aws-sdk-wafv2 1.46.0 → 1.48.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -10,7 +10,53 @@
10
10
  module Aws::WAFV2
11
11
  module Types
12
12
 
13
- # Details for your use of the Bot Control managed rule group, used in
13
+ # Details for your use of the account takeover prevention managed rule
14
+ # group, `AWSManagedRulesATPRuleSet`. This configuration is used in
15
+ # `ManagedRuleGroupConfig`.
16
+ #
17
+ # @!attribute [rw] login_path
18
+ # The path of the login endpoint for your application. For example,
19
+ # for the URL `https://example.com/web/login`, you would provide the
20
+ # path `/web/login`.
21
+ #
22
+ # The rule group inspects only HTTP `POST` requests to your specified
23
+ # login endpoint.
24
+ # @return [String]
25
+ #
26
+ # @!attribute [rw] request_inspection
27
+ # The criteria for inspecting login requests, used by the ATP rule
28
+ # group to validate credentials usage.
29
+ # @return [Types::RequestInspection]
30
+ #
31
+ # @!attribute [rw] response_inspection
32
+ # The criteria for inspecting responses to login requests, used by the
33
+ # ATP rule group to track login failure rates.
34
+ #
35
+ # The ATP rule group evaluates the responses that your protected
36
+ # resources send back to client login attempts, keeping count of
37
+ # successful and failed attempts from each IP address and client
38
+ # session. Using this information, the rule group labels and mitigates
39
+ # requests from client sessions and IP addresses that submit too many
40
+ # failed login attempts in a short amount of time.
41
+ #
42
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect
43
+ # Amazon CloudFront distributions.
44
+ #
45
+ # </note>
46
+ # @return [Types::ResponseInspection]
47
+ #
48
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/AWSManagedRulesATPRuleSet AWS API Documentation
49
+ #
50
+ class AWSManagedRulesATPRuleSet < Struct.new(
51
+ :login_path,
52
+ :request_inspection,
53
+ :response_inspection)
54
+ SENSITIVE = []
55
+ include Aws::Structure
56
+ end
57
+
58
+ # Details for your use of the Bot Control managed rule group,
59
+ # `AWSManagedRulesBotControlRuleSet`. This configuration is used in
14
60
  # `ManagedRuleGroupConfig`.
15
61
  #
16
62
  # @!attribute [rw] inspection_level
@@ -239,7 +285,7 @@ module Aws::WAFV2
239
285
  # @!attribute [rw] search_string
240
286
  # A string value that you want WAF to search for. WAF searches only in
241
287
  # the part of web requests that you designate for inspection in
242
- # FieldToMatch. The maximum length of the value is 50 bytes.
288
+ # FieldToMatch. The maximum length of the value is 200 bytes.
243
289
  #
244
290
  # Valid values depend on the component that you specify for inspection
245
291
  # in `FieldToMatch`\:
@@ -256,7 +302,7 @@ module Aws::WAFV2
256
302
  # **If you're using the WAF API**
257
303
  #
258
304
  # Specify a base64-encoded version of the value. The maximum length of
259
- # the value before you base64-encode it is 50 bytes.
305
+ # the value before you base64-encode it is 200 bytes.
260
306
  #
261
307
  # For example, suppose the value of `Type` is `HEADER` and the value
262
308
  # of `Data` is `User-Agent`. If you want to search the `User-Agent`
@@ -2574,8 +2620,8 @@ module Aws::WAFV2
2574
2620
  # @return [String]
2575
2621
  #
2576
2622
  # @!attribute [rw] rule_metric_name
2577
- # The metric name assigned to the `Rule` or `RuleGroup` for which you
2578
- # want a sample of requests.
2623
+ # The metric name assigned to the `Rule` or `RuleGroup` dimension for
2624
+ # which you want a sample of requests.
