aws-sdk-wafv2 1.110.0 → 1.111.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: d61c6e32e94cd2c77641590f482910cf9f137f89ead4c05d974e7da90cadaca1
4
- data.tar.gz: '087e9860fb0c5b059d3e0243cede2fe0ccee2a854d0274ee8647f7de8e74c242'
3
+ metadata.gz: 16c4a613a2811c0ef62664488a672cdf019d94c82e0c78c3296f66509d18373d
4
+ data.tar.gz: '09450619c095fb4dfedd5e4b7a67bb93f17570abc3885ef348e7cd1822f07032'
5
5
  SHA512:
6
- metadata.gz: '08a23432bd5de93e8ceb76c0954c5e5dfb99829357cc4a8ea06782f8664b46fbc32756f20833617e052acd613f1c9266d67117c325f0afc2db066722ddb1b7f3'
7
- data.tar.gz: 6cab48d82d9dec6708dfe3222ec48e92a25ae3a49bf6b22de77880741f4a94577980e4493db712fa5d0539e4fec673c7a65931170040cc25798d28ea2298b2fb
6
+ metadata.gz: 3a6b7c59627c5c228a54d884acb476829057cfd9777e5778fead4d1e690ac32727014a238545636f59645c9936590cbe4980d5114b2c969d6f8b76683ee445ee
7
+ data.tar.gz: 6d5a464ff5b9f0ef250b98bfa65e67e36cacae276c73ebfb6f38cb33416f2f8eeac0b43233328a0fd044d55b736e596c4ea30f8dc892134dc769d4687c33f84a
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.111.0 (2025-06-11)
5
+ ------------------
6
+
7
+ * Feature - WAF now provides two DDoS protection options: resource-level monitoring for Application Load Balancers and the AWSManagedRulesAntiDDoSRuleSet managed rule group for CloudFront distributions.
8
+
4
9
  1.110.0 (2025-06-05)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.110.0
1
+ 1.111.0
@@ -1253,6 +1253,20 @@ module Aws::WAFV2
1253
1253
  # },
1254
1254
  # enable_regex_in_path: false,
1255
1255
  # },
1256
+ # aws_managed_rules_anti_d_do_s_rule_set: {
1257
+ # client_side_action_config: { # required
1258
+ # challenge: { # required
1259
+ # usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
1260
+ # sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
1261
+ # exempt_uri_regular_expressions: [
1262
+ # {
1263
+ # regex_string: "RegexPatternString",
1264
+ # },
1265
+ # ],
1266
+ # },
1267
+ # },
1268
+ # sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
1269
+ # },
1256
1270
  # },
1257
1271
  # ],
1258
1272
  # rule_action_overrides: [
@@ -2471,6 +2485,20 @@ module Aws::WAFV2
2471
2485
  # },
2472
2486
  # enable_regex_in_path: false,
2473
2487
  # },
2488
+ # aws_managed_rules_anti_d_do_s_rule_set: {
2489
+ # client_side_action_config: { # required
2490
+ # challenge: { # required
2491
+ # usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
2492
+ # sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
2493
+ # exempt_uri_regular_expressions: [
2494
+ # {
2495
+ # regex_string: "RegexPatternString",
2496
+ # },
2497
+ # ],
2498
+ # },
2499
+ # },
2500
+ # sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
2501
+ # },
2474
2502
  # },
2475
2503
  # ],
2476
2504
  # rule_action_overrides: [
@@ -2871,6 +2899,14 @@ module Aws::WAFV2
2871
2899
  #
2872
2900
  # [1]: http://aws.amazon.com/waf/pricing/
2873
2901
  #
2902
+ # @option params [Types::OnSourceDDoSProtectionConfig] :on_source_d_do_s_protection_config
2903
+ # Specifies the type of DDoS protection to apply to web request data for
2904
+ # a web ACL. For most scenarios, it is recommended to use the default
2905
+ # protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is associated with
2906
+ # multiple Application Load Balancers, the changes you make to DDoS
2907
+ # protection in that web ACL will apply to all associated Application
2908
+ # Load Balancers.
2909
+ #
2874
2910
  # @return [Types::CreateWebACLResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2875
2911
  #
2876
2912
  # * {Types::CreateWebACLResponse#summary #summary} => Types::WebACLSummary
@@ -3544,6 +3580,20 @@ module Aws::WAFV2
3544
3580
  # },
3545
3581
  # enable_regex_in_path: false,
3546
3582
  # },
3583
+ # aws_managed_rules_anti_d_do_s_rule_set: {
3584
+ # client_side_action_config: { # required
3585
+ # challenge: { # required
3586
+ # usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
3587
+ # sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
3588
+ # exempt_uri_regular_expressions: [
3589
+ # {
3590
+ # regex_string: "RegexPatternString",
3591
+ # },
3592
+ # ],
3593
+ # },
3594
+ # },
3595
+ # sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
3596
+ # },
3547
3597
  # },
3548
3598
  # ],
3549
3599
  # rule_action_overrides: [
@@ -3826,6 +3876,9 @@ module Aws::WAFV2
3826
3876
  # },
3827
3877
  # },
3828
3878
  # },
3879
+ # on_source_d_do_s_protection_config: {
3880
+ # alb_low_reputation_mode: "ACTIVE_UNDER_DDOS", # required, accepts ACTIVE_UNDER_DDOS, ALWAYS_ON
3881
+ # },
3829
3882
  # })
3830
3883
  #
3831
3884
  # @example Response structure
@@ -5358,6 +5411,11 @@ module Aws::WAFV2
5358
5411
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_acfp_rule_set.response_inspection.json.failure_values #=> Array
5359
5412
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_acfp_rule_set.response_inspection.json.failure_values[0] #=> String
5360
5413
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_acfp_rule_set.enable_regex_in_path #=> Boolean
5414
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.usage_of_action #=> String, one of "ENABLED", "DISABLED"
5415
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.sensitivity #=> String, one of "LOW", "MEDIUM", "HIGH"
5416
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.exempt_uri_regular_expressions #=> Array
5417
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.client_side_action_config.challenge.exempt_uri_regular_expressions[0].regex_string #=> String
5418
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_anti_d_do_s_rule_set.sensitivity_to_block #=> String, one of "LOW", "MEDIUM", "HIGH"
5361
5419
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
5362
5420
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
5363
5421
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -8053,6 +8111,20 @@ module Aws::WAFV2
8053
8111
  # },
8054
8112
  # enable_regex_in_path: false,
8055
8113
  # },
8114
+ # aws_managed_rules_anti_d_do_s_rule_set: {
8115
+ # client_side_action_config: { # required
8116
+ # challenge: { # required
8117
+ # usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
8118
+ # sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
8119
+ # exempt_uri_regular_expressions: [
8120
+ # {
8121
+ # regex_string: "RegexPatternString",
8122
+ # },
8123
+ # ],
8124
+ # },
8125
+ # },
8126
+ # sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
8127
+ # },
8056
8128
  # },
8057
8129
  # ],
8058
8130
  # rule_action_overrides: [
@@ -8497,6 +8569,14 @@ module Aws::WAFV2
8497
8569
  #
8498
8570
  # [1]: http://aws.amazon.com/waf/pricing/
8499
8571
  #
8572
+ # @option params [Types::OnSourceDDoSProtectionConfig] :on_source_d_do_s_protection_config
8573
+ # Specifies the type of DDoS protection to apply to web request data for
8574
+ # a web ACL. For most scenarios, it is recommended to use the default
8575
+ # protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is associated with
8576
+ # multiple Application Load Balancers, the changes you make to DDoS
8577
+ # protection in that web ACL will apply to all associated Application
8578
+ # Load Balancers.
8579
+ #
8500
8580
  # @return [Types::UpdateWebACLResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
8501
8581
  #
8502
8582
  # * {Types::UpdateWebACLResponse#next_lock_token #next_lock_token} => String
@@ -9171,6 +9251,20 @@ module Aws::WAFV2
9171
9251
  # },
9172
9252
  # enable_regex_in_path: false,
9173
9253
  # },
9254
+ # aws_managed_rules_anti_d_do_s_rule_set: {
9255
+ # client_side_action_config: { # required
9256
+ # challenge: { # required
9257
+ # usage_of_action: "ENABLED", # required, accepts ENABLED, DISABLED
9258
+ # sensitivity: "LOW", # accepts LOW, MEDIUM, HIGH
9259
+ # exempt_uri_regular_expressions: [
9260
+ # {
9261
+ # regex_string: "RegexPatternString",
9262
+ # },
9263
+ # ],
9264
+ # },
9265
+ # },
9266
+ # sensitivity_to_block: "LOW", # accepts LOW, MEDIUM, HIGH
9267
+ # },
9174
9268
  # },
9175
9269
  # ],
9176
9270
  # rule_action_overrides: [
@@ -9448,6 +9542,9 @@ module Aws::WAFV2
9448
9542
  # },
9449
9543
  # },
9450
9544
  # },
9545
+ # on_source_d_do_s_protection_config: {
9546
+ # alb_low_reputation_mode: "ACTIVE_UNDER_DDOS", # required, accepts ACTIVE_UNDER_DDOS, ALWAYS_ON
9547
+ # },
9451
9548
  # })
9452
9549
  #
9453
9550
  # @example Response structure
@@ -9481,7 +9578,7 @@ module Aws::WAFV2
9481
9578
  tracer: tracer
9482
9579
  )
9483
9580
  context[:gem_name] = 'aws-sdk-wafv2'
9484
- context[:gem_version] = '1.110.0'
9581
+ context[:gem_version] = '1.111.0'
9485
9582
  Seahorse::Client::Request.new(handlers, context)
9486
9583
  end
9487
9584
 
