aws-sdk-wafv2 1.47.0 → 1.48.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-wafv2/client.rb +315 -1
- data/lib/aws-sdk-wafv2/client_api.rb +76 -4
- data/lib/aws-sdk-wafv2/endpoint_parameters.rb +0 -3
- data/lib/aws-sdk-wafv2/endpoint_provider.rb +102 -21
- data/lib/aws-sdk-wafv2/types.rb +372 -17
- data/lib/aws-sdk-wafv2.rb +1 -1
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 4531f8ed92204cae6ddb9366213f1b30c68deeda302adbadc229032135373637
|
4
|
+
data.tar.gz: 970e1a5542a9e6d7f311dd69c01a604c9a3a2831f07d39ff1540c08850012d6d
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 42f4c2f44c6fbed19ff483b0f455a653e9d2ca50eab5832aa503579386a24d2aa6949f8c4680d3d8b124e729e2fd79f441f89f0495434dfb25a3c10aed8abbce
|
7
|
+
data.tar.gz: cd15da52802d7331e644bae2ab4cd09268edd0c3eaf3e5910c2829e46d30738c253115c6076710b3e2fee81fa4abea8dd629e8a5f1e5d58475a1f25a4043ea0e
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,11 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.48.0 (2023-02-15)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - For protected CloudFront distributions, you can now use the AWS WAF Fraud Control account takeover prevention (ATP) managed rule group to block new login attempts from clients that have recently submitted too many failed login attempts.
|
8
|
+
|
4
9
|
1.47.0 (2023-01-18)
|
5
10
|
------------------
|
6
11
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.48.0
|
data/lib/aws-sdk-wafv2/client.rb
CHANGED
@@ -919,6 +919,38 @@ module Aws::WAFV2
|
|
919
919
|
# aws_managed_rules_bot_control_rule_set: {
|
920
920
|
# inspection_level: "COMMON", # required, accepts COMMON, TARGETED
|
921
921
|
# },
|
922
|
+
# aws_managed_rules_atp_rule_set: {
|
923
|
+
# login_path: "String", # required
|
924
|
+
# request_inspection: {
|
925
|
+
# payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
|
926
|
+
# username_field: { # required
|
927
|
+
# identifier: "FieldIdentifier", # required
|
928
|
+
# },
|
929
|
+
# password_field: { # required
|
930
|
+
# identifier: "FieldIdentifier", # required
|
931
|
+
# },
|
932
|
+
# },
|
933
|
+
# response_inspection: {
|
934
|
+
# status_code: {
|
935
|
+
# success_codes: [1], # required
|
936
|
+
# failure_codes: [1], # required
|
937
|
+
# },
|
938
|
+
# header: {
|
939
|
+
# name: "ResponseInspectionHeaderName", # required
|
940
|
+
# success_values: ["SuccessValue"], # required
|
941
|
+
# failure_values: ["FailureValue"], # required
|
942
|
+
# },
|
943
|
+
# body_contains: {
|
944
|
+
# success_strings: ["SuccessValue"], # required
|
945
|
+
# failure_strings: ["FailureValue"], # required
|
946
|
+
# },
|
947
|
+
# json: {
|
948
|
+
# identifier: "FieldIdentifier", # required
|
949
|
+
# success_values: ["SuccessValue"], # required
|
950
|
+
# failure_values: ["FailureValue"], # required
|
951
|
+
# },
|
952
|
+
# },
|
953
|
+
# },
|
922
954
|
# },
|
923
955
|
# ],
|
924
956
|
# rule_action_overrides: [
|
@@ -1854,6 +1886,38 @@ module Aws::WAFV2
|
|
1854
1886
|
# aws_managed_rules_bot_control_rule_set: {
|
1855
1887
|
# inspection_level: "COMMON", # required, accepts COMMON, TARGETED
|
1856
1888
|
# },
|
1889
|
+
# aws_managed_rules_atp_rule_set: {
|
1890
|
+
# login_path: "String", # required
|
1891
|
+
# request_inspection: {
|
1892
|
+
# payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
|
1893
|
+
# username_field: { # required
|
1894
|
+
# identifier: "FieldIdentifier", # required
|
1895
|
+
# },
|
1896
|
+
# password_field: { # required
|
1897
|
+
# identifier: "FieldIdentifier", # required
|
1898
|
+
# },
|
1899
|
+
# },
|
1900
|
+
# response_inspection: {
|
1901
|
+
# status_code: {
|
1902
|
+
# success_codes: [1], # required
|
1903
|
+
# failure_codes: [1], # required
|
1904
|
+
# },
|
1905
|
+
# header: {
|
1906
|
+
# name: "ResponseInspectionHeaderName", # required
|
1907
|
+
# success_values: ["SuccessValue"], # required
|
1908
|
+
# failure_values: ["FailureValue"], # required
|
1909
|
+
# },
|
1910
|
+
# body_contains: {
|
1911
|
+
# success_strings: ["SuccessValue"], # required
|
1912
|
+
# failure_strings: ["FailureValue"], # required
|
1913
|
+
# },
|
1914
|
+
# json: {
|
1915
|
+
# identifier: "FieldIdentifier", # required
|
1916
|
+
# success_values: ["SuccessValue"], # required
|
1917
|
+
# failure_values: ["FailureValue"], # required
|
1918
|
+
# },
|
1919
|
+
# },
|
1920
|
+
# },
|
1857
1921
|
# },
|
1858
1922
|
# ],
|
1859
1923
|
# rule_action_overrides: [
|
@@ -2669,6 +2733,38 @@ module Aws::WAFV2
|
|
2669
2733
|
# aws_managed_rules_bot_control_rule_set: {
|
2670
2734
|
# inspection_level: "COMMON", # required, accepts COMMON, TARGETED
|
2671
2735
|
# },
|
2736
|
+
# aws_managed_rules_atp_rule_set: {
|
2737
|
+
# login_path: "String", # required
|
2738
|
+
# request_inspection: {
|
2739
|
+
# payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
|
2740
|
+
# username_field: { # required
|
2741
|
+
# identifier: "FieldIdentifier", # required
|
2742
|
+
# },
|
2743
|
+
# password_field: { # required
|
2744
|
+
# identifier: "FieldIdentifier", # required
|
2745
|
+
# },
|
2746
|
+
# },
|
2747
|
+
# response_inspection: {
|
2748
|
+
# status_code: {
|
2749
|
+
# success_codes: [1], # required
|
2750
|
+
# failure_codes: [1], # required
|
2751
|
+
# },
|
2752
|
+
# header: {
|
2753
|
+
# name: "ResponseInspectionHeaderName", # required
|
2754
|
+
# success_values: ["SuccessValue"], # required
|
2755
|
+
# failure_values: ["FailureValue"], # required
|
2756
|
+
# },
|
2757
|
+
# body_contains: {
|
2758
|
+
# success_strings: ["SuccessValue"], # required
|
2759
|
+
# failure_strings: ["FailureValue"], # required
|
2760
|
+
# },
|
2761
|
+
# json: {
|
2762
|
+
# identifier: "FieldIdentifier", # required
|
2763
|
+
# success_values: ["SuccessValue"], # required
|
2764
|
+
# failure_values: ["FailureValue"], # required
|
2765
|
+
# },
|
2766
|
+
# },
|
2767
|
+
# },
|
2672
2768
|
# },
|
2673
2769
|
# ],
|
2674
2770
|
# rule_action_overrides: [
|
@@ -4100,6 +4196,28 @@ module Aws::WAFV2
|
|
4100
4196
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
4101
4197
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
4102
4198
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
4199
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
4200
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
4201
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
4202
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
4203
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
4204
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
4205
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
4206
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
4207
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
4208
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
4209
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
4210
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
4211
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
4212
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
4213
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
4214
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
4215
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
4216
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
4217
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
4218
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
4219
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
4220
|
+
# resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
4103
4221
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
4104
4222
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
4105
4223
|
# resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -4534,6 +4652,28 @@ module Aws::WAFV2
|
|
4534
4652
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
4535
4653
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
4536
4654
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
4655
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
4656
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
4657
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
4658
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
4659
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
4660
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
4661
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
4662
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
4663
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
4664
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
4665
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
4666
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
4667
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
4668
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
4669
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
4670
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
4671
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
4672
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
4673
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
4674
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
4675
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
4676
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
4537
4677
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
4538
4678
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
4539
4679
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -4812,6 +4952,28 @@ module Aws::WAFV2
|
|
4812
4952
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
4813
4953
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
4814
4954
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
4955
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
4956
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
4957
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
4958
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
4959
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
4960
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
4961
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
4962
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
4963
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
4964
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
4965
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
4966
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
4967
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
4968
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
4969
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
4970
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
4971
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
4972
