @@ module Aws::WAFV2
|
|
1645
1669
|
UpdateWebACLRequest.add_member(:challenge_config, Shapes::ShapeRef.new(shape: ChallengeConfig, location_name: "ChallengeConfig"))
|
1646
1670
|
UpdateWebACLRequest.add_member(:token_domains, Shapes::ShapeRef.new(shape: TokenDomains, location_name: "TokenDomains"))
|
1647
1671
|
UpdateWebACLRequest.add_member(:association_config, Shapes::ShapeRef.new(shape: AssociationConfig, location_name: "AssociationConfig"))
|
1672
|
+
UpdateWebACLRequest.add_member(:on_source_d_do_s_protection_config, Shapes::ShapeRef.new(shape: OnSourceDDoSProtectionConfig, location_name: "OnSourceDDoSProtectionConfig"))
|
1648
1673
|
UpdateWebACLRequest.struct_class = Types::UpdateWebACLRequest
|
1649
1674
|
|
1650
1675
|
UpdateWebACLResponse.add_member(:next_lock_token, Shapes::ShapeRef.new(shape: LockToken, location_name: "NextLockToken"))
|
@@ -1750,6 +1775,7 @@ module Aws::WAFV2
|
|
1750
1775
|
WebACL.add_member(:token_domains, Shapes::ShapeRef.new(shape: TokenDomains, location_name: "TokenDomains"))
|
1751
1776
|
WebACL.add_member(:association_config, Shapes::ShapeRef.new(shape: AssociationConfig, location_name: "AssociationConfig"))
|
1752
1777
|
WebACL.add_member(:retrofitted_by_firewall_manager, Shapes::ShapeRef.new(shape: Boolean, location_name: "RetrofittedByFirewallManager"))
|
1778
|
+
WebACL.add_member(:on_source_d_do_s_protection_config, Shapes::ShapeRef.new(shape: OnSourceDDoSProtectionConfig, location_name: "OnSourceDDoSProtectionConfig"))
|
1753
1779
|
WebACL.struct_class = Types::WebACL
|
1754
1780
|
|
1755
1781
|
WebACLSummaries.member = Shapes::ShapeRef.new(shape: WebACLSummary)