2579
2625
  # @return [String]
2580
2626
  #
2581
2627
  # @!attribute [rw] scope
@@ -4209,6 +4255,11 @@ module Aws::WAFV2
4209
4255
  # Additional information that's used by a managed rule group. Many
4210
4256
  # managed rule groups don't require this.
4211
4257
  #
4258
+ # Use the `AWSManagedRulesATPRuleSet` configuration object for the
4259
+ # account takeover prevention managed rule group, to provide information
4260
+ # such as the sign-in page of your application and the type of content
4261
+ # to accept or reject from the client.
4262
+ #
4212
4263
  # Use the `AWSManagedRulesBotControlRuleSet` configuration object to
4213
4264
  # configure the protection level that you want the Bot Control rule
4214
4265
  # group to use.
@@ -4216,22 +4267,31 @@ module Aws::WAFV2
4216
4267
  # For example specifications, see the examples section of CreateWebACL.
4217
4268
  #
4218
4269
  # @!attribute [rw] login_path
4219
- # The path of the login endpoint for your application. For example,
4220
- # for the URL `https://example.com/web/login`, you would provide the
4221
- # path `/web/login`.
4270
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4271
+ # `AWSManagedRulesATPRuleSet`.
4272
+ #
4273
+ # </note>
4222
4274
  # @return [String]
4223
4275
  #
4224
4276
  # @!attribute [rw] payload_type
4225
- # The payload type for your login endpoint, either JSON or form
4226
- # encoded.
4277
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4278
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4279
+ #
4280
+ # </note>
4227
4281
  # @return [String]
4228
4282
  #
4229
4283
  # @!attribute [rw] username_field
4230
- # Details about your login page username field.
4284
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4285
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4286
+ #
4287
+ # </note>
4231
4288
  # @return [Types::UsernameField]
4232
4289
  #
4233
4290
  # @!attribute [rw] password_field
4234
- # Details about your login page password field.
4291
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4292
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4293
+ #
4294
+ # </note>
4235
4295
  # @return [Types::PasswordField]
4236
4296
  #
4237
4297
  # @!attribute [rw] aws_managed_rules_bot_control_rule_set
@@ -4247,6 +4307,27 @@ module Aws::WAFV2
4247
4307
  # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html
4248
4308
  # @return [Types::AWSManagedRulesBotControlRuleSet]
4249
4309
  #
4310
+ # @!attribute [rw] aws_managed_rules_atp_rule_set
4311
+ # Additional configuration for using the account takeover prevention
4312
+ # (ATP) managed rule group, `AWSManagedRulesATPRuleSet`. Use this to
4313
+ # provide login request information to the rule group. For web ACLs
4314
+ # that protect CloudFront distributions, use this to also provide the
4315
+ # information about how your distribution responds to login requests.
4316
+ # This configuration replaces the individual configuration fields in
4317
+ # `ManagedRuleGroupConfig` and provides additional feature
4318
+ # configuration.
4319
+ #
4320
+ # For information about using the ATP managed rule group, see [WAF
4321
+ # Fraud Control account takeover prevention (ATP) rule group][1] and
4322
+ # [WAF Fraud Control account takeover prevention (ATP)][2] in the *WAF
4323
+ # Developer Guide*.
4324
+ #
4325
+ #
4326
+ #
4327
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-atp.html
4328
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-atp.html
4329
+ # @return [Types::AWSManagedRulesATPRuleSet]
4330
+ #
4250
4331
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ManagedRuleGroupConfig AWS API Documentation
4251
4332
  #
4252
4333
  class ManagedRuleGroupConfig < Struct.new(
@@ -4254,7 +4335,8 @@ module Aws::WAFV2
4254
4335
  :payload_type,
4255
4336
  :username_field,
4256
4337
  :password_field,
4257
- :aws_managed_rules_bot_control_rule_set)
4338
+ :aws_managed_rules_bot_control_rule_set,
4339
+ :aws_managed_rules_atp_rule_set)
4258
4340
  SENSITIVE = []
4259
4341
  include Aws::Structure
4260
4342
  end
@@ -4320,6 +4402,11 @@ module Aws::WAFV2
4320
4402
  # Additional information that's used by a managed rule group. Many
4321
4403
  # managed rule groups don't require this.
4322
4404
  #
4405
+ # Use the `AWSManagedRulesATPRuleSet` configuration object for the
4406
+ # account takeover prevention managed rule group, to provide
4407
+ # information such as the sign-in page of your application and the
4408
+ # type of content to accept or reject from the client.