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
4973
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
4974
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
4975
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
4976
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
4815
4977
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
4816
4978
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
4817
4979
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -5061,6 +5223,28 @@ module Aws::WAFV2
|
|
5061
5223
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
5062
5224
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
5063
5225
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
5226
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
5227
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
5228
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
5229
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
5230
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
5231
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
5232
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
5233
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
5234
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
5235
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
5236
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
5237
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
5238
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
5239
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
5240
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
5241
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
5242
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
5243
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
5244
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
5245
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
5246
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
5247
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
5064
5248
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
5065
5249
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
5066
5250
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -5350,6 +5534,28 @@ module Aws::WAFV2
|
|
5350
5534
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
5351
5535
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
5352
5536
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
5537
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
5538
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
5539
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
5540
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
5541
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
5542
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
5543
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
5544
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
5545
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
5546
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
5547
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
5548
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
5549
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
5550
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
5551
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
5552
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
5553
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
5554
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
5555
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
5556
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
5557
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
5558
|
+
# resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
5353
5559
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
5354
5560
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
5355
5561
|
# resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -5628,6 +5834,28 @@ module Aws::WAFV2
|
|
5628
5834
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
5629
5835
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
5630
5836
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
5837
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
5838
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
5839
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
5840
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
5841
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
5842
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
5843
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
5844
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
5845
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
5846
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
5847
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
5848
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
5849
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
5850
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
5851
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
5852
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
5853
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
5854
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
5855
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
5856
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
5857
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
5858
|
+
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
5631
5859
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
5632
5860
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
5633
5861
|
# resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -5877,6 +6105,28 @@ module Aws::WAFV2
|
|
5877
6105
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
|
5878
6106
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
|
5879
6107
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
|
6108
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
|
6109
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
|
6110
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
|
6111
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
|
6112
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
|
6113
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
|
6114
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
|
6115
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
|
6116
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
|
6117
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
|
6118
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
|
6119
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
|
6120
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
|
6121
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
|
6122
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
|
6123
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
|
6124
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
|
6125
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
|
6126
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
|
6127
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
|
6128
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
|
6129
|
+
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
|
5880
6130
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
|
5881
6131
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
|
5882
6132
|
# resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
|
@@ -7947,6 +8197,38 @@ module Aws::WAFV2
|
|
7947
8197
|
# aws_managed_rules_bot_control_rule_set: {
|
7948
8198
|
# inspection_level: "COMMON", # required, accepts COMMON, TARGETED
|
7949
8199
|
# },
|
8200
|
+
# aws_managed_rules_atp_rule_set: {
|
8201
|
+
# login_path: "String", # required
|
8202
|
+
# request_inspection: {
|
8203
|
+
# payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
|
8204
|
+
# username_field: { # required
|
8205
|
+
# identifier: "FieldIdentifier", # required
|
8206
|
+
# },
|
8207
|
+
# password_field: { # required
|
8208
|
+
# identifier: "FieldIdentifier", # required
|
8209
|
+
# },
|
8210
|
+
# },
|
8211
|
+
# response_inspection: {
|
8212
|
+
# status_code: {
|
8213
|
+
# success_codes: [1], # required
|
8214
|
+
# failure_codes: [1], # required
|
8215
|
+
# },
|
8216
|
+
# header: {
|
8217
|
+
# name: "ResponseInspectionHeaderName", # required
|
8218
|
+
# success_values: ["SuccessValue"], # required
|
8219
|
+
# failure_values: ["FailureValue"], # required
|
8220
|
+
# },
|
8221
|
+
# body_contains: {
|
8222
|
+
# success_strings: ["SuccessValue"], # required
|
8223
|
+
# failure_strings: ["FailureValue"], # required
|
8224
|
+
# },
|
8225
|
+
# json: {
|
8226
|
+
# identifier: "FieldIdentifier", # required
|
8227
|
+
# success_values: ["SuccessValue"], # required
|
8228
|
+
# failure_values: ["FailureValue"], # required
|
8229
|
+
# },
|
8230
|
+
# },
|
8231
|
+
# },
|
7950
8232
|
# },
|
7951
8233
|
# ],
|
7952
8234
|
# rule_action_overrides: [
|
@@ -8796,6 +9078,38 @@ module Aws::WAFV2
|
|
8796
9078
|
# aws_managed_rules_bot_control_rule_set: {
|
8797
9079
|
# inspection_level: "COMMON", # required, accepts COMMON, TARGETED
|
8798
9080
|
# },
|
9081
|
+
# aws_managed_rules_atp_rule_set: {
|
9082
|
+
# login_path: "String", # required
|
9083
|
+
# request_inspection: {
|
9084
|
+
# payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
|
9085
|
+
# username_field: { # required
|
9086
|
+
# identifier: "FieldIdentifier", # required
|
9087
|
+
# },
|
9088
|
+
# password_field: { # required
|
9089
|
+
# identifier: "FieldIdentifier", # required
|
9090
|
+
# },
|
9091
|
+
# },
|
9092
|
+
# response_inspection: {
|
9093
|
+
# status_code: {
|
9094
|
+
# success_codes: [1], # required
|
9095
|
+
# failure_codes: [1], # required
|
9096
|
+
# },
|
9097
|
+
# header: {
|
9098
|
+
# name: "ResponseInspectionHeaderName", # required
|
9099
|
+
# success_values: ["SuccessValue"], # required
|
9100
|
+
# failure_values: ["FailureValue"], # required
|
9101
|
+
# },
|
9102
|
+
# body_contains: {
|
9103
|
+
# success_strings: ["SuccessValue"], # required
|
9104
|
+
# failure_strings: ["FailureValue"], # required
|
9105
|
+
# },
|
9106
|
+
# json: {
|
9107
|
+
# identifier: "FieldIdentifier", # required
|
9108
|
+
# success_values: ["SuccessValue"], # required
|
9109
|
+
# failure_values: ["FailureValue"], # required
|
9110
|
+
# },
|
9111
|
+
# },
|
9112
|
+
# },
|
8799
9113
|
# },
|
8800
9114
|
# ],
|
8801
9115
|
# rule_action_overrides: [
|
@@ -9062,7 +9376,7 @@ module Aws::WAFV2
|
|
9062
9376
|
params: params,
|
9063
9377
|
config: config)
|
9064
9378
|
context[:gem_name] = 'aws-sdk-wafv2'
|
9065
|
-
context[:gem_version] = '1.