|
data/lib/aws-sdk-wafv2/types.rb
CHANGED
@@ -55,6 +55,16 @@ module Aws::WAFV2
|
|
55
55
|
# rule group, `AWSManagedRulesACFPRuleSet`. This configuration is used
|
56
56
|
# in `ManagedRuleGroupConfig`.
|
57
57
|
#
|
58
|
+
# For additional information about this and the other intelligent threat
|
59
|
+
# mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
|
60
|
+
# and [Amazon Web Services Managed Rules rule groups list][2] in the
|
61
|
+
# *WAF Developer Guide*.
|
62
|
+
#
|
63
|
+
#
|
64
|
+
#
|
65
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
|
66
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
|
67
|
+
#
|
58
68
|
# @!attribute [rw] creation_path
|
59
69
|
# The path of the account creation endpoint for your application. This
|
60
70
|
# is the page on your website that accepts the completed registration
|
@@ -131,6 +141,16 @@ module Aws::WAFV2
|
|
131
141
|
# group, `AWSManagedRulesATPRuleSet`. This configuration is used in
|
132
142
|
# `ManagedRuleGroupConfig`.
|
133
143
|
#
|
144
|
+
# For additional information about this and the other intelligent threat
|
145
|
+
# mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
|
146
|
+
# and [Amazon Web Services Managed Rules rule groups list][2] in the
|
147
|
+
# *WAF Developer Guide*.
|
148
|
+
#
|
149
|
+
#
|
150
|
+
#
|
151
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
|
152
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
|
153
|
+
#
|
134
154
|
# @!attribute [rw] login_path
|
135
155
|
# The path of the login endpoint for your application. For example,
|
136
156
|
# for the URL `https://example.com/web/login`, you would provide the
|
@@ -181,10 +201,75 @@ module Aws::WAFV2
|
|
181
201
|
include Aws::Structure
|
182
202
|
end
|
183
203
|
|
204
|
+
# Configures the use of the anti-DDoS managed rule group,
|
205
|
+
# `AWSManagedRulesAntiDDoSRuleSet`. This configuration is used in
|
206
|
+
# `ManagedRuleGroupConfig`.
|
207
|
+
#
|
208
|
+
# The configuration that you provide here determines whether and how the
|
209
|
+
# rules in the rule group are used.
|
210
|
+
#
|
211
|
+
# For additional information about this and the other intelligent threat
|
212
|
+
# mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
|
213
|
+
# and [Amazon Web Services Managed Rules rule groups list][2] in the
|
214
|
+
# *WAF Developer Guide*.
|
215
|
+
#
|
216
|
+
#
|
217
|
+
#
|
218
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
|
219
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
|
220
|
+
#
|
221
|
+
# @!attribute [rw] client_side_action_config
|
222
|
+
# Configures the request handling that's applied by the managed rule
|
223
|
+
# group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`
|
224
|
+
# during a distributed denial of service (DDoS) attack.
|
225
|
+
# @return [Types::ClientSideActionConfig]
|
226
|
+
#
|
227
|
+
# @!attribute [rw] sensitivity_to_block
|
228
|
+
# The sensitivity that the rule group rule `DDoSRequests` uses when
|
229
|
+
# matching against the DDoS suspicion labeling on a request. The
|
230
|
+
# managed rule group adds the labeling during DDoS events, before the
|
231
|
+
# `DDoSRequests` rule runs.
|
232
|
+
#
|
233
|
+
# The higher the sensitivity, the more levels of labeling that the
|
234
|
+
# rule matches:
|
235
|
+
#
|
236
|
+
# * Low sensitivity is less sensitive, causing the rule to match only
|
237
|
+
# on the most likely participants in an attack, which are the
|
238
|
+
# requests with the high suspicion label
|
239
|
+
# `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request`.
|
240
|
+
#
|
241
|
+
# * Medium sensitivity causes the rule to match on the medium and high
|
242
|
+
# suspicion labels.
|
243
|
+
#
|
244
|
+
# * High sensitivity causes the rule to match on all of the suspicion
|
245
|
+
# labels: low, medium, and high.
|
246
|
+
#
|
247
|
+
# Default: `LOW`
|
248
|
+
# @return [String]
|
249
|
+
#
|
250
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/AWSManagedRulesAntiDDoSRuleSet AWS API Documentation
|
251
|
+
#
|
252
|
+
class AWSManagedRulesAntiDDoSRuleSet < Struct.new(
|
253
|
+
:client_side_action_config,
|
254
|
+
:sensitivity_to_block)
|
255
|
+
SENSITIVE = []