4409
+ #
4323
4410
  # Use the `AWSManagedRulesBotControlRuleSet` configuration object to
4324
4411
  # configure the protection level that you want the Bot Control rule
4325
4412
  # group to use.
@@ -4785,8 +4872,9 @@ module Aws::WAFV2
4785
4872
  include Aws::Structure
4786
4873
  end
4787
4874
 
4788
- # Details about your login page password field, used in a
4789
- # `ManagedRuleGroupConfig`.
4875
+ # Details about your login page password field for request inspection,
4876
+ # used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
4877
+ # configuration.
4790
4878
  #
4791
4879
  # @!attribute [rw] identifier
4792
4880
  # The name of the password field. For example `/form/password`.
@@ -4990,7 +5078,7 @@ module Aws::WAFV2
4990
5078
  # rate-based rule with a nested AND rule statement that contains the
4991
5079
  # following nested statements:
4992
5080
  #
4993
- # * An IP match statement with an IP set that specified the address
5081
+ # * An IP match statement with an IP set that specifies the address
4994
5082
  # 192.0.2.44.
4995
5083
  #
4996
5084
  # * A string match statement that searches in the User-Agent header for
@@ -5272,6 +5360,272 @@ module Aws::WAFV2
5272
5360
  include Aws::Structure
5273
5361
  end
5274
5362
 
5363
+ # The criteria for inspecting login requests, used by the ATP rule group
5364
+ # to validate credentials usage.
5365
+ #
5366
+ # This is part of the `AWSManagedRulesATPRuleSet` configuration in
5367
+ # `ManagedRuleGroupConfig`.
5368
+ #
5369
+ # In these settings, you specify how your application accepts login
5370
+ # attempts by providing the request payload type and the names of the
5371
+ # fields within the request body where the username and password are
5372
+ # provided.
5373
+ #
5374
+ # @!attribute [rw] payload_type
5375
+ # The payload type for your login endpoint, either JSON or form
5376
+ # encoded.
5377
+ # @return [String]
5378
+ #
5379
+ # @!attribute [rw] username_field
5380
+ # Details about your login page username field.
5381
+ #
5382
+ # How you specify this depends on the payload type.
5383
+ #
5384
+ # * For JSON payloads, specify the field name in JSON pointer syntax.
5385
+ # For information about the JSON Pointer syntax, see the Internet
5386
+ # Engineering Task Force (IETF) documentation [JavaScript Object
5387
+ # Notation (JSON) Pointer][1].
5388
+ #
5389
+ # For example, for the JSON payload `\{ "login": \{ "username":
5390
+ # "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
5391
+ # field specification is `/login/username` and the password field
5392
+ # specification is `/login/password`.
5393
+ #
5394
+ # * For form encoded payload types, use the HTML form names.
5395
+ #
5396
+ # For example, for an HTML form with input elements named
5397
+ # `username1` and `password1`, the username field specification is
5398
+ # `username1` and the password field specification is `password1`.
5399
+ #
5400
+ #
5401
+ #
5402
+ # [1]: https://tools.ietf.org/html/rfc6901
5403
+ # @return [Types::UsernameField]
5404
+ #
5405
+ # @!attribute [rw] password_field
5406
+ # Details about your login page password field.
5407
+ #
5408
+ # How you specify this depends on the payload type.