|
9379
|
+
context[:gem_version] = '1.48.0'
|
9066
9380
|
Seahorse::Client::Request.new(handlers, context)
|
9067
9381
|
end
|
9068
9382
|
|
@@ -13,6 +13,7 @@ module Aws::WAFV2
|
|
13
13
|
|
14
14
|
include Seahorse::Model
|
15
15
|
|
16
|
+
AWSManagedRulesATPRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesATPRuleSet')
|
16
17
|
AWSManagedRulesBotControlRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesBotControlRuleSet')
|
17
18
|
Action = Shapes::StringShape.new(name: 'Action')
|
18
19
|
ActionCondition = Shapes::StructureShape.new(name: 'ActionCondition')
|
@@ -91,7 +92,9 @@ module Aws::WAFV2
|
|
91
92
|
ErrorReason = Shapes::StringShape.new(name: 'ErrorReason')
|
92
93
|
ExcludedRule = Shapes::StructureShape.new(name: 'ExcludedRule')
|
93
94
|
ExcludedRules = Shapes::ListShape.new(name: 'ExcludedRules')
|
95
|
+
FailureCode = Shapes::IntegerShape.new(name: 'FailureCode')
|
94
96
|
FailureReason = Shapes::StringShape.new(name: 'FailureReason')
|
97
|
+
FailureValue = Shapes::StringShape.new(name: 'FailureValue')
|
95
98
|
FallbackBehavior = Shapes::StringShape.new(name: 'FallbackBehavior')
|
96
99
|
FieldIdentifier = Shapes::StringShape.new(name: 'FieldIdentifier')
|
97
100
|
FieldToMatch = Shapes::StructureShape.new(name: 'FieldToMatch')
|
@@ -250,12 +253,27 @@ module Aws::WAFV2
|
|
250
253
|
ReleaseNotes = Shapes::StringShape.new(name: 'ReleaseNotes')
|
251
254
|
ReleaseSummaries = Shapes::ListShape.new(name: 'ReleaseSummaries')
|
252
255
|
ReleaseSummary = Shapes::StructureShape.new(name: 'ReleaseSummary')
|
256
|
+
RequestInspection = Shapes::StructureShape.new(name: 'RequestInspection')
|
253
257
|
ResourceArn = Shapes::StringShape.new(name: 'ResourceArn')
|
254
258
|
ResourceArns = Shapes::ListShape.new(name: 'ResourceArns')
|
255
259
|
ResourceType = Shapes::StringShape.new(name: 'ResourceType')
|
256
260
|
ResponseCode = Shapes::IntegerShape.new(name: 'ResponseCode')
|
257
261
|
ResponseContent = Shapes::StringShape.new(name: 'ResponseContent')
|
258
262
|
ResponseContentType = Shapes::StringShape.new(name: 'ResponseContentType')
|
263
|
+
ResponseInspection = Shapes::StructureShape.new(name: 'ResponseInspection')
|
264
|
+
ResponseInspectionBodyContains = Shapes::StructureShape.new(name: 'ResponseInspectionBodyContains')
|
265
|
+
ResponseInspectionBodyContainsFailureStrings = Shapes::ListShape.new(name: 'ResponseInspectionBodyContainsFailureStrings')
|
266
|
+
ResponseInspectionBodyContainsSuccessStrings = Shapes::ListShape.new(name: 'ResponseInspectionBodyContainsSuccessStrings')
|
267
|
+
ResponseInspectionHeader = Shapes::StructureShape.new(name: 'ResponseInspectionHeader')
|
268
|
+
ResponseInspectionHeaderFailureValues = Shapes::ListShape.new(name: 'ResponseInspectionHeaderFailureValues')
|
269
|
+
ResponseInspectionHeaderName = Shapes::StringShape.new(name: 'ResponseInspectionHeaderName')
|
270
|
+
ResponseInspectionHeaderSuccessValues = Shapes::ListShape.new(name: 'ResponseInspectionHeaderSuccessValues')
|
271
|
+
ResponseInspectionJson = Shapes::StructureShape.new(name: 'ResponseInspectionJson')
|
272
|
+
ResponseInspectionJsonFailureValues = Shapes::ListShape.new(name: 'ResponseInspectionJsonFailureValues')
|
273
|
+
ResponseInspectionJsonSuccessValues = Shapes::ListShape.new(name: 'ResponseInspectionJsonSuccessValues')
|
274
|
+
ResponseInspectionStatusCode = Shapes::StructureShape.new(name: 'ResponseInspectionStatusCode')
|
275
|
+
ResponseInspectionStatusCodeFailureCodes = Shapes::ListShape.new(name: 'ResponseInspectionStatusCodeFailureCodes')
|
276
|
+
ResponseInspectionStatusCodeSuccessCodes = Shapes::ListShape.new(name: 'ResponseInspectionStatusCodeSuccessCodes')
|
259
277
|
ResponseStatusCode = Shapes::IntegerShape.new(name: 'ResponseStatusCode')
|
260
278
|
Rule = Shapes::StructureShape.new(name: 'Rule')
|
261
279
|
RuleAction = Shapes::StructureShape.new(name: 'RuleAction')
|
@@ -284,6 +302,9 @@ module Aws::WAFV2
|
|
284
302
|
SqliMatchStatement = Shapes::StructureShape.new(name: 'SqliMatchStatement')
|
285
303
|
Statement = Shapes::StructureShape.new(name: 'Statement')
|
286
304
|
Statements = Shapes::ListShape.new(name: 'Statements')
|
305
|
+
String = Shapes::StringShape.new(name: 'String')
|
306
|
+
SuccessCode = Shapes::IntegerShape.new(name: 'SuccessCode')
|
307
|
+
SuccessValue = Shapes::StringShape.new(name: 'SuccessValue')
|
287
308
|
Tag = Shapes::StructureShape.new(name: 'Tag')
|
288
309
|
TagInfoForResource = Shapes::StructureShape.new(name: 'TagInfoForResource')
|
289
310
|
TagKey = Shapes::StringShape.new(name: 'TagKey')
|
@@ -345,6 +366,11 @@ module Aws::WAFV2
|
|
345
366
|
WebACLSummary = Shapes::StructureShape.new(name: 'WebACLSummary')
|
346
367
|
XssMatchStatement = Shapes::StructureShape.new(name: 'XssMatchStatement')
|
347
368
|
|
369
|
+
AWSManagedRulesATPRuleSet.add_member(:login_path, Shapes::ShapeRef.new(shape: String, required: true, location_name: "LoginPath"))
|
370
|
+
AWSManagedRulesATPRuleSet.add_member(:request_inspection, Shapes::ShapeRef.new(shape: RequestInspection, location_name: "RequestInspection"))
|
371
|
+
AWSManagedRulesATPRuleSet.add_member(:response_inspection, Shapes::ShapeRef.new(shape: ResponseInspection, location_name: "ResponseInspection"))
|
372
|
+