@@ -22,6 +22,7 @@ module Aws::WAFV2
22
22
  ASN = Shapes::IntegerShape.new(name: 'ASN')
23
23
  AWSManagedRulesACFPRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesACFPRuleSet')
24
24
  AWSManagedRulesATPRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesATPRuleSet')
25
+ AWSManagedRulesAntiDDoSRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesAntiDDoSRuleSet')
25
26
  AWSManagedRulesBotControlRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesBotControlRuleSet')
26
27
  Action = Shapes::StringShape.new(name: 'Action')
27
28
  ActionCondition = Shapes::StructureShape.new(name: 'ActionCondition')
@@ -52,6 +53,8 @@ module Aws::WAFV2
52
53
  ChallengeResponse = Shapes::StructureShape.new(name: 'ChallengeResponse')
53
54
  CheckCapacityRequest = Shapes::StructureShape.new(name: 'CheckCapacityRequest')
54
55
  CheckCapacityResponse = Shapes::StructureShape.new(name: 'CheckCapacityResponse')
56
+ ClientSideAction = Shapes::StructureShape.new(name: 'ClientSideAction')
57
+ ClientSideActionConfig = Shapes::StructureShape.new(name: 'ClientSideActionConfig')
55
58
  ComparisonOperator = Shapes::StringShape.new(name: 'ComparisonOperator')
56
59
  Condition = Shapes::StructureShape.new(name: 'Condition')
57
60
  Conditions = Shapes::ListShape.new(name: 'Conditions')
@@ -242,6 +245,7 @@ module Aws::WAFV2
242
245
  LoggingConfigurations = Shapes::ListShape.new(name: 'LoggingConfigurations')
243
246
  LoggingFilter = Shapes::StructureShape.new(name: 'LoggingFilter')
244
247
  LoginPathString = Shapes::StringShape.new(name: 'LoginPathString')
248
+ LowReputationMode = Shapes::StringShape.new(name: 'LowReputationMode')
245
249
  ManagedProductDescriptor = Shapes::StructureShape.new(name: 'ManagedProductDescriptor')
246
250
  ManagedProductDescriptors = Shapes::ListShape.new(name: 'ManagedProductDescriptors')
247
251
  ManagedRuleGroupConfig = Shapes::StructureShape.new(name: 'ManagedRuleGroupConfig')
@@ -262,6 +266,7 @@ module Aws::WAFV2
262
266
  NextMarker = Shapes::StringShape.new(name: 'NextMarker')
263
267
  NoneAction = Shapes::StructureShape.new(name: 'NoneAction')
264
268
  NotStatement = Shapes::StructureShape.new(name: 'NotStatement')
269
+ OnSourceDDoSProtectionConfig = Shapes::StructureShape.new(name: 'OnSourceDDoSProtectionConfig')
265
270
  OrStatement = Shapes::StructureShape.new(name: 'OrStatement')
266
271
  OutputUrl = Shapes::StringShape.new(name: 'OutputUrl')
267
272
  OverrideAction = Shapes::StructureShape.new(name: 'OverrideAction')
@@ -363,6 +368,7 @@ module Aws::WAFV2
363
368
  Scope = Shapes::StringShape.new(name: 'Scope')
364
369
  SearchString = Shapes::BlobShape.new(name: 'SearchString')
365
370
  SensitivityLevel = Shapes::StringShape.new(name: 'SensitivityLevel')
371
+ SensitivityToAct = Shapes::StringShape.new(name: 'SensitivityToAct')
366
372
  SingleCookieName = Shapes::StringShape.new(name: 'SingleCookieName')
367
373
  SingleHeader = Shapes::StructureShape.new(name: 'SingleHeader')
368
374
  SingleQueryArgument = Shapes::StructureShape.new(name: 'SingleQueryArgument')
@@ -410,6 +416,7 @@ module Aws::WAFV2
410
416
  UpdateWebACLResponse = Shapes::StructureShape.new(name: 'UpdateWebACLResponse')
411
417
  UriFragment = Shapes::StructureShape.new(name: 'UriFragment')
412
418
  UriPath = Shapes::StructureShape.new(name: 'UriPath')
419
+ UsageOfAction = Shapes::StringShape.new(name: 'UsageOfAction')
413
420
  UsernameField = Shapes::StructureShape.new(name: 'UsernameField')
414
421
  VendorName = Shapes::StringShape.new(name: 'VendorName')
415
422
  VersionKeyString = Shapes::StringShape.new(name: 'VersionKeyString')
@@ -463,6 +470,10 @@ module Aws::WAFV2
463
470
  AWSManagedRulesATPRuleSet.add_member(:enable_regex_in_path, Shapes::ShapeRef.new(shape: Boolean, location_name: "EnableRegexInPath"))
464
471
  AWSManagedRulesATPRuleSet.struct_class = Types::AWSManagedRulesATPRuleSet
465
472
 