5409
+ #
5410
+ # * For JSON payloads, specify the field name in JSON pointer syntax.
5411
+ # For information about the JSON Pointer syntax, see the Internet
5412
+ # Engineering Task Force (IETF) documentation [JavaScript Object
5413
+ # Notation (JSON) Pointer][1].
5414
+ #
5415
+ # For example, for the JSON payload `\{ "login": \{ "username":
5416
+ # "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
5417
+ # field specification is `/login/username` and the password field
5418
+ # specification is `/login/password`.
5419
+ #
5420
+ # * For form encoded payload types, use the HTML form names.
5421
+ #
5422
+ # For example, for an HTML form with input elements named
5423
+ # `username1` and `password1`, the username field specification is
5424
+ # `username1` and the password field specification is `password1`.
5425
+ #
5426
+ #
5427
+ #
5428
+ # [1]: https://tools.ietf.org/html/rfc6901
5429
+ # @return [Types::PasswordField]
5430
+ #
5431
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/RequestInspection AWS API Documentation
5432
+ #
5433
+ class RequestInspection < Struct.new(
5434
+ :payload_type,
5435
+ :username_field,
5436
+ :password_field)
5437
+ SENSITIVE = []
5438
+ include Aws::Structure
5439
+ end
5440
+
5441
+ # The criteria for inspecting responses to login requests, used by the
5442
+ # ATP rule group to track login failure rates.
5443
+ #
5444
+ # The ATP rule group evaluates the responses that your protected
5445
+ # resources send back to client login attempts, keeping count of
5446
+ # successful and failed attempts from each IP address and client
5447
+ # session. Using this information, the rule group labels and mitigates
5448
+ # requests from client sessions and IP addresses that submit too many
5449
+ # failed login attempts in a short amount of time.
5450
+ #
5451
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5452
+ # CloudFront distributions.
5453
+ #
5454
+ # </note>
5455
+ #
5456
+ # This is part of the `AWSManagedRulesATPRuleSet` configuration in
5457
+ # `ManagedRuleGroupConfig`.
5458
+ #
5459
+ # Enable login response inspection by configuring exactly one component
5460
+ # of the response to inspect. You can't configure more than one. If you
5461
+ # don't configure any of the response inspection options, response
5462
+ # inspection is disabled.
5463
+ #
5464
+ # @!attribute [rw] status_code
5465
+ # Configures inspection of the response status code.
5466
+ # @return [Types::ResponseInspectionStatusCode]
5467
+ #
5468
+ # @!attribute [rw] header
5469
+ # Configures inspection of the response header.
5470
+ # @return [Types::ResponseInspectionHeader]
5471
+ #
5472
+ # @!attribute [rw] body_contains
5473
+ # Configures inspection of the response body.
5474
+ # @return [Types::ResponseInspectionBodyContains]
5475
+ #
5476
+ # @!attribute [rw] json
5477
+ # Configures inspection of the response JSON.
5478
+ # @return [Types::ResponseInspectionJson]
5479
+ #
5480
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspection AWS API Documentation
5481
+ #
5482
+ class ResponseInspection < Struct.new(
5483
+ :status_code,
5484
+ :header,
5485
+ :body_contains,
5486
+ :json)
5487
+ SENSITIVE = []
5488
+ include Aws::Structure
5489
+ end
5490
+
5491
+ # Configures inspection of the response body. This is part of the
5492
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5493
+ #
5494
+ # @!attribute [rw] success_strings
5495
+ # Strings in the body of the response that indicate a successful login
5496
+ # attempt. To be counted as a successful login, the string can be
5497
+ # anywhere in the body and must be an exact match, including case.
5498
+ # Each string must be unique among the success and failure strings.