AWSManagedRulesATPRuleSet.struct_class = Types::AWSManagedRulesATPRuleSet
|
373
|
+
|
348
374
|
AWSManagedRulesBotControlRuleSet.add_member(:inspection_level, Shapes::ShapeRef.new(shape: InspectionLevel, required: true, location_name: "InspectionLevel"))
|
349
375
|
AWSManagedRulesBotControlRuleSet.struct_class = Types::AWSManagedRulesBotControlRuleSet
|
350
376
|
|
@@ -923,11 +949,12 @@ module Aws::WAFV2
|
|
923
949
|
LoggingFilter.add_member(:default_behavior, Shapes::ShapeRef.new(shape: FilterBehavior, required: true, location_name: "DefaultBehavior"))
|
924
950
|
LoggingFilter.struct_class = Types::LoggingFilter
|
925
951
|
|
926
|
-
ManagedRuleGroupConfig.add_member(:login_path, Shapes::ShapeRef.new(shape: LoginPathString, location_name: "LoginPath"))
|
927
|
-
ManagedRuleGroupConfig.add_member(:payload_type, Shapes::ShapeRef.new(shape: PayloadType, location_name: "PayloadType"))
|
928
|
-
ManagedRuleGroupConfig.add_member(:username_field, Shapes::ShapeRef.new(shape: UsernameField, location_name: "UsernameField"))
|
929
|
-
ManagedRuleGroupConfig.add_member(:password_field, Shapes::ShapeRef.new(shape: PasswordField, location_name: "PasswordField"))
|
952
|
+
ManagedRuleGroupConfig.add_member(:login_path, Shapes::ShapeRef.new(shape: LoginPathString, deprecated: true, location_name: "LoginPath", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet LoginPath"}))
|
953
|
+
ManagedRuleGroupConfig.add_member(:payload_type, Shapes::ShapeRef.new(shape: PayloadType, deprecated: true, location_name: "PayloadType", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet RequestInspection PayloadType"}))
|
954
|
+
ManagedRuleGroupConfig.add_member(:username_field, Shapes::ShapeRef.new(shape: UsernameField, deprecated: true, location_name: "UsernameField", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet RequestInspection UsernameField"}))
|
955
|
+
ManagedRuleGroupConfig.add_member(:password_field, Shapes::ShapeRef.new(shape: PasswordField, deprecated: true, location_name: "PasswordField", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet RequestInspection PasswordField"}))
|
930
956
|
ManagedRuleGroupConfig.add_member(:aws_managed_rules_bot_control_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesBotControlRuleSet, location_name: "AWSManagedRulesBotControlRuleSet"))
|
957
|
+
ManagedRuleGroupConfig.add_member(:aws_managed_rules_atp_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesATPRuleSet, location_name: "AWSManagedRulesATPRuleSet"))
|
931
958
|
ManagedRuleGroupConfig.struct_class = Types::ManagedRuleGroupConfig
|
932
959
|
|
933
960
|
ManagedRuleGroupConfigs.member = Shapes::ShapeRef.new(shape: ManagedRuleGroupConfig)
|
@@ -1082,8 +1109,53 @@ module Aws::WAFV2
|
|
1082
1109
|
ReleaseSummary.add_member(:timestamp, Shapes::ShapeRef.new(shape: Timestamp, location_name: "Timestamp"))
|
1083
1110
|
ReleaseSummary.struct_class = Types::ReleaseSummary
|
1084
1111
|
|
1112
|
+
RequestInspection.add_member(:payload_type, Shapes::ShapeRef.new(shape: PayloadType, required: true, location_name: "PayloadType"))
|
1113
|
+
RequestInspection.add_member(:username_field, Shapes::ShapeRef.new(shape: UsernameField, required: true, location_name: "UsernameField"))
|
1114
|
+
RequestInspection.add_member(:password_field, Shapes::ShapeRef.new(shape: PasswordField, required: true, location_name: "PasswordField"))
|
1115
|
+
RequestInspection.struct_class = Types::RequestInspection
|
1116
|
+
|
1085
1117
|
ResourceArns.member = Shapes::ShapeRef.new(shape: ResourceArn)
|
1086
1118
|
|
1119
|
+
ResponseInspection.add_member(:status_code, Shapes::ShapeRef.new(shape: ResponseInspectionStatusCode, location_name: "StatusCode"))
|
1120
|
+
ResponseInspection.add_member(:header, Shapes::ShapeRef.new(shape: ResponseInspectionHeader, location_name: "Header"))
|
1121
|
+
ResponseInspection.add_member(:body_contains, Shapes::ShapeRef.new(shape: ResponseInspectionBodyContains, location_name: "BodyContains"))
|
1122
|
+
ResponseInspection.add_member(:json, Shapes::ShapeRef.new(shape: ResponseInspectionJson, location_name: "Json"))
|
1123
|
+
ResponseInspection.struct_class = Types::ResponseInspection
|
1124
|
+
|
1125
|
+
ResponseInspectionBodyContains.add_member(:success_strings, Shapes::ShapeRef.new(shape: ResponseInspectionBodyContainsSuccessStrings, required: true, location_name: "SuccessStrings"))
|
1126
|
+
ResponseInspectionBodyContains.add_member(:failure_strings, Shapes::ShapeRef.new(shape: ResponseInspectionBodyContainsFailureStrings, required: true, location_name: "FailureStrings"))
|
1127
|
+
ResponseInspectionBodyContains.struct_class = Types::ResponseInspectionBodyContains
|
1128
|
+
|
1129
|
+
ResponseInspectionBodyContainsFailureStrings.member = Shapes::ShapeRef.new(shape: FailureValue)
|
1130
|
+
|
1131
|
+
ResponseInspectionBodyContainsSuccessStrings.member = Shapes::ShapeRef.new(shape: SuccessValue)
|
1132
|
+
|
1133
|
+
ResponseInspectionHeader.add_member(:name, Shapes::ShapeRef.new(shape: ResponseInspectionHeaderName, required: true, location_name: "Name"))
|
1134
|
+
ResponseInspectionHeader.add_member(:success_values, Shapes::ShapeRef.new(shape: ResponseInspectionHeaderSuccessValues, required: true, location_name: "SuccessValues"))
|
1135