473
+ AWSManagedRulesAntiDDoSRuleSet.add_member(:client_side_action_config, Shapes::ShapeRef.new(shape: ClientSideActionConfig, required: true, location_name: "ClientSideActionConfig"))
474
+ AWSManagedRulesAntiDDoSRuleSet.add_member(:sensitivity_to_block, Shapes::ShapeRef.new(shape: SensitivityToAct, location_name: "SensitivityToBlock"))
475
+ AWSManagedRulesAntiDDoSRuleSet.struct_class = Types::AWSManagedRulesAntiDDoSRuleSet
476
+
466
477
  AWSManagedRulesBotControlRuleSet.add_member(:inspection_level, Shapes::ShapeRef.new(shape: InspectionLevel, required: true, location_name: "InspectionLevel"))
467
478
  AWSManagedRulesBotControlRuleSet.add_member(:enable_machine_learning, Shapes::ShapeRef.new(shape: EnableMachineLearning, location_name: "EnableMachineLearning"))
468
479
  AWSManagedRulesBotControlRuleSet.struct_class = Types::AWSManagedRulesBotControlRuleSet
@@ -541,6 +552,14 @@ module Aws::WAFV2
541
552
  CheckCapacityResponse.add_member(:capacity, Shapes::ShapeRef.new(shape: ConsumedCapacity, location_name: "Capacity"))
542
553
  CheckCapacityResponse.struct_class = Types::CheckCapacityResponse
543
554
 
555
+ ClientSideAction.add_member(:usage_of_action, Shapes::ShapeRef.new(shape: UsageOfAction, required: true, location_name: "UsageOfAction"))
556
+ ClientSideAction.add_member(:sensitivity, Shapes::ShapeRef.new(shape: SensitivityToAct, location_name: "Sensitivity"))
557
+ ClientSideAction.add_member(:exempt_uri_regular_expressions, Shapes::ShapeRef.new(shape: RegularExpressionList, location_name: "ExemptUriRegularExpressions"))
558
+ ClientSideAction.struct_class = Types::ClientSideAction
559
+
560
+ ClientSideActionConfig.add_member(:challenge, Shapes::ShapeRef.new(shape: ClientSideAction, required: true, location_name: "Challenge"))
561
+ ClientSideActionConfig.struct_class = Types::ClientSideActionConfig
562
+
544
563
  Condition.add_member(:action_condition, Shapes::ShapeRef.new(shape: ActionCondition, location_name: "ActionCondition"))
545
564
  Condition.add_member(:label_name_condition, Shapes::ShapeRef.new(shape: LabelNameCondition, location_name: "LabelNameCondition"))
546
565
  Condition.struct_class = Types::Condition
@@ -618,6 +637,7 @@ module Aws::WAFV2
618
637
  CreateWebACLRequest.add_member(:challenge_config, Shapes::ShapeRef.new(shape: ChallengeConfig, location_name: "ChallengeConfig"))
619
638
  CreateWebACLRequest.add_member(:token_domains, Shapes::ShapeRef.new(shape: TokenDomains, location_name: "TokenDomains"))
620
639
  CreateWebACLRequest.add_member(:association_config, Shapes::ShapeRef.new(shape: AssociationConfig, location_name: "AssociationConfig"))
640
+ CreateWebACLRequest.add_member(:on_source_d_do_s_protection_config, Shapes::ShapeRef.new(shape: OnSourceDDoSProtectionConfig, location_name: "OnSourceDDoSProtectionConfig"))
621
641
  CreateWebACLRequest.struct_class = Types::CreateWebACLRequest
622
642
 
623
643
  CreateWebACLResponse.add_member(:summary, Shapes::ShapeRef.new(shape: WebACLSummary, location_name: "Summary"))
@@ -1163,6 +1183,7 @@ module Aws::WAFV2
1163
1183
  ManagedRuleGroupConfig.add_member(:aws_managed_rules_bot_control_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesBotControlRuleSet, location_name: "AWSManagedRulesBotControlRuleSet"))
1164
1184
  ManagedRuleGroupConfig.add_member(:aws_managed_rules_atp_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesATPRuleSet, location_name: "AWSManagedRulesATPRuleSet"))
1165
1185
  ManagedRuleGroupConfig.add_member(:aws_managed_rules_acfp_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesACFPRuleSet, location_name: "AWSManagedRulesACFPRuleSet"))
1186
+ ManagedRuleGroupConfig.add_member(:aws_managed_rules_anti_d_do_s_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesAntiDDoSRuleSet, location_name: "AWSManagedRulesAntiDDoSRuleSet"))
1166
1187
  ManagedRuleGroupConfig.struct_class = Types::ManagedRuleGroupConfig
1167
1188
 
1168
1189
  ManagedRuleGroupConfigs.member = Shapes::ShapeRef.new(shape: ManagedRuleGroupConfig)
@@ -1230,6 +1251,9 @@ module Aws::WAFV2
1230
1251
  NotStatement.add_member(:statement, Shapes::ShapeRef.new(shape: Statement, required: true, location_name: "Statement"))
1231
1252
  NotStatement.struct_class = Types::NotStatement
1232
1253
 
1254
+ OnSourceDDoSProtectionConfig.add_member(:alb_low_reputation_mode, Shapes::ShapeRef.new(shape: LowReputationMode, required: true, location_name: "ALBLowReputationMode"))
1255
+ OnSourceDDoSProtectionConfig.struct_class = Types::OnSourceDDoSProtectionConfig
1256
+
1233
1257
  OrStatement.add_member(:statements, Shapes::ShapeRef.new(shape: Statements, required: true, location_name: "Statements"))
1234
1258
  OrStatement.struct_class = Types::OrStatement
1235
1259
 
@@ -1645,6 +1669,7 @@ module Aws::WAFV2
1645
1669
  UpdateWebACLRequest.add_member(:challenge_config, Shapes::ShapeRef.new(shape: ChallengeConfig, location_name: "ChallengeConfig"))
1646
1670
  UpdateWebACLRequest.add_member(:token_domains, Shapes::ShapeRef.new(shape: TokenDomains, location_name: "TokenDomains"))
1647
1671
  UpdateWebACLRequest.add_member(:association_config, Shapes::ShapeRef.new(shape: AssociationConfig, location_name: "AssociationConfig"))
1672
+ UpdateWebACLRequest.add_member(:on_source_d_do_s_protection_config, Shapes::ShapeRef.new(shape: OnSourceDDoSProtectionConfig, location_name: "OnSourceDDoSProtectionConfig"))
1648
1673
  UpdateWebACLRequest.struct_class = Types::UpdateWebACLRequest
1649
1674
 
1650
1675
  UpdateWebACLResponse.add_member(:next_lock_token, Shapes::ShapeRef.new(shape: LockToken, location_name: "NextLockToken"))
@@ -1750,6 +1775,7 @@ module Aws::WAFV2
1750
1775
  WebACL.add_member(:token_domains, Shapes::ShapeRef.new(shape: TokenDomains, location_name: "TokenDomains"))
1751
1776
  WebACL.add_member(:association_config, Shapes::ShapeRef.new(shape: AssociationConfig, location_name: "AssociationConfig"))
1752
1777
  WebACL.add_member(:retrofitted_by_firewall_manager, Shapes::ShapeRef.new(shape: Boolean, location_name: "RetrofittedByFirewallManager"))
1778
+ WebACL.add_member(:on_source_d_do_s_protection_config, Shapes::ShapeRef.new(shape: OnSourceDDoSProtectionConfig, location_name: "OnSourceDDoSProtectionConfig"))
1753
1779
  WebACL.struct_class = Types::WebACL
1754
1780
 