5499
+ #
5500
+ # JSON example: `"SuccessStrings": [ "Login successful", "Welcome to
5501
+ # our site!" ]`
5502
+ # @return [Array<String>]
5503
+ #
5504
+ # @!attribute [rw] failure_strings
5505
+ # Strings in the body of the response that indicate a failed login
5506
+ # attempt. To be counted as a failed login, the string can be anywhere
5507
+ # in the body and must be an exact match, including case. Each string
5508
+ # must be unique among the success and failure strings.
5509
+ #
5510
+ # JSON example: `"FailureStrings": [ "Login failed" ]`
5511
+ # @return [Array<String>]
5512
+ #
5513
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionBodyContains AWS API Documentation
5514
+ #
5515
+ class ResponseInspectionBodyContains < Struct.new(
5516
+ :success_strings,
5517
+ :failure_strings)
5518
+ SENSITIVE = []
5519
+ include Aws::Structure
5520
+ end
5521
+
5522
+ # Configures inspection of the response header. This is part of the
5523
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5524
+ #
5525
+ # @!attribute [rw] name
5526
+ # The name of the header to match against. The name must be an exact
5527
+ # match, including case.
5528
+ #
5529
+ # JSON example: `"Name": [ "LoginResult" ]`
5530
+ # @return [String]
5531
+ #
5532
+ # @!attribute [rw] success_values
5533
+ # Values in the response header with the specified name that indicate
5534
+ # a successful login attempt. To be counted as a successful login, the
5535
+ # value must be an exact match, including case. Each value must be
5536
+ # unique among the success and failure values.
5537
+ #
5538
+ # JSON example: `"SuccessValues": [ "LoginPassed", "Successful login"
5539
+ # ]`
5540
+ # @return [Array<String>]
5541
+ #
5542
+ # @!attribute [rw] failure_values
5543
+ # Values in the response header with the specified name that indicate
5544
+ # a failed login attempt. To be counted as a failed login, the value
5545
+ # must be an exact match, including case. Each value must be unique
5546
+ # among the success and failure values.
5547
+ #
5548
+ # JSON example: `"FailureValues": [ "LoginFailed", "Failed login" ]`
5549
+ # @return [Array<String>]
5550
+ #
5551
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionHeader AWS API Documentation
5552
+ #
5553
+ class ResponseInspectionHeader < Struct.new(
5554
+ :name,
5555
+ :success_values,
5556
+ :failure_values)
5557
+ SENSITIVE = []
5558
+ include Aws::Structure
5559
+ end
5560
+
5561
+ # Configures inspection of the response JSON. This is part of the
5562
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5563
+ #
5564
+ # @!attribute [rw] identifier
5565
+ # The identifier for the value to match against in the JSON. The
5566
+ # identifier must be an exact match, including case.
5567
+ #
5568
+ # JSON example: `"Identifier": [ "/login/success" ]`
5569
+ # @return [String]
5570
+ #
5571
+ # @!attribute [rw] success_values
5572
+ # Values for the specified identifier in the response JSON that
5573
+ # indicate a successful login attempt. To be counted as a successful
5574
+ # login, the value must be an exact match, including case. Each value
5575
+ # must be unique among the success and failure values.
5576
+ #
5577
+ # JSON example: `"SuccessValues": [ "True", "Succeeded" ]`
5578
+ # @return [Array<String>]
5579
+ #
5580
+ # @!attribute [rw] failure_values
5581
+ # Values for the specified identifier in the response JSON that
5582
+ # indicate a failed login attempt. To be counted as a failed login,
5583
+ # the value must be an exact match, including case. Each value must be
5584
+ # unique among the success and failure values.
5585
+ #
5586
+ # JSON example: `"FailureValues": [ "False", "Failed" ]`
5587
+ # @return [Array<String>]
5588
+ #
5589
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionJson AWS API Documentation
5590
+ #
5591
+ class ResponseInspectionJson < Struct.new(
5592
+ :identifier,
5593
+ :success_values,
5594
+ :failure_values)
5595
+ SENSITIVE = []
5596
+ include Aws::Structure
5597
+ end
5598
+
5599
+ # Configures inspection of the response status code. This is part of the
5600
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5601
+ #
5602
+ # @!attribute [rw] success_codes
5603
+ # Status codes in the response that indicate a successful login
5604
+ # attempt. To be counted as a successful login, the response status
5605
+ # code must match one of these. Each code must be unique among the
5606
+ # success and failure status codes.