|
256
|
+
include Aws::Structure
|
257
|
+
end
|
258
|
+
|
184
259
|
# Details for your use of the Bot Control managed rule group,
|
185
260
|
# `AWSManagedRulesBotControlRuleSet`. This configuration is used in
|
186
261
|
# `ManagedRuleGroupConfig`.
|
187
262
|
#
|
263
|
+
# For additional information about this and the other intelligent threat
|
264
|
+
# mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
|
265
|
+
# and [Amazon Web Services Managed Rules rule groups list][2] in the
|
266
|
+
# *WAF Developer Guide*.
|
267
|
+
#
|
268
|
+
#
|
269
|
+
#
|
270
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
|
271
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
|
272
|
+
#
|
188
273
|
# @!attribute [rw] inspection_level
|
189
274
|
# The inspection level to use for the Bot Control rule group. The
|
190
275
|
# common level is the least expensive. The targeted level includes all
|
@@ -953,6 +1038,135 @@ module Aws::WAFV2
|
|
953
1038
|
include Aws::Structure
|
954
1039
|
end
|
955
1040
|
|
1041
|
+
# This is part of the `AWSManagedRulesAntiDDoSRuleSet`
|
1042
|
+
# `ClientSideActionConfig` configuration in `ManagedRuleGroupConfig`.
|
1043
|
+
#
|
1044
|
+
# @!attribute [rw] usage_of_action
|
1045
|
+
# Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules
|
1046
|
+
# `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule
|
1047
|
+
# group evaluation and the related label
|
1048
|
+
# `awswaf:managed:aws:anti-ddos:challengeable-request`.
|
1049
|
+
#
|
1050
|
+
# * If usage is enabled:
|
1051
|
+
#
|
1052
|
+
# * The managed rule group adds the label
|
1053
|
+
# `awswaf:managed:aws:anti-ddos:challengeable-request` to any web
|
1054
|
+
# request whose URL does *NOT* match the regular expressions
|
1055
|
+
# provided in the `ClientSideAction` setting
|
1056
|
+
# `ExemptUriRegularExpressions`.
|
1057
|
+
#
|
1058
|
+
# * The two rules are evaluated against web requests for protected
|
1059
|
+
# resources that are experiencing a DDoS attack. The two rules
|
1060
|
+
# only apply their action to matching requests that have the label
|
1061
|
+
# `awswaf:managed:aws:anti-ddos:challengeable-request`.
|
1062
|
+
# * If usage is disabled:
|
1063
|
+
#
|
1064
|
+
# * The managed rule group doesn't add the label
|
1065
|
+
# `awswaf:managed:aws:anti-ddos:challengeable-request` to any web
|
1066
|
+
# requests.
|
1067
|
+
#
|
1068
|
+
# * The two rules are not evaluated.
|
1069
|
+
#
|
1070
|
+
# * None of the other `ClientSideAction` settings have any effect.
|
1071
|
+
#
|
1072
|
+
# <note markdown="1"> This setting only enables or disables the use of the two anti-DDOS
|
1073
|
+
# rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the
|
1074
|
+
# anti-DDoS managed rule group.
|
1075
|
+
#
|
1076
|
+
# This setting doesn't alter the action setting in the two rules. To
|
1077
|
+
# override the actions used by the rules `ChallengeAllDuringEvent` and
|
1078
|
+
# `ChallengeDDoSRequests`, enable this setting, and then override the
|
1079
|
+
# rule actions in the usual way, in your managed rule group
|
1080
|
+
# configuration.
|
1081
|
+
#
|
1082
|
+
# </note>
|
1083
|
+
# @return [String]
|
1084
|
+
#
|
1085
|
+
# @!attribute [rw] sensitivity
|
1086
|
+
# The sensitivity that the rule group rule `ChallengeDDoSRequests`
|
1087
|
+
# uses when matching against the DDoS suspicion labeling on a request.
|
1088
|
+
# The managed rule group adds the labeling during DDoS events, before
|
1089
|
+
# the `ChallengeDDoSRequests` rule runs.
|
1090
|
+
#
|
1091
|
+
# The higher the sensitivity, the more levels of labeling that the
|
1092
|
+
# rule matches:
|
1093
|
+
#
|
1094
|
+
# * Low sensitivity is less sensitive, causing the rule to match only
|
1095
|
+
# on the most likely participants in an attack, which are the
|
1096
|
+
# requests with the high suspicion label
|
1097
|
+
# `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request`.
|
1098
|
+
#
|
1099
|
+
# * Medium sensitivity causes the rule to match on the medium and high
|
1100
|
+
# suspicion labels.
|
1101
|
+
#
|
1102
|
+
# * High sensitivity causes the rule to match on all of the suspicion
|
1103
|
+
# labels: low, medium, and high.
|
1104
|
+
#
|
1105
|
+
# Default: `HIGH`
|
1106
|
+
# @return [String]
|
1107
|
+
#
|
1108
|
+
# @!attribute [rw] exempt_uri_regular_expressions
|
1109
|
+
# The regular expression to match against the web request URI, used to
|
1110
|
+
# identify requests that can't handle a silent browser challenge.
|
1111
|
+
# When the `ClientSideAction` setting `UsageOfAction` is enabled, the
|
1112
|
+
# managed rule group uses this setting to determine which requests to
|
1113
|
+
# label with `awswaf:managed:aws:anti-ddos:challengeable-request`. If
|
1114
|
+
# `UsageOfAction` is disabled, this setting has no effect and the
|
1115
|
+
# managed rule group doesn't add the label to any requests.
|
1116
|
+
#
|
1117
|
+
# The anti-DDoS managed rule group doesn't evaluate the rules
|
1118
|
+
# `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web
|
1119
|
+
# requests whose URIs match this regex. This is true regardless of
|
1120
|
+
# whether you override the rule action for either of the rules in your
|
1121
|
+
# web ACL configuration.
|
1122
|
+
#
|
1123
|
+
# Amazon Web Services recommends using a regular expression.
|
1124
|
+
#
|
1125
|
+
# This setting is required if `UsageOfAction` is set to `ENABLED`. If
|
1126
|
+
# required, you can provide between 1 and 5 regex objects in the array
|
1127
|
+
# of settings.
|
1128
|
+
#
|
1129
|
+
# Amazon Web Services recommends starting with the following setting.
|
1130
|
+
# Review and update it for your application's needs:
|
1131
|
+
#
|
1132
|
+
# `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
|
1133
|
+
# @return [Array<Types::Regex>]
|
1134
|
+
#
|
1135
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ClientSideAction AWS API Documentation
|
1136
|
+
#
|
1137
|
+
class ClientSideAction < Struct.new(
|
1138
|
+
:usage_of_action,
|
1139
|
+
:sensitivity,
|
1140
|
+
:exempt_uri_regular_expressions)
|
1141
|
+
SENSITIVE = []
|
1142
|
+
include Aws::Structure
|
1143
|
+
end
|
1144
|
+
|
1145
|
+
# This is part of the configuration for the managed rules
|
1146
|
+
# `AWSManagedRulesAntiDDoSRuleSet` in `ManagedRuleGroupConfig`.
|
1147
|
+
#
|
1148
|
+
# @!attribute [rw] challenge
|
1149
|
+
# Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet`
|
1150
|
+
# rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
|
1151
|
+
#
|
1152
|
+
# <note markdown="1"> This setting isn't related to the configuration of the `Challenge`
|
1153
|
+
# action itself. It only configures the use of the two anti-DDoS rules
|
1154
|
+
# named here.
|
1155
|
+
#
|
1156
|
+
# </note>
|
1157
|
+
#
|
1158
|
+
# You can enable or disable the use of these rules, and you can
|
1159
|
+
# configure how to use them when they are enabled.
|
1160
|
+
# @return [Types::ClientSideAction]
|
1161
|
+
#
|
1162
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ClientSideActionConfig AWS API Documentation
|
1163
|
+
#
|
1164
|
+
class ClientSideActionConfig < Struct.new(
|
1165
|
+
:challenge)
|
1166
|
+
SENSITIVE = []
|
1167
|
+
include Aws::Structure
|
1168
|
+
end
|
1169
|
+
|
956
1170
|
# A single match condition for a Filter.
|
957
1171
|
#
|
958
1172
|
# @!attribute [rw] action_condition
|
@@ -1547,6 +1761,15 @@ module Aws::WAFV2
|
|
1547
1761
|
# [1]: http://aws.amazon.com/waf/pricing/
|
1548
1762
|
# @return [Types::AssociationConfig]
|
1549
1763
|
#
|
1764
|
+
# @!attribute [rw] on_source_d_do_s_protection_config
|
1765
|
+
# Specifies the type of DDoS protection to apply to web request data
|
1766
|
+
# for a web ACL. For most scenarios, it is recommended to use the
|
1767
|
+
# default protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is
|
1768
|
+
# associated with multiple Application Load Balancers, the changes you
|
1769
|
+
# make to DDoS protection in that web ACL will apply to all associated
|
1770
|
+
# Application Load Balancers.
|
1771
|
+
# @return [Types::OnSourceDDoSProtectionConfig]
|
1772
|
+
#
|
1550
1773
|
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/CreateWebACLRequest AWS API Documentation
|
1551
1774
|
#
|
1552
1775
|
class CreateWebACLRequest < Struct.new(
|
@@ -1562,7 +1785,8 @@ module Aws::WAFV2
|
|
1562
1785
|
:captcha_config,
|
1563
1786
|
:challenge_config,
|
1564
1787
|
:token_domains,
|
1565
|
-
:association_config
|
1788
|
+
:association_config,
|
1789
|
+
:on_source_d_do_s_protection_config)
|
1566
1790
|
SENSITIVE = []