1755
1781
  WebACLSummaries.member = Shapes::ShapeRef.new(shape: WebACLSummary)
@@ -55,6 +55,16 @@ module Aws::WAFV2
55
55
  # rule group, `AWSManagedRulesACFPRuleSet`. This configuration is used
56
56
  # in `ManagedRuleGroupConfig`.
57
57
  #
58
+ # For additional information about this and the other intelligent threat
59
+ # mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
60
+ # and [Amazon Web Services Managed Rules rule groups list][2] in the
61
+ # *WAF Developer Guide*.
62
+ #
63
+ #
64
+ #
65
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
66
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
67
+ #
58
68
  # @!attribute [rw] creation_path
59
69
  # The path of the account creation endpoint for your application. This
60
70
  # is the page on your website that accepts the completed registration
@@ -131,6 +141,16 @@ module Aws::WAFV2
131
141
  # group, `AWSManagedRulesATPRuleSet`. This configuration is used in
132
142
  # `ManagedRuleGroupConfig`.
133
143
  #
144
+ # For additional information about this and the other intelligent threat
145
+ # mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
146
+ # and [Amazon Web Services Managed Rules rule groups list][2] in the
147
+ # *WAF Developer Guide*.
148
+ #
149
+ #
150
+ #
151
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
152
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
153
+ #
134
154
  # @!attribute [rw] login_path
135
155
  # The path of the login endpoint for your application. For example,
136
156
  # for the URL `https://example.com/web/login`, you would provide the
@@ -181,10 +201,75 @@ module Aws::WAFV2
181
201
  include Aws::Structure
182
202
  end
183
203
 
204
+ # Configures the use of the anti-DDoS managed rule group,
205
+ # `AWSManagedRulesAntiDDoSRuleSet`. This configuration is used in
206
+ # `ManagedRuleGroupConfig`.
207
+ #
208
+ # The configuration that you provide here determines whether and how the
209
+ # rules in the rule group are used.
210
+ #
211
+ # For additional information about this and the other intelligent threat
212
+ # mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
213
+ # and [Amazon Web Services Managed Rules rule groups list][2] in the
214
+ # *WAF Developer Guide*.
215
+ #
216
+ #
217
+ #
218
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
219
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
220
+ #
221
+ # @!attribute [rw] client_side_action_config
222
+ # Configures the request handling that's applied by the managed rule
223
+ # group rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`
224
+ # during a distributed denial of service (DDoS) attack.
225
+ # @return [Types::ClientSideActionConfig]
226
+ #
227
+ # @!attribute [rw] sensitivity_to_block
228
+ # The sensitivity that the rule group rule `DDoSRequests` uses when
229
+ # matching against the DDoS suspicion labeling on a request. The
230
+ # managed rule group adds the labeling during DDoS events, before the
231
+ # `DDoSRequests` rule runs.
232
+ #
233
+ # The higher the sensitivity, the more levels of labeling that the
234
+ # rule matches:
235
+ #
236
+ # * Low sensitivity is less sensitive, causing the rule to match only
237
+ # on the most likely participants in an attack, which are the
238
+ # requests with the high suspicion label
239
+ # `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request`.
240
+ #
241
+ # * Medium sensitivity causes the rule to match on the medium and high
242
+ # suspicion labels.
243
+ #
244
+ # * High sensitivity causes the rule to match on all of the suspicion
245
+ # labels: low, medium, and high.
246
+ #
247
+ # Default: `LOW`
248
+ # @return [String]
249
+ #
250
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/AWSManagedRulesAntiDDoSRuleSet AWS API Documentation
251
+ #
252
+ class AWSManagedRulesAntiDDoSRuleSet < Struct.new(
253
+ :client_side_action_config,
254
+ :sensitivity_to_block)
255
+ SENSITIVE = []
256
+ include Aws::Structure
257
+ end
258
+
184
259
  # Details for your use of the Bot Control managed rule group,
185
260
  # `AWSManagedRulesBotControlRuleSet`. This configuration is used in
186
261
  # `ManagedRuleGroupConfig`.
187
262
  #
263
+ # For additional information about this and the other intelligent threat
264
+ # mitigation rule groups, see [Intelligent threat mitigation in WAF][1]
265
+ # and [Amazon Web Services Managed Rules rule groups list][2] in the
266
+ # *WAF Developer Guide*.
267
+ #
268
+ #
269
+ #
270
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections
271
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list
272
+ #
188
273
  # @!attribute [rw] inspection_level
189
274
  # The inspection level to use for the Bot Control rule group. The
190
275
  # common level is the least expensive. The targeted level includes all
@@ -953,6 +1038,135 @@ module Aws::WAFV2
953
1038
  include Aws::Structure
954
1039
  end
955
1040
 