5607
+ #
5608
+ # JSON example: `"SuccessCodes": [ 200, 201 ]`
5609
+ # @return [Array<Integer>]
5610
+ #
5611
+ # @!attribute [rw] failure_codes
5612
+ # Status codes in the response that indicate a failed login attempt.
5613
+ # To be counted as a failed login, the response status code must match
5614
+ # one of these. Each code must be unique among the success and failure
5615
+ # status codes.
5616
+ #
5617
+ # JSON example: `"FailureCodes": [ 400, 404 ]`
5618
+ # @return [Array<Integer>]
5619
+ #
5620
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionStatusCode AWS API Documentation
5621
+ #
5622
+ class ResponseInspectionStatusCode < Struct.new(
5623
+ :success_codes,
5624
+ :failure_codes)
5625
+ SENSITIVE = []
5626
+ include Aws::Structure
5627
+ end
5628
+
5275
5629
  # A single rule, which you can use in a WebACL or RuleGroup to identify
5276
5630
  # web requests that you want to allow, block, or count. Each rule
5277
5631
  # includes one top-level Statement that WAF uses to identify matching
@@ -6070,7 +6424,7 @@ module Aws::WAFV2
6070
6424
  # create a rate-based rule with a nested AND rule statement that
6071
6425
  # contains the following nested statements:
6072
6426
  #
6073
- # * An IP match statement with an IP set that specified the address
6427
+ # * An IP match statement with an IP set that specifies the address
6074
6428
  # 192.0.2.44.
6075
6429
  #
6076
6430
  # * A string match statement that searches in the User-Agent header
@@ -7016,8 +7370,9 @@ module Aws::WAFV2
7016
7370
  #
7017
7371
  class UriPath < Aws::EmptyStructure; end
7018
7372
 
7019
- # Details about your login page username field, used in a
7020
- # `ManagedRuleGroupConfig`.
7373
+ # Details about your login page username field for request inspection,
7374
+ # used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
7375
+ # configuration.
7021
7376
  #
7022
7377
  # @!attribute [rw] identifier
7023
7378
  # The name of the username field. For example `/form/username`.
@@ -7084,11 +7439,11 @@ module Aws::WAFV2
7084
7439
  # @return [Boolean]
7085
7440
  #
7086
7441
  # @!attribute [rw] metric_name
7087
- # A name of the Amazon CloudWatch metric. The name can contain only
7088
- # the characters: A-Z, a-z, 0-9, - (hyphen), and \_ (underscore). The
7089
- # name can be from one to 128 characters long. It can't contain
7090
- # whitespace or metric names reserved for WAF, for example `All` and
7091
- # `Default_Action`.
7442
+ # A name of the Amazon CloudWatch metric dimension. The name can
7443
+ # contain only the characters: A-Z, a-z, 0-9, - (hyphen), and \_
7444
+ # (underscore). The name can be from one to 128 characters long. It
7445
+ # can't contain whitespace or metric names that are reserved for WAF,
7446
+ # for example `All` and `Default_Action`.
7092
7447
  # @return [String]
7093
7448
  #
7094
7449
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/VisibilityConfig AWS API Documentation
data/lib/aws-sdk-wafv2.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-wafv2/customizations'
52
52
  # @!group service
53
53
  module Aws::WAFV2
54
54
 
55
- GEM_VERSION = '1.46.0'
55
+ GEM_VERSION = '1.48.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-wafv2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.46.0
4
+ version: 1.48.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2022-12-12 00:00:00.000000000 Z
11
+ date: 2023-02-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core