|
1567
1791
|
include Aws::Structure
|
1568
1792
|
end
|
@@ -5552,6 +5776,13 @@ module Aws::WAFV2
|
|
5552
5776
|
# your application and the locations in the account creation request
|
5553
5777
|
# payload of data, such as the user email and phone number fields.
|
5554
5778
|
#
|
5779
|
+
# * Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to
|
5780
|
+
# configure the anti-DDoS managed rule group. The configuration
|
5781
|
+
# includes the sensitivity levels to use in the rules that typically
|
5782
|
+
# block and challenge requests that might be participating in DDoS
|
5783
|
+
# attacks and the specification to use to indicate whether a request
|
5784
|
+
# can handle a silent browser challenge.
|
5785
|
+
#
|
5555
5786
|
# * Use the `AWSManagedRulesATPRuleSet` configuration object to
|
5556
5787
|
# configure the account takeover prevention managed rule group. The
|
5557
5788
|
# configuration includes the sign-in page of your application and the
|
@@ -5649,6 +5880,21 @@ module Aws::WAFV2
|
|
5649
5880
|
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html
|
5650
5881
|
# @return [Types::AWSManagedRulesACFPRuleSet]
|
5651
5882
|
#
|
5883
|
+
# @!attribute [rw] aws_managed_rules_anti_d_do_s_rule_set
|
5884
|
+
# Additional configuration for using the anti-DDoS managed rule group,
|
5885
|
+
# `AWSManagedRulesAntiDDoSRuleSet`. Use this to configure anti-DDoS
|
5886
|
+
# behavior for the rule group.
|
5887
|
+
#
|
5888
|
+
# For information about using the anti-DDoS managed rule group, see
|
5889
|
+
# [WAF Anti-DDoS rule group][1] and [Distributed Denial of Service
|
5890
|
+
# (DDoS) prevention][2] in the *WAF Developer Guide*.
|
5891
|
+
#
|
5892
|
+
#
|
5893
|
+
#
|
5894
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html
|
5895
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html
|
5896
|
+
# @return [Types::AWSManagedRulesAntiDDoSRuleSet]
|
5897
|
+
#
|
5652
5898
|
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ManagedRuleGroupConfig AWS API Documentation
|
5653
5899
|
#
|
5654
5900
|
class ManagedRuleGroupConfig < Struct.new(
|
@@ -5658,7 +5904,8 @@ module Aws::WAFV2
|
|
5658
5904
|
:password_field,
|
5659
5905
|
:aws_managed_rules_bot_control_rule_set,
|
5660
5906
|
:aws_managed_rules_atp_rule_set,
|
5661
|
-
:aws_managed_rules_acfp_rule_set
|
5907
|
+
:aws_managed_rules_acfp_rule_set,
|
5908
|
+
:aws_managed_rules_anti_d_do_s_rule_set)
|
5662
5909
|
SENSITIVE = []