1041
+ # This is part of the `AWSManagedRulesAntiDDoSRuleSet`
1042
+ # `ClientSideActionConfig` configuration in `ManagedRuleGroupConfig`.
1043
+ #
1044
+ # @!attribute [rw] usage_of_action
1045
+ # Determines whether to use the `AWSManagedRulesAntiDDoSRuleSet` rules
1046
+ # `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the rule
1047
+ # group evaluation and the related label
1048
+ # `awswaf:managed:aws:anti-ddos:challengeable-request`.
1049
+ #
1050
+ # * If usage is enabled:
1051
+ #
1052
+ # * The managed rule group adds the label
1053
+ # `awswaf:managed:aws:anti-ddos:challengeable-request` to any web
1054
+ # request whose URL does *NOT* match the regular expressions
1055
+ # provided in the `ClientSideAction` setting
1056
+ # `ExemptUriRegularExpressions`.
1057
+ #
1058
+ # * The two rules are evaluated against web requests for protected
1059
+ # resources that are experiencing a DDoS attack. The two rules
1060
+ # only apply their action to matching requests that have the label
1061
+ # `awswaf:managed:aws:anti-ddos:challengeable-request`.
1062
+ # * If usage is disabled:
1063
+ #
1064
+ # * The managed rule group doesn't add the label
1065
+ # `awswaf:managed:aws:anti-ddos:challengeable-request` to any web
1066
+ # requests.
1067
+ #
1068
+ # * The two rules are not evaluated.
1069
+ #
1070
+ # * None of the other `ClientSideAction` settings have any effect.
1071
+ #
1072
+ # <note markdown="1"> This setting only enables or disables the use of the two anti-DDOS
1073
+ # rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests` in the
1074
+ # anti-DDoS managed rule group.
1075
+ #
1076
+ # This setting doesn't alter the action setting in the two rules. To
1077
+ # override the actions used by the rules `ChallengeAllDuringEvent` and
1078
+ # `ChallengeDDoSRequests`, enable this setting, and then override the
1079
+ # rule actions in the usual way, in your managed rule group
1080
+ # configuration.
1081
+ #
1082
+ # </note>
1083
+ # @return [String]
1084
+ #
1085
+ # @!attribute [rw] sensitivity
1086
+ # The sensitivity that the rule group rule `ChallengeDDoSRequests`
1087
+ # uses when matching against the DDoS suspicion labeling on a request.
1088
+ # The managed rule group adds the labeling during DDoS events, before
1089
+ # the `ChallengeDDoSRequests` rule runs.
1090
+ #
1091
+ # The higher the sensitivity, the more levels of labeling that the
1092
+ # rule matches:
1093
+ #
1094
+ # * Low sensitivity is less sensitive, causing the rule to match only
1095
+ # on the most likely participants in an attack, which are the
1096
+ # requests with the high suspicion label
1097
+ # `awswaf:managed:aws:anti-ddos:high-suspicion-ddos-request`.
1098
+ #
1099
+ # * Medium sensitivity causes the rule to match on the medium and high
1100
+ # suspicion labels.
1101
+ #
1102
+ # * High sensitivity causes the rule to match on all of the suspicion
1103
+ # labels: low, medium, and high.
1104
+ #
1105
+ # Default: `HIGH`
1106
+ # @return [String]
1107
+ #
1108
+ # @!attribute [rw] exempt_uri_regular_expressions
1109
+ # The regular expression to match against the web request URI, used to
1110
+ # identify requests that can't handle a silent browser challenge.
1111
+ # When the `ClientSideAction` setting `UsageOfAction` is enabled, the
1112
+ # managed rule group uses this setting to determine which requests to
1113
+ # label with `awswaf:managed:aws:anti-ddos:challengeable-request`. If
1114
+ # `UsageOfAction` is disabled, this setting has no effect and the
1115
+ # managed rule group doesn't add the label to any requests.
1116
+ #
1117
+ # The anti-DDoS managed rule group doesn't evaluate the rules
1118
+ # `ChallengeDDoSRequests` or `ChallengeAllDuringEvent` for web
1119
+ # requests whose URIs match this regex. This is true regardless of
1120
+ # whether you override the rule action for either of the rules in your
1121
+ # web ACL configuration.
1122
+ #
1123
+ # Amazon Web Services recommends using a regular expression.
1124
+ #
1125
+ # This setting is required if `UsageOfAction` is set to `ENABLED`. If
1126
+ # required, you can provide between 1 and 5 regex objects in the array
1127
+ # of settings.
1128
+ #
1129
+ # Amazon Web Services recommends starting with the following setting.
1130
+ # Review and update it for your application's needs:
1131
+ #
1132
+ # `\/api\/|\.(acc|avi|css|gif|jpe?g|js|mp[34]|ogg|otf|pdf|png|tiff?|ttf|webm|webp|woff2?)$`
1133
+ # @return [Array<Types::Regex>]
1134
+ #
1135
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ClientSideAction AWS API Documentation
1136
+ #
1137
+ class ClientSideAction < Struct.new(
1138
+ :usage_of_action,
1139
+ :sensitivity,
1140
+ :exempt_uri_regular_expressions)
1141
+ SENSITIVE = []
1142
+ include Aws::Structure
1143
+ end
1144
+
1145
+ # This is part of the configuration for the managed rules
1146
+ # `AWSManagedRulesAntiDDoSRuleSet` in `ManagedRuleGroupConfig`.
1147
+ #
1148
+ # @!attribute [rw] challenge
1149
+ # Configuration for the use of the `AWSManagedRulesAntiDDoSRuleSet`
1150
+ # rules `ChallengeAllDuringEvent` and `ChallengeDDoSRequests`.
1151
+ #
1152
+ # <note markdown="1"> This setting isn't related to the configuration of the `Challenge`
1153
+ # action itself. It only configures the use of the two anti-DDoS rules
1154
+ # named here.
1155
+ #
1156
+ # </note>
1157
+ #
1158
+ # You can enable or disable the use of these rules, and you can
1159
+ # configure how to use them when they are enabled.
1160
+ # @return [Types::ClientSideAction]
1161
+ #
1162
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ClientSideActionConfig AWS API Documentation
1163
+ #
1164
+ class ClientSideActionConfig < Struct.new(
1165
+ :challenge)
1166
+ SENSITIVE = []
1167
+ include Aws::Structure
1168
+ end
1169
+
956
1170
  # A single match condition for a Filter.
957
1171
  #
958
1172
  # @!attribute [rw] action_condition
@@ -1547,6 +1761,15 @@ module Aws::WAFV2
1547
1761
  # [1]: http://aws.amazon.com/waf/pricing/
1548
1762
  # @return [Types::AssociationConfig]
1549
1763
  #
1764
+ # @!attribute [rw] on_source_d_do_s_protection_config
1765
+ # Specifies the type of DDoS protection to apply to web request data
1766
+ # for a web ACL. For most scenarios, it is recommended to use the
1767
+ # default protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is
1768
+ # associated with multiple Application Load Balancers, the changes you
1769
+ # make to DDoS protection in that web ACL will apply to all associated
1770
+ # Application Load Balancers.
1771
+ # @return [Types::OnSourceDDoSProtectionConfig]
1772
+ #
1550
1773
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/CreateWebACLRequest AWS API Documentation
1551
1774
  #
1552
1775
  class CreateWebACLRequest < Struct.new(
@@ -1562,7 +1785,8 @@ module Aws::WAFV2
1562
1785
  :captcha_config,
1563
1786
  :challenge_config,
1564
1787
  :token_domains,
1565
- :association_config)
1788
+ :association_config,
1789
+ :on_source_d_do_s_protection_config)
1566
1790
  SENSITIVE = []
1567
1791
  include Aws::Structure
1568
1792
  end
@@ -5552,6 +5776,13 @@ module Aws::WAFV2
5552
5776
  # your application and the locations in the account creation request
5553
5777
  # payload of data, such as the user email and phone number fields.
5554
5778
  #
5779
+ # * Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to
5780
+ # configure the anti-DDoS managed rule group. The configuration
5781
+ # includes the sensitivity levels to use in the rules that typically
5782
+ # block and challenge requests that might be participating in DDoS
5783
+ # attacks and the specification to use to indicate whether a request
5784
+ # can handle a silent browser challenge.
5785
+ #
5555
5786
  # * Use the `AWSManagedRulesATPRuleSet` configuration object to
5556
5787
  # configure the account takeover prevention managed rule group. The
5557
5788
  # configuration includes the sign-in page of your application and the
@@ -5649,6 +5880,21 @@ module Aws::WAFV2
5649
5880
  # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html
5650
5881
  # @return [Types::AWSManagedRulesACFPRuleSet]
5651
5882
  #
5883
+ # @!attribute [rw] aws_managed_rules_anti_d_do_s_rule_set
5884
+ # Additional configuration for using the anti-DDoS managed rule group,
5885
+ # `AWSManagedRulesAntiDDoSRuleSet`. Use this to configure anti-DDoS
5886
+ # behavior for the rule group.
5887
+ #
5888
+ # For information about using the anti-DDoS managed rule group, see
5889
+ # [WAF Anti-DDoS rule group][1] and [Distributed Denial of Service
5890
+ # (DDoS) prevention][2] in the *WAF Developer Guide*.
5891
+ #
5892
+ #
5893
+ #
5894
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-anti-ddos.html
5895
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-anti-ddos.html
5896
+ # @return [Types::AWSManagedRulesAntiDDoSRuleSet]
5897
+ #
5652
5898
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ManagedRuleGroupConfig AWS API Documentation
5653
5899
  #
5654
5900
  class ManagedRuleGroupConfig < Struct.new(
@@ -5658,7 +5904,8 @@ module Aws::WAFV2
5658
5904
  :password_field,
5659
5905
  :aws_managed_rules_bot_control_rule_set,
5660
5906
  :aws_managed_rules_atp_rule_set,
5661
- :aws_managed_rules_acfp_rule_set)
5907
+ :aws_managed_rules_acfp_rule_set,
5908
+ :aws_managed_rules_anti_d_do_s_rule_set)
5662
5909
  SENSITIVE = []
5663
5910
  include Aws::Structure
5664
5911
  end
@@ -5738,6 +5985,13 @@ module Aws::WAFV2
5738
5985
  # creation request payload of data, such as the user email and phone
5739
5986
  # number fields.
5740
5987
  #
5988
+ # * Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to
5989
+ # configure the anti-DDoS managed rule group. The configuration
5990
+ # includes the sensitivity levels to use in the rules that typically
5991
+ # block and challenge requests that might be participating in DDoS
5992
+ # attacks and the specification to use to indicate whether a request
5993
+ # can handle a silent browser challenge.
5994
+ #
5741
5995
  # * Use the `AWSManagedRulesATPRuleSet` configuration object to
5742
5996
  # configure the account takeover prevention managed rule group. The
5743
5997
  # configuration includes the sign-in page of your application and
@@ -5754,10 +6008,12 @@ module Aws::WAFV2
5754
6008
  # configured inside the rule group. You specify one override for each
5755
6009
  # rule whose action you want to change.
5756
6010
  #
5757
- # <note markdown="1"> Take care to verify the rule names in your overrides. If you provide
5758
- # a rule name that doesn't match the name of any rule in the rule
5759
- # group, WAF doesn't return an error and doesn't apply the override
5760
- # setting.
6011
+ # <note markdown="1"> Verify the rule names in your overrides carefully. With managed rule
6012
+ # groups, WAF silently ignores any override that uses an invalid rule
6013
+ # name. With customer-owned rule groups, invalid rule names in your
6014
+ # overrides will cause web ACL updates to fail. An invalid rule name
6015
+ # is any name that doesn't exactly match the case-sensitive name of
6016
+ # an existing rule in the rule group.
5761
6017
  #
5762
6018
  # </note>
5763
6019
  #
@@ -6163,6 +6419,31 @@ module Aws::WAFV2
6163
6419
  include Aws::Structure
6164
6420
  end
6165
6421
 