|
+
ResponseInspectionHeader.add_member(:failure_values, Shapes::ShapeRef.new(shape: ResponseInspectionHeaderFailureValues, required: true, location_name: "FailureValues"))
|
1136
|
+
ResponseInspectionHeader.struct_class = Types::ResponseInspectionHeader
|
1137
|
+
|
1138
|
+
ResponseInspectionHeaderFailureValues.member = Shapes::ShapeRef.new(shape: FailureValue)
|
1139
|
+
|
1140
|
+
ResponseInspectionHeaderSuccessValues.member = Shapes::ShapeRef.new(shape: SuccessValue)
|
1141
|
+
|
1142
|
+
ResponseInspectionJson.add_member(:identifier, Shapes::ShapeRef.new(shape: FieldIdentifier, required: true, location_name: "Identifier"))
|
1143
|
+
ResponseInspectionJson.add_member(:success_values, Shapes::ShapeRef.new(shape: ResponseInspectionJsonSuccessValues, required: true, location_name: "SuccessValues"))
|
1144
|
+
ResponseInspectionJson.add_member(:failure_values, Shapes::ShapeRef.new(shape: ResponseInspectionJsonFailureValues, required: true, location_name: "FailureValues"))
|
1145
|
+
ResponseInspectionJson.struct_class = Types::ResponseInspectionJson
|
1146
|
+
|
1147
|
+
ResponseInspectionJsonFailureValues.member = Shapes::ShapeRef.new(shape: FailureValue)
|
1148
|
+
|
1149
|
+
ResponseInspectionJsonSuccessValues.member = Shapes::ShapeRef.new(shape: SuccessValue)
|
1150
|
+
|
1151
|
+
ResponseInspectionStatusCode.add_member(:success_codes, Shapes::ShapeRef.new(shape: ResponseInspectionStatusCodeSuccessCodes, required: true, location_name: "SuccessCodes"))
|
1152
|
+
ResponseInspectionStatusCode.add_member(:failure_codes, Shapes::ShapeRef.new(shape: ResponseInspectionStatusCodeFailureCodes, required: true, location_name: "FailureCodes"))
|
1153
|
+
ResponseInspectionStatusCode.struct_class = Types::ResponseInspectionStatusCode
|
1154
|
+
|
1155
|
+
ResponseInspectionStatusCodeFailureCodes.member = Shapes::ShapeRef.new(shape: FailureCode)
|
1156
|
+
|
1157
|
+
ResponseInspectionStatusCodeSuccessCodes.member = Shapes::ShapeRef.new(shape: SuccessCode)
|
1158
|
+
|
1087
1159
|
Rule.add_member(:name, Shapes::ShapeRef.new(shape: EntityName, required: true, location_name: "Name"))
|
1088
1160
|
Rule.add_member(:priority, Shapes::ShapeRef.new(shape: RulePriority, required: true, location_name: "Priority"))
|
1089
1161
|
Rule.add_member(:statement, Shapes::ShapeRef.new(shape: Statement, required: true, location_name: "Statement"))
|
@@ -50,9 +50,6 @@ module Aws::WAFV2
|
|
50
50
|
|
51
51
|
def initialize(options = {})
|
52
52
|
self[:region] = options[:region]
|
53
|
-
if self[:region].nil?
|
54
|
-
raise ArgumentError, "Missing required EndpointParameter: :region"
|
55
|
-
end
|
56
53
|
self[:use_dual_stack] = options[:use_dual_stack]
|
57
54
|
self[:use_dual_stack] = false if self[:use_dual_stack].nil?
|
58
55
|
if self[:use_dual_stack].nil?
|
@@ -14,36 +14,117 @@ module Aws::WAFV2
|
|
14
14
|
use_dual_stack = parameters.use_dual_stack
|
15
15
|
use_fips = parameters.use_fips
|
16
16
|
endpoint = parameters.endpoint
|
17
|
-
if
|
18
|
-
if Aws::Endpoints::Matchers.
|
17
|
+
if Aws::Endpoints::Matchers.set?(endpoint)
|
18
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
19
|
+
raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
|
20
|
+
end
|
21
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
22
|
+
raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
|
23
|
+
end
|
24
|
+
return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
|
25
|
+
end
|
26
|
+
if Aws::Endpoints::Matchers.set?(region)
|
27
|
+
if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
|
28
|
+
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
29
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
30
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
31
|
+
end
|
32
|
+
raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
|
33
|
+
end
|
19
34
|
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
20
|
-
|
35
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
36
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
37
|
+
end
|
38
|
+
raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
|
21
39
|
end
|
22
40
|
if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
23
|
-
|
41
|
+
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
42
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
43
|
+
end
|
44
|
+
raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
|
24
45
|
end
|
25
|
-
|
26
|
-
|
27
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
|
28
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
|
29
|
-
return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
|
46
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "af-south-1")
|
47
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.af-south-1.amazonaws.com", headers: {}, properties: {})
|
30
48
|
end
|
31
|
-
|
32
|
-
|
33
|
-
if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
|
34
|
-
if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
|
35
|
-
return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
49
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-east-1")
|
50
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-east-1.amazonaws.com", headers: {}, properties: {})
|
36
51
|
end
|
37
|
-
|
38
|
-
|
39
|
-
|
40
|
-
if Aws::Endpoints::Matchers.