|
5663
5910
|
include Aws::Structure
|
5664
5911
|
end
|
@@ -5738,6 +5985,13 @@ module Aws::WAFV2
|
|
5738
5985
|
# creation request payload of data, such as the user email and phone
|
5739
5986
|
# number fields.
|
5740
5987
|
#
|
5988
|
+
# * Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to
|
5989
|
+
# configure the anti-DDoS managed rule group. The configuration
|
5990
|
+
# includes the sensitivity levels to use in the rules that typically
|
5991
|
+
# block and challenge requests that might be participating in DDoS
|
5992
|
+
# attacks and the specification to use to indicate whether a request
|
5993
|
+
# can handle a silent browser challenge.
|
5994
|
+
#
|
5741
5995
|
# * Use the `AWSManagedRulesATPRuleSet` configuration object to
|
5742
5996
|
# configure the account takeover prevention managed rule group. The
|
5743
5997
|
# configuration includes the sign-in page of your application and
|
@@ -5754,10 +6008,12 @@ module Aws::WAFV2
|
|
5754
6008
|
# configured inside the rule group. You specify one override for each
|
5755
6009
|
# rule whose action you want to change.
|
5756
6010
|
#
|
5757
|
-
# <note markdown="1">
|
5758
|
-
#
|
5759
|
-
#
|
5760
|
-
#
|
6011
|
+
# <note markdown="1"> Verify the rule names in your overrides carefully. With managed rule
|
6012
|
+
# groups, WAF silently ignores any override that uses an invalid rule
|
6013
|
+
# name. With customer-owned rule groups, invalid rule names in your
|
6014
|
+
# overrides will cause web ACL updates to fail. An invalid rule name
|
6015
|
+
# is any name that doesn't exactly match the case-sensitive name of
|
6016
|
+
# an existing rule in the rule group.
|
5761
6017
|
#
|
5762
6018
|
# </note>
|
5763
6019
|
#
|
@@ -6163,6 +6419,31 @@ module Aws::WAFV2
|
|
6163
6419
|
include Aws::Structure
|
6164
6420
|
end
|
6165
6421
|
|
6422
|
+
# Configures the level of DDoS protection that applies to web ACLs
|
6423
|
+
# associated with Application Load Balancers.
|
6424
|
+
#
|
6425
|
+
# @!attribute [rw] alb_low_reputation_mode
|
6426
|
+
# The level of DDoS protection that applies to web ACLs associated
|
6427
|
+
# with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is
|
6428
|
+
# enabled by default whenever a web ACL is associated with an
|
6429
|
+
# Application Load Balancer. In the event that an Application Load
|
6430
|
+
# Balancer experiences high-load conditions or suspected DDoS attacks,
|
6431
|
+
# the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic
|
6432
|
+
# from known low reputation sources without disrupting Application
|
6433
|
+
# Load Balancer availability. `ALWAYS_ON` protection provides
|
6434
|
+
# constant, always-on monitoring of known low reputation sources for
|
6435
|
+
# suspected DDoS attacks. While this provides a higher level of
|
6436
|
+
# protection, there may be potential impacts on legitimate traffic.
|
6437
|
+
# @return [String]
|
6438
|
+
#
|
6439
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/OnSourceDDoSProtectionConfig AWS API Documentation
|
6440
|
+
#
|
6441
|
+
class OnSourceDDoSProtectionConfig < Struct.new(
|
6442
|
+
:alb_low_reputation_mode)
|
6443
|
+
SENSITIVE = []
|
6444
|
+
include Aws::Structure
|
6445
|
+
end
|
6446
|
+
|
6166
6447
|
# A logical rule statement used to combine other rule statements with OR
|
6167
6448
|
# logic. You provide more than one Statement within the `OrStatement`.
|
6168
6449
|
#
|
@@ -7137,7 +7418,9 @@ module Aws::WAFV2
|
|
7137
7418
|
include Aws::Structure
|
7138
7419
|
end
|
7139
7420
|
|
7140
|
-
# A single regular expression. This is used in a RegexPatternSet
|
7421
|
+
# A single regular expression. This is used in a RegexPatternSet and
|
7422
|
+
# also in the configuration for the Amazon Web Services Managed Rules
|
7423
|
+
# rule group `AWSManagedRulesAntiDDoSRuleSet`.
|
7141
7424
|
#
|
7142
7425
|
# @!attribute [rw] regex_string
|
7143
7426
|
# The string representing the regular expression.
|
@@ -8220,10 +8503,12 @@ module Aws::WAFV2
|
|
8220
8503
|
# configured inside the rule group. You specify one override for each
|
8221
8504
|
# rule whose action you want to change.
|
8222
8505
|
#
|
8223
|
-
# <note markdown="1">
|
8224
|
-
#
|
8225
|
-
#
|
8226
|
-
#
|
8506
|
+
# <note markdown="1"> Verify the rule names in your overrides carefully. With managed rule
|
8507
|
+
# groups, WAF silently ignores any override that uses an invalid rule
|
8508
|
+
# name. With customer-owned rule groups, invalid rule names in your
|
8509
|
+
# overrides will cause web ACL updates to fail. An invalid rule name
|
8510
|
+
# is any name that doesn't exactly match the case-sensitive name of
|
8511
|
+
# an existing rule in the rule group.
|
8227
8512
|
#
|
8228
8513
|
# </note>
|
8229
8514
|
#
|
@@ -9587,6 +9872,15 @@ module Aws::WAFV2
|
|
9587
9872
|
# [1]: http://aws.amazon.com/waf/pricing/
|
9588
9873
|
# @return [Types::AssociationConfig]
|
9589
9874
|
#
|
9875
|
+
# @!attribute [rw] on_source_d_do_s_protection_config
|
9876
|
+
# Specifies the type of DDoS protection to apply to web request data
|
9877
|
+
# for a web ACL. For most scenarios, it is recommended to use the
|
9878
|
+
# default protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is
|
9879
|
+
# associated with multiple Application Load Balancers, the changes you
|
9880
|
+
# make to DDoS protection in that web ACL will apply to all associated
|
9881
|
+
# Application Load Balancers.
|
9882
|
+
# @return [Types::OnSourceDDoSProtectionConfig]
|
9883
|
+
#
|
9590
9884
|
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/UpdateWebACLRequest AWS API Documentation
|
9591
9885
|
#
|
9592
9886
|
class UpdateWebACLRequest < Struct.new(
|
@@ -9603,7 +9897,8 @@ module Aws::WAFV2
|
|
9603
9897
|
:captcha_config,
|
9604
9898
|
:challenge_config,
|
9605
9899
|
:token_domains,
|
9606
|
-
:association_config
|
9900
|
+
:association_config,
|
9901
|
+
:on_source_d_do_s_protection_config)
|
9607
9902
|
SENSITIVE = []
|
9608
9903
|
include Aws::Structure
|
9609
9904
|
end
|
@@ -10381,6 +10676,11 @@ module Aws::WAFV2
|
|
10381
10676
|
# `PostProcessFirewallManagerRuleGroups`.
|
10382
10677
|
# @return [Boolean]
|
10383
10678
|
#
|
10679
|
+
# @!attribute [rw] on_source_d_do_s_protection_config
|
10680
|
+
# Configures the level of DDoS protection that applies to web ACLs
|
10681
|
+
# associated with Application Load Balancers.
|
10682
|
+
# @return [Types::OnSourceDDoSProtectionConfig]
|
10683
|
+
#
|
10384
10684
|
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/WebACL AWS API Documentation
|
10385
10685
|
#
|
10386
10686
|
class WebACL < Struct.new(
|
@@ -10402,7 +10702,8 @@ module Aws::WAFV2
|
|
10402
10702
|
:challenge_config,
|
10403
10703
|
:token_domains,
|
10404
10704
|
:association_config,
|
10405
|
-
:retrofitted_by_firewall_manager
|
10705
|
+
:retrofitted_by_firewall_manager,
|
10706
|
+
:on_source_d_do_s_protection_config)
|
10406
10707
|
SENSITIVE = []
|
10407
10708
|
include Aws::Structure
|
10408
10709
|
end
|
data/lib/aws-sdk-wafv2.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -723,6 +723,20 @@ module Aws
|
|
723
723
|
}?
|
724
724
|
}?,
|
725
725
|
enable_regex_in_path: bool?
|
726
|
+
}?,
|
727
|
+
aws_managed_rules_anti_d_do_s_rule_set: {
|
728
|
+
client_side_action_config: {
|
729
|
+
challenge: {
|
730
|
+
usage_of_action: ("ENABLED" | "DISABLED"),
|
731
|
+
sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
|
732
|
+
exempt_uri_regular_expressions: Array[
|
733
|
+
{
|
734
|
+
regex_string: ::String?