6422
+ # Configures the level of DDoS protection that applies to web ACLs
6423
+ # associated with Application Load Balancers.
6424
+ #
6425
+ # @!attribute [rw] alb_low_reputation_mode
6426
+ # The level of DDoS protection that applies to web ACLs associated
6427
+ # with Application Load Balancers. `ACTIVE_UNDER_DDOS` protection is
6428
+ # enabled by default whenever a web ACL is associated with an
6429
+ # Application Load Balancer. In the event that an Application Load
6430
+ # Balancer experiences high-load conditions or suspected DDoS attacks,
6431
+ # the `ACTIVE_UNDER_DDOS` protection automatically rate limits traffic
6432
+ # from known low reputation sources without disrupting Application
6433
+ # Load Balancer availability. `ALWAYS_ON` protection provides
6434
+ # constant, always-on monitoring of known low reputation sources for
6435
+ # suspected DDoS attacks. While this provides a higher level of
6436
+ # protection, there may be potential impacts on legitimate traffic.
6437
+ # @return [String]
6438
+ #
6439
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/OnSourceDDoSProtectionConfig AWS API Documentation
6440
+ #
6441
+ class OnSourceDDoSProtectionConfig < Struct.new(
6442
+ :alb_low_reputation_mode)
6443
+ SENSITIVE = []
6444
+ include Aws::Structure
6445
+ end
6446
+
6166
6447
  # A logical rule statement used to combine other rule statements with OR
6167
6448
  # logic. You provide more than one Statement within the `OrStatement`.
6168
6449
  #
@@ -7137,7 +7418,9 @@ module Aws::WAFV2
7137
7418
  include Aws::Structure
7138
7419
  end
7139
7420
 
7140
- # A single regular expression. This is used in a RegexPatternSet.
7421
+ # A single regular expression. This is used in a RegexPatternSet and
7422
+ # also in the configuration for the Amazon Web Services Managed Rules
7423
+ # rule group `AWSManagedRulesAntiDDoSRuleSet`.
7141
7424
  #
7142
7425
  # @!attribute [rw] regex_string
7143
7426
  # The string representing the regular expression.
@@ -8220,10 +8503,12 @@ module Aws::WAFV2
8220
8503
  # configured inside the rule group. You specify one override for each
8221
8504
  # rule whose action you want to change.
8222
8505
  #
8223
- # <note markdown="1"> Take care to verify the rule names in your overrides. If you provide
8224
- # a rule name that doesn't match the name of any rule in the rule
8225
- # group, WAF doesn't return an error and doesn't apply the override
8226
- # setting.
8506
+ # <note markdown="1"> Verify the rule names in your overrides carefully. With managed rule
8507
+ # groups, WAF silently ignores any override that uses an invalid rule
8508
+ # name. With customer-owned rule groups, invalid rule names in your
8509
+ # overrides will cause web ACL updates to fail. An invalid rule name
8510
+ # is any name that doesn't exactly match the case-sensitive name of
8511
+ # an existing rule in the rule group.
8227
8512
  #
8228
8513
  # </note>
8229
8514
  #
@@ -9587,6 +9872,15 @@ module Aws::WAFV2
9587
9872
  # [1]: http://aws.amazon.com/waf/pricing/
9588
9873
  # @return [Types::AssociationConfig]
9589
9874
  #
9875
+ # @!attribute [rw] on_source_d_do_s_protection_config
9876
+ # Specifies the type of DDoS protection to apply to web request data
9877
+ # for a web ACL. For most scenarios, it is recommended to use the
9878
+ # default protection level, `ACTIVE_UNDER_DDOS`. If a web ACL is
9879
+ # associated with multiple Application Load Balancers, the changes you
9880
+ # make to DDoS protection in that web ACL will apply to all associated
9881
+ # Application Load Balancers.
9882
+ # @return [Types::OnSourceDDoSProtectionConfig]
9883
+ #
9590
9884
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/UpdateWebACLRequest AWS API Documentation
9591
9885
  #
9592
9886
  class UpdateWebACLRequest < Struct.new(
@@ -9603,7 +9897,8 @@ module Aws::WAFV2
9603
9897
  :captcha_config,
9604
9898
  :challenge_config,
9605
9899
  :token_domains,
9606
- :association_config)
9900
+ :association_config,
9901
+ :on_source_d_do_s_protection_config)
9607
9902
  SENSITIVE = []
9608
9903
  include Aws::Structure
9609
9904
  end
@@ -10381,6 +10676,11 @@ module Aws::WAFV2
10381
10676
  # `PostProcessFirewallManagerRuleGroups`.
10382
10677
  # @return [Boolean]
10383
10678
  #
10679
+ # @!attribute [rw] on_source_d_do_s_protection_config
10680
+ # Configures the level of DDoS protection that applies to web ACLs
10681
+ # associated with Application Load Balancers.
10682
+ # @return [Types::OnSourceDDoSProtectionConfig]
10683
+ #
10384
10684
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/WebACL AWS API Documentation
10385
10685
  #
10386
10686
  class WebACL < Struct.new(
@@ -10402,7 +10702,8 @@ module Aws::WAFV2
10402
10702
  :challenge_config,
10403
10703
  :token_domains,
10404
10704
  :association_config,
10405
- :retrofitted_by_firewall_manager)
10705
+ :retrofitted_by_firewall_manager,
10706
+ :on_source_d_do_s_protection_config)
10406
10707
  SENSITIVE = []
10407
10708
  include Aws::Structure
10408
10709
  end
data/lib/aws-sdk-wafv2.rb CHANGED
@@ -54,7 +54,7 @@ module Aws::WAFV2
54
54
  autoload :EndpointProvider, 'aws-sdk-wafv2/endpoint_provider'
55
55
  autoload :Endpoints, 'aws-sdk-wafv2/endpoints'
56
56
 