|
41
|
-
return Aws::Endpoints::Endpoint.new(url: "https://wafv2
|
52
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-1")
|
53
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-northeast-1.amazonaws.com", headers: {}, properties: {})
|
54
|
+
end
|
55
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-2")
|
56
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-northeast-2.amazonaws.com", headers: {}, properties: {})
|
57
|
+
end
|
58
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-3")
|
59
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-northeast-3.amazonaws.com", headers: {}, properties: {})
|
60
|
+
end
|
61
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-south-1")
|
62
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-south-1.amazonaws.com", headers: {}, properties: {})
|
63
|
+
end
|
64
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-1")
|
65
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-southeast-1.amazonaws.com", headers: {}, properties: {})
|
66
|
+
end
|
67
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-2")
|
68
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-southeast-2.amazonaws.com", headers: {}, properties: {})
|
69
|
+
end
|
70
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-3")
|
71
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-southeast-3.amazonaws.com", headers: {}, properties: {})
|
72
|
+
end
|
73
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "ca-central-1")
|
74
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ca-central-1.amazonaws.com", headers: {}, properties: {})
|
75
|
+
end
|
76
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "eu-central-1")
|
77
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-central-1.amazonaws.com", headers: {}, properties: {})
|
78
|
+
end
|
79
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "eu-north-1")
|
80
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-north-1.amazonaws.com", headers: {}, properties: {})
|
81
|
+
end
|
82
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "eu-south-1")
|
83
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-south-1.amazonaws.com", headers: {}, properties: {})
|
84
|
+
end
|
85
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-1")
|
86
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-west-1.amazonaws.com", headers: {}, properties: {})
|
87
|
+
end
|
88
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-2")
|
89
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-west-2.amazonaws.com", headers: {}, properties: {})
|
90
|
+
end
|
91
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-3")
|
92
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-west-3.amazonaws.com", headers: {}, properties: {})
|
93
|
+
end
|
94
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "me-south-1")
|
95
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.me-south-1.amazonaws.com", headers: {}, properties: {})
|
96
|
+
end
|
97
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "sa-east-1")
|
98
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.sa-east-1.amazonaws.com", headers: {}, properties: {})
|
99
|
+
end
|
100
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "us-east-1")
|
101
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-east-1.amazonaws.com", headers: {}, properties: {})
|
102
|
+
end
|
103
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "us-east-2")
|
104
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-east-2.amazonaws.com", headers: {}, properties: {})
|
105
|
+
end
|
106
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "us-west-1")
|
107
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-west-1.amazonaws.com", headers: {}, properties: {})
|
108
|
+
end
|
109
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "us-west-2")
|
110
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-west-2.amazonaws.com", headers: {}, properties: {})
|
111
|
+
end
|
112
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "cn-north-1")
|
113
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.cn-north-1.amazonaws.com.cn", headers: {}, properties: {})
|
114
|
+
end
|
115
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "cn-northwest-1")
|
116
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.cn-northwest-1.amazonaws.com.cn", headers: {}, properties: {})
|
117
|
+
end
|
118
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "us-gov-east-1")
|
119
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-gov-east-1.amazonaws.com", headers: {}, properties: {})
|
120
|
+
end
|
121
|
+
if Aws::Endpoints::Matchers.string_equals?(region, "us-gov-west-1")
|
122
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-gov-west-1.amazonaws.com", headers: {}, properties: {})
|
42
123
|
end
|
43
|
-
|
124
|
+
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
44
125
|
end
|
45
|
-
return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
|
46
126
|
end
|
127
|
+
raise ArgumentError, "Invalid Configuration: Missing Region"
|
47
128
|
raise ArgumentError, 'No endpoint could be resolved'
|
48
129
|
|
49
130
|
end
|
data/lib/aws-sdk-wafv2/types.rb
CHANGED
@@ -10,7 +10,53 @@
|
|
10
10
|
module Aws::WAFV2
|
11
11
|
module Types
|
12
12
|
|
13
|
-
# Details for your use of the
|
13
|
+
# Details for your use of the account takeover prevention managed rule
|
14
|
+
# group, `AWSManagedRulesATPRuleSet`. This configuration is used in
|
15
|
+
# `ManagedRuleGroupConfig`.
|
16
|
+
#
|
17
|
+
# @!attribute [rw] login_path
|
18
|
+
# The path of the login endpoint for your application. For example,
|
19
|
+
# for the URL `https://example.com/web/login`, you would provide the
|
20
|
+
# path `/web/login`.
|
21
|
+
#
|
22
|
+
# The rule group inspects only HTTP `POST` requests to your specified
|
23
|
+
# login endpoint.
|
24
|
+
# @return [String]
|
25
|
+
#
|
26
|
+
# @!attribute [rw] request_inspection
|
27
|
+
# The criteria for inspecting login requests, used by the ATP rule
|
28
|
+
# group to validate credentials usage.
|
29
|
+
# @return [Types::RequestInspection]
|
30
|
+
#
|
31
|
+
# @!attribute [rw] response_inspection
|
32
|
+
# The criteria for inspecting responses to login requests, used by the
|
33
|
+
# ATP rule group to track login failure rates.
|
34
|
+
#
|
35
|
+
# The ATP rule group evaluates the responses that your protected
|
36
|
+
# resources send back to client login attempts, keeping count of
|
37
|
+
# successful and failed attempts from each IP address and client
|
38
|
+
# session. Using this information, the rule group labels and mitigates
|
39
|
+
# requests from client sessions and IP addresses that submit too many
|
40
|
+
# failed login attempts in a short amount of time.
|
41
|
+
#
|
42
|
+
# <note markdown="1"> Response inspection is available only in web ACLs that protect
|
43
|
+
# Amazon CloudFront distributions.
|
44
|
+
#
|
45
|
+
# </note>
|
46
|
+
# @return [Types::ResponseInspection]
|
47
|
+
#
|
48
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/AWSManagedRulesATPRuleSet AWS API Documentation
|
49
|
+
#
|
50
|
+
class AWSManagedRulesATPRuleSet < Struct.new(
|
51
|
+
:login_path,
|
52
|
+
:request_inspection,
|
53
|
+
:response_inspection)
|
54
|
+
SENSITIVE = []