|
735
|
+
},
|
736
|
+
]?
|
737
|
+
}
|
738
|
+
},
|
739
|
+
sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
|
726
740
|
}?
|
727
741
|
},
|
728
742
|
]?,
|
@@ -1653,6 +1667,20 @@ module Aws
|
|
1653
1667
|
}?
|
1654
1668
|
}?,
|
1655
1669
|
enable_regex_in_path: bool?
|
1670
|
+
}?,
|
1671
|
+
aws_managed_rules_anti_d_do_s_rule_set: {
|
1672
|
+
client_side_action_config: {
|
1673
|
+
challenge: {
|
1674
|
+
usage_of_action: ("ENABLED" | "DISABLED"),
|
1675
|
+
sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
|
1676
|
+
exempt_uri_regular_expressions: Array[
|
1677
|
+
{
|
1678
|
+
regex_string: ::String?
|
1679
|
+
},
|
1680
|
+
]?
|
1681
|
+
}
|
1682
|
+
},
|
1683
|
+
sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
|
1656
1684
|
}?
|
1657
1685
|
},
|
1658
1686
|
]?,
|
@@ -2567,6 +2595,20 @@ module Aws
|
|
2567
2595
|
}?
|
2568
2596
|
}?,
|
2569
2597
|
enable_regex_in_path: bool?
|
2598
|
+
}?,
|
2599
|
+
aws_managed_rules_anti_d_do_s_rule_set: {
|
2600
|
+
client_side_action_config: {
|
2601
|
+
challenge: {
|
2602
|
+
usage_of_action: ("ENABLED" | "DISABLED"),
|
2603
|
+
sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
|
2604
|
+
exempt_uri_regular_expressions: Array[
|
2605
|
+
{
|
2606
|
+
regex_string: ::String?
|
2607
|
+
},
|
2608
|
+
]?
|
2609
|
+
}
|
2610
|
+
},
|
2611
|
+
sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
|
2570
2612
|
}?
|
2571
2613
|
},
|
2572
2614
|
]?,
|
@@ -2845,6 +2887,9 @@ module Aws
|
|
2845
2887
|
request_body: Hash[("CLOUDFRONT" | "API_GATEWAY" | "COGNITO_USER_POOL" | "APP_RUNNER_SERVICE" | "VERIFIED_ACCESS_INSTANCE"), {
|
2846
2888
|
default_size_inspection_limit: ("KB_16" | "KB_32" | "KB_48" | "KB_64")
|
2847
2889
|
}]?
|
2890
|
+
},
|
2891
|
+
?on_source_d_do_s_protection_config: {
|
2892
|
+
alb_low_reputation_mode: ("ACTIVE_UNDER_DDOS" | "ALWAYS_ON")
|
2848
2893
|
}
|
2849
2894
|
) -> _CreateWebACLResponseSuccess
|
2850
2895
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateWebACLResponseSuccess
|
@@ -4154,6 +4199,20 @@ module Aws
|
|
4154
4199
|
}?
|
4155
4200
|
}?,
|
4156
4201
|
enable_regex_in_path: bool?
|
4202
|
+
}?,
|
4203
|
+
aws_managed_rules_anti_d_do_s_rule_set: {
|
4204
|
+
client_side_action_config: {
|
4205
|
+
challenge: {
|
4206
|
+
usage_of_action: ("ENABLED" | "DISABLED"),
|
4207
|
+
sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
|
4208
|
+
exempt_uri_regular_expressions: Array[
|
4209
|
+
{
|
4210
|
+
regex_string: ::String?
|
4211
|
+
},
|
4212
|
+
]?
|
4213
|
+
}
|
4214
|
+
},
|
4215
|
+
sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
|
4157
4216
|
}?
|
4158
4217
|
},
|
4159
4218
|
]?,
|
@@ -5064,6 +5123,20 @@ module Aws
|
|
5064
5123
|
}?
|
5065
5124
|
}?,
|
5066
5125
|
enable_regex_in_path: bool?
|
5126
|
+
}?,
|
5127
|
+
aws_managed_rules_anti_d_do_s_rule_set: {
|
5128
|
+
client_side_action_config: {
|
5129
|
+
challenge: {
|
5130
|
+
usage_of_action: ("ENABLED" | "DISABLED"),
|
5131
|
+
sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
|
5132
|
+
exempt_uri_regular_expressions: Array[
|
5133
|
+
{
|
5134
|
+
regex_string: ::String?
|
5135
|
+
},
|
5136
|
+
]?
|
5137
|
+
}
|
5138
|
+
},
|
5139
|
+
sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
|
5067
5140
|
}?
|
5068
5141
|
},
|
5069
5142
|
]?,
|
@@ -5337,6 +5410,9 @@ module Aws
|
|
5337
5410
|
request_body: Hash[("CLOUDFRONT" | "API_GATEWAY" | "COGNITO_USER_POOL" | "APP_RUNNER_SERVICE" | "VERIFIED_ACCESS_INSTANCE"), {
|
5338
5411
|
default_size_inspection_limit: ("KB_16" | "KB_32" | "KB_48" | "KB_64")
|
5339
5412
|
}]?