57
- GEM_VERSION = '1.110.0'
57
+ GEM_VERSION = '1.111.0'
58
58
 
59
59
  end
60
60
 
data/sig/client.rbs CHANGED
@@ -723,6 +723,20 @@ module Aws
723
723
  }?
724
724
  }?,
725
725
  enable_regex_in_path: bool?
726
+ }?,
727
+ aws_managed_rules_anti_d_do_s_rule_set: {
728
+ client_side_action_config: {
729
+ challenge: {
730
+ usage_of_action: ("ENABLED" | "DISABLED"),
731
+ sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
732
+ exempt_uri_regular_expressions: Array[
733
+ {
734
+ regex_string: ::String?
735
+ },
736
+ ]?
737
+ }
738
+ },
739
+ sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
726
740
  }?
727
741
  },
728
742
  ]?,
@@ -1653,6 +1667,20 @@ module Aws
1653
1667
  }?
1654
1668
  }?,
1655
1669
  enable_regex_in_path: bool?
1670
+ }?,
1671
+ aws_managed_rules_anti_d_do_s_rule_set: {
1672
+ client_side_action_config: {
1673
+ challenge: {
1674
+ usage_of_action: ("ENABLED" | "DISABLED"),
1675
+ sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
1676
+ exempt_uri_regular_expressions: Array[
1677
+ {
1678
+ regex_string: ::String?
1679
+ },
1680
+ ]?
1681
+ }
1682
+ },
1683
+ sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
1656
1684
  }?
1657
1685
  },
1658
1686
  ]?,
@@ -2567,6 +2595,20 @@ module Aws
2567
2595
  }?
2568
2596
  }?,
2569
2597
  enable_regex_in_path: bool?
2598
+ }?,
2599
+ aws_managed_rules_anti_d_do_s_rule_set: {
2600
+ client_side_action_config: {
2601
+ challenge: {
2602
+ usage_of_action: ("ENABLED" | "DISABLED"),
2603
+ sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
2604
+ exempt_uri_regular_expressions: Array[
2605
+ {
2606
+ regex_string: ::String?
2607
+ },
2608
+ ]?
2609
+ }
2610
+ },
2611
+ sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
2570
2612
  }?
2571
2613
  },
2572
2614
  ]?,
@@ -2845,6 +2887,9 @@ module Aws
2845
2887
  request_body: Hash[("CLOUDFRONT" | "API_GATEWAY" | "COGNITO_USER_POOL" | "APP_RUNNER_SERVICE" | "VERIFIED_ACCESS_INSTANCE"), {
2846
2888
  default_size_inspection_limit: ("KB_16" | "KB_32" | "KB_48" | "KB_64")
2847
2889
  }]?
2890
+ },
2891
+ ?on_source_d_do_s_protection_config: {
2892
+ alb_low_reputation_mode: ("ACTIVE_UNDER_DDOS" | "ALWAYS_ON")
2848
2893
  }
2849
2894
  ) -> _CreateWebACLResponseSuccess
2850
2895
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateWebACLResponseSuccess
@@ -4154,6 +4199,20 @@ module Aws
4154
4199
  }?
4155
4200
  }?,
4156
4201
  enable_regex_in_path: bool?
4202
+ }?,
4203
+ aws_managed_rules_anti_d_do_s_rule_set: {
4204
+ client_side_action_config: {
4205
+ challenge: {
4206
+ usage_of_action: ("ENABLED" | "DISABLED"),
4207
+ sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
4208
+ exempt_uri_regular_expressions: Array[
4209
+ {
4210
+ regex_string: ::String?
4211
+ },
4212
+ ]?
4213
+ }
4214
+ },
4215
+ sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
4157
4216
  }?
4158
4217
  },
4159
4218
  ]?,
@@ -5064,6 +5123,20 @@ module Aws
5064
5123
  }?
5065
5124
  }?,
5066
5125
  enable_regex_in_path: bool?
5126
+ }?,
5127
+ aws_managed_rules_anti_d_do_s_rule_set: {
5128
+ client_side_action_config: {
5129
+ challenge: {
5130
+ usage_of_action: ("ENABLED" | "DISABLED"),
5131
+ sensitivity: ("LOW" | "MEDIUM" | "HIGH")?,
5132
+ exempt_uri_regular_expressions: Array[
5133
+ {
5134
+ regex_string: ::String?
5135
+ },
5136
+ ]?
5137
+ }
5138
+ },
5139
+ sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")?
5067
5140
  }?
5068
5141
  },
5069
5142
  ]?,
@@ -5337,6 +5410,9 @@ module Aws
5337
5410
  request_body: Hash[("CLOUDFRONT" | "API_GATEWAY" | "COGNITO_USER_POOL" | "APP_RUNNER_SERVICE" | "VERIFIED_ACCESS_INSTANCE"), {
5338
5411
  default_size_inspection_limit: ("KB_16" | "KB_32" | "KB_48" | "KB_64")
5339
5412
  }]?
5413
+ },
5414
+ ?on_source_d_do_s_protection_config: {
5415
+ alb_low_reputation_mode: ("ACTIVE_UNDER_DDOS" | "ALWAYS_ON")
5340
5416
  }
5341
5417
  ) -> _UpdateWebACLResponseSuccess
5342
5418
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateWebACLResponseSuccess
data/sig/types.rbs CHANGED
@@ -33,6 +33,12 @@ module Aws::WAFV2
33
33
  SENSITIVE: []
34
34
  end
35
35
 
36
+ class AWSManagedRulesAntiDDoSRuleSet
37
+ attr_accessor client_side_action_config: Types::ClientSideActionConfig
38
+ attr_accessor sensitivity_to_block: ("LOW" | "MEDIUM" | "HIGH")
39
+ SENSITIVE: []
40
+ end
41
+
36
42
  class AWSManagedRulesBotControlRuleSet
37
43
  attr_accessor inspection_level: ("COMMON" | "TARGETED")
38
44
  attr_accessor enable_machine_learning: bool
@@ -148,6 +154,18 @@ module Aws::WAFV2
148
154
  SENSITIVE: []
149
155
  end
150
156
 
157
+ class ClientSideAction
158
+ attr_accessor usage_of_action: ("ENABLED" | "DISABLED")
159
+ attr_accessor sensitivity: ("LOW" | "MEDIUM" | "HIGH")
160
+ attr_accessor exempt_uri_regular_expressions: ::Array[Types::Regex]
161
+ SENSITIVE: []
162
+ end
163
+
164
+ class ClientSideActionConfig
165
+ attr_accessor challenge: Types::ClientSideAction
166
+ SENSITIVE: []
167
+ end
168
+
151
169
  class Condition
152
170
  attr_accessor action_condition: Types::ActionCondition
153
171
  attr_accessor label_name_condition: Types::LabelNameCondition
@@ -244,6 +262,7 @@ module Aws::WAFV2
244
262
  attr_accessor challenge_config: Types::ChallengeConfig
245
263
  attr_accessor token_domains: ::Array[::String]
246
264
  attr_accessor association_config: Types::AssociationConfig
265
+ attr_accessor on_source_d_do_s_protection_config: Types::OnSourceDDoSProtectionConfig
247
266
  SENSITIVE: []
248
267
  end
249
268
 
@@ -972,6 +991,7 @@ module Aws::WAFV2
972
991
  attr_accessor aws_managed_rules_bot_control_rule_set: Types::AWSManagedRulesBotControlRuleSet
973
992
  attr_accessor aws_managed_rules_atp_rule_set: Types::AWSManagedRulesATPRuleSet
974
993
  attr_accessor aws_managed_rules_acfp_rule_set: Types::AWSManagedRulesACFPRuleSet
994
+ attr_accessor aws_managed_rules_anti_d_do_s_rule_set: Types::AWSManagedRulesAntiDDoSRuleSet
975
995
  SENSITIVE: []
976
996
  end
977
997
 
@@ -1050,6 +1070,11 @@ module Aws::WAFV2
1050
1070
  SENSITIVE: []
1051
1071
  end
1052
1072
 