|
55
|
+
include Aws::Structure
|
56
|
+
end
|
57
|
+
|
58
|
+
# Details for your use of the Bot Control managed rule group,
|
59
|
+
# `AWSManagedRulesBotControlRuleSet`. This configuration is used in
|
14
60
|
# `ManagedRuleGroupConfig`.
|
15
61
|
#
|
16
62
|
# @!attribute [rw] inspection_level
|
@@ -239,7 +285,7 @@ module Aws::WAFV2
|
|
239
285
|
# @!attribute [rw] search_string
|
240
286
|
# A string value that you want WAF to search for. WAF searches only in
|
241
287
|
# the part of web requests that you designate for inspection in
|
242
|
-
# FieldToMatch. The maximum length of the value is
|
288
|
+
# FieldToMatch. The maximum length of the value is 200 bytes.
|
243
289
|
#
|
244
290
|
# Valid values depend on the component that you specify for inspection
|
245
291
|
# in `FieldToMatch`\:
|
@@ -256,7 +302,7 @@ module Aws::WAFV2
|
|
256
302
|
# **If you're using the WAF API**
|
257
303
|
#
|
258
304
|
# Specify a base64-encoded version of the value. The maximum length of
|
259
|
-
# the value before you base64-encode it is
|
305
|
+
# the value before you base64-encode it is 200 bytes.
|
260
306
|
#
|
261
307
|
# For example, suppose the value of `Type` is `HEADER` and the value
|
262
308
|
# of `Data` is `User-Agent`. If you want to search the `User-Agent`
|
@@ -4209,6 +4255,11 @@ module Aws::WAFV2
|
|
4209
4255
|
# Additional information that's used by a managed rule group. Many
|
4210
4256
|
# managed rule groups don't require this.
|
4211
4257
|
#
|
4258
|
+
# Use the `AWSManagedRulesATPRuleSet` configuration object for the
|
4259
|
+
# account takeover prevention managed rule group, to provide information
|
4260
|
+
# such as the sign-in page of your application and the type of content
|
4261
|
+
# to accept or reject from the client.
|
4262
|
+
#
|
4212
4263
|
# Use the `AWSManagedRulesBotControlRuleSet` configuration object to
|
4213
4264
|
# configure the protection level that you want the Bot Control rule
|
4214
4265
|
# group to use.
|
@@ -4216,22 +4267,31 @@ module Aws::WAFV2
|
|
4216
4267
|
# For example specifications, see the examples section of CreateWebACL.
|
4217
4268
|
#
|
4218
4269
|
# @!attribute [rw] login_path
|
4219
|
-
#
|
4220
|
-
#
|
4221
|
-
#
|
4270
|
+
# <note markdown="1"> Instead of this setting, provide your configuration under
|
4271
|
+
# `AWSManagedRulesATPRuleSet`.
|
4272
|
+
#
|
4273
|
+
# </note>
|
4222
4274
|
# @return [String]
|
4223
4275
|
#
|
4224
4276
|
# @!attribute [rw] payload_type
|
4225
|
-
#
|
4226
|
-
#
|
4277
|
+
# <note markdown="1"> Instead of this setting, provide your configuration under
|
4278
|
+
# `AWSManagedRulesATPRuleSet` `RequestInspection`.
|
4279
|
+
#
|
4280
|
+
# </note>
|
4227
4281
|
# @return [String]
|
4228
4282
|
#
|
4229
4283
|
# @!attribute [rw] username_field
|
4230
|
-
#
|
4284
|
+
# <note markdown="1"> Instead of this setting, provide your configuration under
|
4285
|
+
# `AWSManagedRulesATPRuleSet` `RequestInspection`.
|
4286
|
+
#
|
4287
|
+
# </note>
|
4231
4288
|
# @return [Types::UsernameField]
|
4232
4289
|
#
|
4233
4290
|
# @!attribute [rw] password_field
|
4234
|
-
#
|
4291
|
+
# <note markdown="1"> Instead of this setting, provide your configuration under
|
4292
|
+
# `AWSManagedRulesATPRuleSet` `RequestInspection`.
|
4293
|
+
#
|
4294
|
+
# </note>
|
4235
4295
|
# @return [Types::PasswordField]
|
4236
4296
|
#
|
4237
4297
|
# @!attribute [rw] aws_managed_rules_bot_control_rule_set
|
@@ -4247,6 +4307,27 @@ module Aws::WAFV2
|
|
4247
4307
|
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html
|
4248
4308
|
# @return [Types::AWSManagedRulesBotControlRuleSet]
|
4249
4309
|
#
|
4310
|
+
# @!attribute [rw] aws_managed_rules_atp_rule_set
|
4311
|
+
# Additional configuration for using the account takeover prevention
|
4312
|
+
# (ATP) managed rule group, `AWSManagedRulesATPRuleSet`. Use this to
|
4313
|
+
# provide login request information to the rule group. For web ACLs
|
4314
|
+
# that protect CloudFront distributions, use this to also provide the
|
4315
|
+
# information about how your distribution responds to login requests.
|
4316
|
+
# This configuration replaces the individual configuration fields in
|
4317
|
+
# `ManagedRuleGroupConfig` and provides additional feature
|
4318
|
+
# configuration.
|
4319
|
+
#
|
4320
|
+
# For information about using the ATP managed rule group, see [WAF
|
4321
|
+
# Fraud Control account takeover prevention (ATP) rule group][1] and
|
4322
|
+
# [WAF Fraud Control account takeover prevention (ATP)][2] in the *WAF
|
4323
|
+
# Developer Guide*.
|
4324
|
+
#
|
4325
|
+
#
|
4326
|
+
#
|
4327
|
+
# [1]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-atp.html
|
4328
|
+
# [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-atp.html
|
4329
|
+
# @return [Types::AWSManagedRulesATPRuleSet]
|
4330
|
+
#
|
4250
4331
|
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ManagedRuleGroupConfig AWS API Documentation
|
4251
4332
|
#
|
4252
4333
|
class ManagedRuleGroupConfig < Struct.new(
|
@@ -4254,7 +4335,8 @@ module Aws::WAFV2
|
|
4254
4335
|
:payload_type,
|
4255
4336
|
:username_field,
|
4256
4337
|
:password_field,
|
4257
|
-
:aws_managed_rules_bot_control_rule_set
|
4338
|
+
:aws_managed_rules_bot_control_rule_set,
|
4339
|
+
:aws_managed_rules_atp_rule_set)
|
4258
4340
|
SENSITIVE = []