|
5413
|
+
},
|
5414
|
+
?on_source_d_do_s_protection_config: {
|
5415
|
+
alb_low_reputation_mode: ("ACTIVE_UNDER_DDOS" | "ALWAYS_ON")
|
5340
5416
|
}
|
5341
5417
|
) -> _UpdateWebACLResponseSuccess
|
5342
5418
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateWebACLResponseSuccess
|
data/sig/types.rbs
CHANGED
@@ -33,6 +33,12 @@ module Aws::WAFV2
|
|
33
33
|
SENSITIVE: []
|
34
34
|
end
|
35
35
|
|
36
|
+
class AWSManagedRulesAntiDDoSRuleSet
|
37
|
+
attr_accessor client_side_action_config: Types::ClientSideActionConfig
|
38
|
+
attr_accessor sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")
|
39
|
+
SENSITIVE: []
|
40
|
+
end
|
41
|
+
|
36
42
|
class AWSManagedRulesBotControlRuleSet
|
37
43
|
attr_accessor inspection_level: ("COMMON" | "TARGETED")
|
38
44
|
attr_accessor enable_machine_learning: bool
|
@@ -148,6 +154,18 @@ module Aws::WAFV2
|
|
148
154
|
SENSITIVE: []
|
149
155
|
end
|
150
156
|
|
157
|
+
class ClientSideAction
|
158
|
+
attr_accessor usage_of_action: ("ENABLED" | "DISABLED")
|
159
|
+
attr_accessor sensitivity: ("LOW" | "MEDIUM" | "HIGH")
|
160
|
+
attr_accessor exempt_uri_regular_expressions: ::Array[Types::Regex]
|
161
|
+
SENSITIVE: []
|
162
|
+
end
|
163
|
+
|
164
|
+
class ClientSideActionConfig
|
165
|
+
attr_accessor challenge: Types::ClientSideAction
|
166
|
+
SENSITIVE: []
|
167
|
+
end
|
168
|
+
|
151
169
|
class Condition
|
152
170
|
attr_accessor action_condition: Types::ActionCondition
|
153
171
|
attr_accessor label_name_condition: Types::LabelNameCondition
|
@@ -244,6 +262,7 @@ module Aws::WAFV2
|
|
244
262
|
attr_accessor challenge_config: Types::ChallengeConfig
|
245
263
|
attr_accessor token_domains: ::Array[::String]
|
246
264
|
attr_accessor association_config: Types::AssociationConfig
|
265
|
+
attr_accessor on_source_d_do_s_protection_config: Types::OnSourceDDoSProtectionConfig
|
247
266
|
SENSITIVE: []
|
248
267
|
end
|
249
268
|
|
@@ -972,6 +991,7 @@ module Aws::WAFV2
|
|
972
991
|
attr_accessor aws_managed_rules_bot_control_rule_set: Types::AWSManagedRulesBotControlRuleSet
|
973
992
|
attr_accessor aws_managed_rules_atp_rule_set: Types::AWSManagedRulesATPRuleSet
|
974
993
|
attr_accessor aws_managed_rules_acfp_rule_set: Types::AWSManagedRulesACFPRuleSet
|
994
|
+
attr_accessor aws_managed_rules_anti_d_do_s_rule_set: Types::AWSManagedRulesAntiDDoSRuleSet
|
975
995
|
SENSITIVE: []
|
976
996
|
end
|
977
997
|
|
@@ -1050,6 +1070,11 @@ module Aws::WAFV2
|
|
1050
1070
|
SENSITIVE: []
|
1051
1071
|
end
|
1052
1072
|
|
1073
|
+
class OnSourceDDoSProtectionConfig
|
1074
|
+
attr_accessor alb_low_reputation_mode: ("ACTIVE_UNDER_DDOS" | "ALWAYS_ON")
|
1075
|
+
SENSITIVE: []
|
1076
|
+
end
|
1077
|
+
|
1053
1078
|
class OrStatement
|
1054
1079
|
attr_accessor statements: ::Array[Types::Statement]
|
1055
1080
|
SENSITIVE: []
|
@@ -1540,6 +1565,7 @@ module Aws::WAFV2
|
|
1540
1565
|
attr_accessor challenge_config: Types::ChallengeConfig
|
1541
1566
|
attr_accessor token_domains: ::Array[::String]
|
1542
1567
|
attr_accessor association_config: Types::AssociationConfig
|
1568
|
+
attr_accessor on_source_d_do_s_protection_config: Types::OnSourceDDoSProtectionConfig
|
1543
1569
|
SENSITIVE: []
|
1544
1570
|
end
|
1545
1571
|
|
@@ -1606,7 +1632,7 @@ module Aws::WAFV2
|
|
1606
1632
|
|
1607
1633
|
class WAFInvalidParameterException
|
1608
1634
|
attr_accessor message: ::String
|
1609
|
-