1073
+ class OnSourceDDoSProtectionConfig
1074
+ attr_accessor alb_low_reputation_mode: ("ACTIVE_UNDER_DDOS" | "ALWAYS_ON")
1075
+ SENSITIVE: []
1076
+ end
1077
+
1053
1078
  class OrStatement
1054
1079
  attr_accessor statements: ::Array[Types::Statement]
1055
1080
  SENSITIVE: []
@@ -1540,6 +1565,7 @@ module Aws::WAFV2
1540
1565
  attr_accessor challenge_config: Types::ChallengeConfig
1541
1566
  attr_accessor token_domains: ::Array[::String]
1542
1567
  attr_accessor association_config: Types::AssociationConfig
1568
+ attr_accessor on_source_d_do_s_protection_config: Types::OnSourceDDoSProtectionConfig
1543
1569
  SENSITIVE: []
1544
1570
  end
1545
1571
 
@@ -1606,7 +1632,7 @@ module Aws::WAFV2
1606
1632
 
1607
1633
  class WAFInvalidParameterException
1608
1634
  attr_accessor message: ::String
1609
- attr_accessor field: ("WEB_ACL" | "RULE_GROUP" | "REGEX_PATTERN_SET" | "IP_SET" | "MANAGED_RULE_SET" | "RULE" | "EXCLUDED_RULE" | "STATEMENT" | "BYTE_MATCH_STATEMENT" | "SQLI_MATCH_STATEMENT" | "XSS_MATCH_STATEMENT" | "SIZE_CONSTRAINT_STATEMENT" | "GEO_MATCH_STATEMENT" | "RATE_BASED_STATEMENT" | "RULE_GROUP_REFERENCE_STATEMENT" | "REGEX_PATTERN_REFERENCE_STATEMENT" | "IP_SET_REFERENCE_STATEMENT" | "MANAGED_RULE_SET_STATEMENT" | "LABEL_MATCH_STATEMENT" | "AND_STATEMENT" | "OR_STATEMENT" | "NOT_STATEMENT" | "IP_ADDRESS" | "IP_ADDRESS_VERSION" | "FIELD_TO_MATCH" | "TEXT_TRANSFORMATION" | "SINGLE_QUERY_ARGUMENT" | "SINGLE_HEADER" | "DEFAULT_ACTION" | "RULE_ACTION" | "ENTITY_LIMIT" | "OVERRIDE_ACTION" | "SCOPE_VALUE" | "RESOURCE_ARN" | "RESOURCE_TYPE" | "TAGS" | "TAG_KEYS" | "METRIC_NAME" | "FIREWALL_MANAGER_STATEMENT" | "FALLBACK_BEHAVIOR" | "POSITION" | "FORWARDED_IP_CONFIG" | "IP_SET_FORWARDED_IP_CONFIG" | "HEADER_NAME" | "CUSTOM_REQUEST_HANDLING" | "RESPONSE_CONTENT_TYPE" | "CUSTOM_RESPONSE" | "CUSTOM_RESPONSE_BODY" | "JSON_MATCH_PATTERN" | "JSON_MATCH_SCOPE" | "BODY_PARSING_FALLBACK_BEHAVIOR" | "LOGGING_FILTER" | "FILTER_CONDITION" | "EXPIRE_TIMESTAMP" | "CHANGE_PROPAGATION_STATUS" | "ASSOCIABLE_RESOURCE" | "LOG_DESTINATION" | "MANAGED_RULE_GROUP_CONFIG" | "PAYLOAD_TYPE" | "HEADER_MATCH_PATTERN" | "COOKIE_MATCH_PATTERN" | "MAP_MATCH_SCOPE" | "OVERSIZE_HANDLING" | "CHALLENGE_CONFIG" | "TOKEN_DOMAIN" | "ATP_RULE_SET_RESPONSE_INSPECTION" | "ASSOCIATED_RESOURCE_TYPE" | "SCOPE_DOWN" | "CUSTOM_KEYS" | "ACP_RULE_SET_RESPONSE_INSPECTION" | "DATA_PROTECTION_CONFIG")
1635
+ attr_accessor field: ("WEB_ACL" | "RULE_GROUP" | "REGEX_PATTERN_SET" | "IP_SET" | "MANAGED_RULE_SET" | "RULE" | "EXCLUDED_RULE" | "STATEMENT" | "BYTE_MATCH_STATEMENT" | "SQLI_MATCH_STATEMENT" | "XSS_MATCH_STATEMENT" | "SIZE_CONSTRAINT_STATEMENT" | "GEO_MATCH_STATEMENT" | "RATE_BASED_STATEMENT" | "RULE_GROUP_REFERENCE_STATEMENT" | "REGEX_PATTERN_REFERENCE_STATEMENT" | "IP_SET_REFERENCE_STATEMENT" | "MANAGED_RULE_SET_STATEMENT" | "LABEL_MATCH_STATEMENT" | "AND_STATEMENT" | "OR_STATEMENT" | "NOT_STATEMENT" | "IP_ADDRESS" | "IP_ADDRESS_VERSION" | "FIELD_TO_MATCH" | "TEXT_TRANSFORMATION" | "SINGLE_QUERY_ARGUMENT" | "SINGLE_HEADER" | "DEFAULT_ACTION" | "RULE_ACTION" | "ENTITY_LIMIT" | "OVERRIDE_ACTION" | "SCOPE_VALUE" | "RESOURCE_ARN" | "RESOURCE_TYPE" | "TAGS" | "TAG_KEYS" | "METRIC_NAME" | "FIREWALL_MANAGER_STATEMENT" | "FALLBACK_BEHAVIOR" | "POSITION" | "FORWARDED_IP_CONFIG" | "IP_SET_FORWARDED_IP_CONFIG" | "HEADER_NAME" | "CUSTOM_REQUEST_HANDLING" | "RESPONSE_CONTENT_TYPE" | "CUSTOM_RESPONSE" | "CUSTOM_RESPONSE_BODY" | "JSON_MATCH_PATTERN" | "JSON_MATCH_SCOPE" | "BODY_PARSING_FALLBACK_BEHAVIOR" | "LOGGING_FILTER" | "FILTER_CONDITION" | "EXPIRE_TIMESTAMP" | "CHANGE_PROPAGATION_STATUS" | "ASSOCIABLE_RESOURCE" | "LOG_DESTINATION" | "MANAGED_RULE_GROUP_CONFIG" | "PAYLOAD_TYPE" | "HEADER_MATCH_PATTERN" | "COOKIE_MATCH_PATTERN" | "MAP_MATCH_SCOPE" | "OVERSIZE_HANDLING" | "CHALLENGE_CONFIG" | "TOKEN_DOMAIN" | "ATP_RULE_SET_RESPONSE_INSPECTION" | "ASSOCIATED_RESOURCE_TYPE" | "SCOPE_DOWN" | "CUSTOM_KEYS" | "ACP_RULE_SET_RESPONSE_INSPECTION" | "DATA_PROTECTION_CONFIG" | "LOW_REPUTATION_MODE")
1610
1636
  attr_accessor parameter: ::String
1611
1637
  attr_accessor reason: ::String
1612
1638
  SENSITIVE: []
@@ -1693,6 +1719,7 @@ module Aws::WAFV2
1693
1719
  attr_accessor token_domains: ::Array[::String]
1694
1720
  attr_accessor association_config: Types::AssociationConfig
1695
1721
  attr_accessor retrofitted_by_firewall_manager: bool
1722
+ attr_accessor on_source_d_do_s_protection_config: Types::OnSourceDDoSProtectionConfig
1696
1723
  SENSITIVE: []
1697
1724
  end
1698
1725
 
metadata CHANGED
@@ -1,7 +1,7 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-wafv2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.110.0
4
+ version: 1.111.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services