attr_accessor field: ("WEB_ACL" | "RULE_GROUP" | "REGEX_PATTERN_SET" | "IP_SET" | "MANAGED_RULE_SET" | "RULE" | "EXCLUDED_RULE" | "STATEMENT" | "BYTE_MATCH_STATEMENT" | "SQLI_MATCH_STATEMENT" | "XSS_MATCH_STATEMENT" | "SIZE_CONSTRAINT_STATEMENT" | "GEO_MATCH_STATEMENT" | "RATE_BASED_STATEMENT" | "RULE_GROUP_REFERENCE_STATEMENT" | "REGEX_PATTERN_REFERENCE_STATEMENT" | "IP_SET_REFERENCE_STATEMENT" | "MANAGED_RULE_SET_STATEMENT" | "LABEL_MATCH_STATEMENT" | "AND_STATEMENT" | "OR_STATEMENT" | "NOT_STATEMENT" | "IP_ADDRESS" | "IP_ADDRESS_VERSION" | "FIELD_TO_MATCH" | "TEXT_TRANSFORMATION" | "SINGLE_QUERY_ARGUMENT" | "SINGLE_HEADER" | "DEFAULT_ACTION" | "RULE_ACTION" | "ENTITY_LIMIT" | "OVERRIDE_ACTION" | "SCOPE_VALUE" | "RESOURCE_ARN" | "RESOURCE_TYPE" | "TAGS" | "TAG_KEYS" | "METRIC_NAME" | "FIREWALL_MANAGER_STATEMENT" | "FALLBACK_BEHAVIOR" | "POSITION" | "FORWARDED_IP_CONFIG" | "IP_SET_FORWARDED_IP_CONFIG" | "HEADER_NAME" | "CUSTOM_REQUEST_HANDLING" | "RESPONSE_CONTENT_TYPE" | "CUSTOM_RESPONSE" | "CUSTOM_RESPONSE_BODY" | "JSON_MATCH_PATTERN" | "JSON_MATCH_SCOPE" | "BODY_PARSING_FALLBACK_BEHAVIOR" | "LOGGING_FILTER" | "FILTER_CONDITION" | "EXPIRE_TIMESTAMP" | "CHANGE_PROPAGATION_STATUS" | "ASSOCIABLE_RESOURCE" | "LOG_DESTINATION" | "MANAGED_RULE_GROUP_CONFIG" | "PAYLOAD_TYPE" | "HEADER_MATCH_PATTERN" | "COOKIE_MATCH_PATTERN" | "MAP_MATCH_SCOPE" | "OVERSIZE_HANDLING" | "CHALLENGE_CONFIG" | "TOKEN_DOMAIN" | "ATP_RULE_SET_RESPONSE_INSPECTION" | "ASSOCIATED_RESOURCE_TYPE" | "SCOPE_DOWN" | "CUSTOM_KEYS" | "ACP_RULE_SET_RESPONSE_INSPECTION" | "DATA_PROTECTION_CONFIG")
|
1635
|
+
attr_accessor field: ("WEB_ACL" | "RULE_GROUP" | "REGEX_PATTERN_SET" | "IP_SET" | "MANAGED_RULE_SET" | "RULE" | "EXCLUDED_RULE" | "STATEMENT" | "BYTE_MATCH_STATEMENT" | "SQLI_MATCH_STATEMENT" | "XSS_MATCH_STATEMENT" | "SIZE_CONSTRAINT_STATEMENT" | "GEO_MATCH_STATEMENT" | "RATE_BASED_STATEMENT" | "RULE_GROUP_REFERENCE_STATEMENT" | "REGEX_PATTERN_REFERENCE_STATEMENT" | "IP_SET_REFERENCE_STATEMENT" | "MANAGED_RULE_SET_STATEMENT" | "LABEL_MATCH_STATEMENT" | "AND_STATEMENT" | "OR_STATEMENT" | "NOT_STATEMENT" | "IP_ADDRESS" | "IP_ADDRESS_VERSION" | "FIELD_TO_MATCH" | "TEXT_TRANSFORMATION" | "SINGLE_QUERY_ARGUMENT" | "SINGLE_HEADER" | "DEFAULT_ACTION" | "RULE_ACTION" | "ENTITY_LIMIT" | "OVERRIDE_ACTION" | "SCOPE_VALUE" | "RESOURCE_ARN" | "RESOURCE_TYPE" | "TAGS" | "TAG_KEYS" | "METRIC_NAME" | "FIREWALL_MANAGER_STATEMENT" | "FALLBACK_BEHAVIOR" | "POSITION" | "FORWARDED_IP_CONFIG" | "IP_SET_FORWARDED_IP_CONFIG" | "HEADER_NAME" | "CUSTOM_REQUEST_HANDLING" | "RESPONSE_CONTENT_TYPE" | "CUSTOM_RESPONSE" | "CUSTOM_RESPONSE_BODY" | "JSON_MATCH_PATTERN" | "JSON_MATCH_SCOPE" | "BODY_PARSING_FALLBACK_BEHAVIOR" | "LOGGING_FILTER" | "FILTER_CONDITION" | "EXPIRE_TIMESTAMP" | "CHANGE_PROPAGATION_STATUS" | "ASSOCIABLE_RESOURCE" | "LOG_DESTINATION" | "MANAGED_RULE_GROUP_CONFIG" | "PAYLOAD_TYPE" | "HEADER_MATCH_PATTERN" | "COOKIE_MATCH_PATTERN" | "MAP_MATCH_SCOPE" | "OVERSIZE_HANDLING" | "CHALLENGE_CONFIG" | "TOKEN_DOMAIN" | "ATP_RULE_SET_RESPONSE_INSPECTION" | "ASSOCIATED_RESOURCE_TYPE" | "SCOPE_DOWN" | "CUSTOM_KEYS" | "ACP_RULE_SET_RESPONSE_INSPECTION" | "DATA_PROTECTION_CONFIG" | "LOW_REPUTATION_MODE")
|
1610
1636
|
attr_accessor parameter: ::String
|
1611
1637
|
attr_accessor reason: ::String
|
1612
1638
|
SENSITIVE: []
|
@@ -1693,6 +1719,7 @@ module Aws::WAFV2
|
|
1693
1719
|
attr_accessor token_domains: ::Array[::String]
|
1694
1720
|
attr_accessor association_config: Types::AssociationConfig
|
1695
1721
|
attr_accessor retrofitted_by_firewall_manager: bool
|
1722
|
+
attr_accessor on_source_d_do_s_protection_config: Types::OnSourceDDoSProtectionConfig
|
1696
1723
|
SENSITIVE: []
|
1697
1724
|
end
|
1698
1725
|
|