|
4259
4341
|
include Aws::Structure
|
4260
4342
|
end
|
@@ -4320,6 +4402,11 @@ module Aws::WAFV2
|
|
4320
4402
|
# Additional information that's used by a managed rule group. Many
|
4321
4403
|
# managed rule groups don't require this.
|
4322
4404
|
#
|
4405
|
+
# Use the `AWSManagedRulesATPRuleSet` configuration object for the
|
4406
|
+
# account takeover prevention managed rule group, to provide
|
4407
|
+
# information such as the sign-in page of your application and the
|
4408
|
+
# type of content to accept or reject from the client.
|
4409
|
+
#
|
4323
4410
|
# Use the `AWSManagedRulesBotControlRuleSet` configuration object to
|
4324
4411
|
# configure the protection level that you want the Bot Control rule
|
4325
4412
|
# group to use.
|
@@ -4785,8 +4872,9 @@ module Aws::WAFV2
|
|
4785
4872
|
include Aws::Structure
|
4786
4873
|
end
|
4787
4874
|
|
4788
|
-
# Details about your login page password field
|
4789
|
-
# `
|
4875
|
+
# Details about your login page password field for request inspection,
|
4876
|
+
# used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
|
4877
|
+
# configuration.
|
4790
4878
|
#
|
4791
4879
|
# @!attribute [rw] identifier
|
4792
4880
|
# The name of the password field. For example `/form/password`.
|
@@ -4990,7 +5078,7 @@ module Aws::WAFV2
|
|
4990
5078
|
# rate-based rule with a nested AND rule statement that contains the
|
4991
5079
|
# following nested statements:
|
4992
5080
|
#
|
4993
|
-
# * An IP match statement with an IP set that
|
5081
|
+
# * An IP match statement with an IP set that specifies the address
|
4994
5082
|
# 192.0.2.44.
|
4995
5083
|
#
|
4996
5084
|
# * A string match statement that searches in the User-Agent header for
|
@@ -5272,6 +5360,272 @@ module Aws::WAFV2
|
|
5272
5360
|
include Aws::Structure
|
5273
5361
|
end
|
5274
5362
|
|
5363
|
+
# The criteria for inspecting login requests, used by the ATP rule group
|
5364
|
+
# to validate credentials usage.
|
5365
|
+
#
|
5366
|
+
# This is part of the `AWSManagedRulesATPRuleSet` configuration in
|
5367
|
+
# `ManagedRuleGroupConfig`.
|
5368
|
+
#
|
5369
|
+
# In these settings, you specify how your application accepts login
|
5370
|
+
# attempts by providing the request payload type and the names of the
|
5371
|
+
# fields within the request body where the username and password are
|
5372
|
+
# provided.
|
5373
|
+
#
|
5374
|
+
# @!attribute [rw] payload_type
|
5375
|
+
# The payload type for your login endpoint, either JSON or form
|
5376
|
+
# encoded.
|
5377
|
+
# @return [String]
|
5378
|
+
#
|
5379
|
+
# @!attribute [rw] username_field
|
5380
|
+
# Details about your login page username field.
|
5381
|
+
#
|
5382
|
+
# How you specify this depends on the payload type.
|
5383
|
+
#
|
5384
|
+
# * For JSON payloads, specify the field name in JSON pointer syntax.
|
5385
|
+
# For information about the JSON Pointer syntax, see the Internet
|
5386
|
+
# Engineering Task Force (IETF) documentation [JavaScript Object
|
5387
|
+
# Notation (JSON) Pointer][1].
|
5388
|
+
#
|
5389
|
+
# For example, for the JSON payload `\{ "login": \{ "username":
|
5390
|
+
# "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
|
5391
|
+
# field specification is `/login/username` and the password field
|
5392
|
+
# specification is `/login/password`.
|
5393
|
+
#
|
5394
|
+
# * For form encoded payload types, use the HTML form names.
|
5395
|
+
#
|
5396
|
+
# For example, for an HTML form with input elements named
|
5397
|
+
# `username1` and `password1`, the username field specification is
|
5398
|
+
# `username1` and the password field specification is `password1`.
|
5399
|
+
#
|
5400
|
+
#
|
5401
|
+
#
|
5402
|
+
# [1]: https://tools.ietf.org/html/rfc6901
|
5403
|
+
# @return [Types::UsernameField]
|
5404
|
+
#
|
5405
|
+
# @!attribute [rw] password_field
|
5406
|
+
# Details about your login page password field.
|
5407
|
+
#
|
5408
|
+
# How you specify this depends on the payload type.
|
5409
|
+
#
|
5410
|
+
# * For JSON payloads, specify the field name in JSON pointer syntax.
|
5411
|
+
# For information about the JSON Pointer syntax, see the Internet
|
5412
|
+
# Engineering Task Force (IETF) documentation [JavaScript Object
|
5413
|
+
# Notation (JSON) Pointer][1].
|
5414
|
+
#
|
5415
|
+
# For example, for the JSON payload `\{ "login": \{ "username":
|
5416
|
+
# "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
|
5417
|
+
# field specification is `/login/username` and the password field
|
5418
|
+
# specification is `/login/password`.
|
5419
|
+
#
|
5420
|
+
# * For form encoded payload types, use the HTML form names.
|
5421
|
+
#
|
5422
|
+
# For example, for an HTML form with input elements named
|
5423
|
+
# `username1` and `password1`, the username field specification is
|
5424
|
+
# `username1` and the password field specification is `password1`.
|
5425
|
+
#
|
5426
|
+
#
|
5427
|
+
#
|
5428
|
+
# [1]: https://tools.ietf.org/html/rfc6901
|
5429
|
+
# @return [Types::PasswordField]
|
5430
|
+
#
|
5431
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/RequestInspection AWS API Documentation
|
5432
|
+
#
|
5433
|
+
class RequestInspection < Struct.new(
|
5434
|
+
:payload_type,
|
5435
|
+
:username_field,
|
5436
|
+
:password_field)
|
5437
|
+
SENSITIVE = []
|
5438
|
+
include Aws::Structure
|
5439
|
+
end
|
5440
|
+
|
5441
|
+
# The criteria for inspecting responses to login requests, used by the
|
5442
|
+
# ATP rule group to track login failure rates.
|
5443
|
+
#
|
5444
|
+
# The ATP rule group evaluates the responses that your protected
|
5445
|
+
# resources send back to client login attempts, keeping count of
|
5446
|
+
# successful and failed attempts from each IP address and client
|
5447
|
+
# session. Using this information, the rule group labels and mitigates
|
5448
|
+
# requests from client sessions and IP addresses that submit too many
|
5449
|
+
# failed login attempts in a short amount of time.
|
5450
|
+
#
|
5451
|
+
# <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
|
5452
|
+
# CloudFront distributions.
|
5453
|
+
#
|
5454
|
+
# </note>
|
5455
|
+
#
|
5456
|
+
# This is part of the `AWSManagedRulesATPRuleSet` configuration in
|
5457
|
+
# `ManagedRuleGroupConfig`.
|
5458
|
+
#
|
5459
|
+
# Enable login response inspection by configuring exactly one component
|
5460
|
+
# of the response to inspect. You can't configure more than one. If you
|
5461
|
+
# don't configure any of the response inspection options, response
|
5462
|
+
# inspection is disabled.
|
5463
|
+
#
|
5464
|
+
# @!attribute [rw] status_code
|
5465
|
+
# Configures inspection of the response status code.
|
5466
|
+
# @return [Types::ResponseInspectionStatusCode]
|
5467
|
+
#
|
5468
|
+
# @!attribute [rw] header
|
5469
|
+
# Configures inspection of the response header.
|
5470
|
+
# @return [Types::ResponseInspectionHeader]
|
5471
|
+
#
|
5472
|
+
# @!attribute [rw] body_contains
|
5473
|
+
# Configures inspection of the response body.
|
5474
|
+
# @return [Types::ResponseInspectionBodyContains]
|
5475
|
+
#
|
5476
|
+
# @!attribute [rw] json
|
5477
|
+
# Configures inspection of the response JSON.
|
5478
|
+
# @return [Types::ResponseInspectionJson]
|
5479
|
+
#
|
5480
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspection AWS API Documentation
|
5481
|
+
#
|
5482
|
+
class ResponseInspection < Struct.new(
|
5483
|
+
:status_code,
|
5484
|
+
:header,
|
5485
|
+
:body_contains,
|
5486
|
+
:json)
|
5487
|
+
SENSITIVE = []
|
5488
|
+
include Aws::Structure
|
5489
|
+
end
|
5490
|
+
|
5491
|
+
# Configures inspection of the response body. This is part of the
|
5492
|
+
# `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
|
5493
|
+
#
|
5494
|
+
# @!attribute [rw] success_strings
|
5495
|
+
# Strings in the body of the response that indicate a successful login
|
5496
|
+
# attempt. To be counted as a successful login, the string can be
|
5497
|
+
# anywhere in the body and must be an exact match, including case.
|
5498
|
+
# Each string must be unique among the success and failure strings.
|
5499
|
+
#
|
5500
|
+
# JSON example: `"SuccessStrings": [ "Login successful", "Welcome to
|
5501
|
+
# our site!" ]`
|
5502
|
+
# @return [Array<String>]
|
5503
|
+
#
|
5504
|
+
# @!attribute [rw] failure_strings
|
5505
|
+
# Strings in the body of the response that indicate a failed login
|
5506
|
+
# attempt. To be counted as a failed login, the string can be anywhere
|
5507
|
+
# in the body and must be an exact match, including case. Each string
|
5508
|
+
# must be unique among the success and failure strings.
|
5509
|
+
#
|
5510
|
+
# JSON example: `"FailureStrings": [ "Login failed" ]`
|
5511
|
+
# @return [Array<String>]
|
5512
|
+
#
|
5513
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionBodyContains AWS API Documentation
|
5514
|
+
#
|
5515
|
+
class ResponseInspectionBodyContains < Struct.new(
|
5516
|
+
:success_strings,
|
5517
|
+
:failure_strings)
|
5518
|
+
SENSITIVE = []
|
5519
|
+
include Aws::Structure
|
5520
|
+
end
|
5521
|
+
|
5522
|
+
# Configures inspection of the response header. This is part of the
|
5523
|
+
# `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
|
5524
|
+
#
|
5525
|
+
# @!attribute [rw] name
|
5526
|
+
# The name of the header to match against. The name must be an exact
|
5527
|
+
# match, including case.
|
5528
|
+
#
|
5529
|
+
# JSON example: `"Name": [ "LoginResult" ]`
|
5530
|
+
# @return [String]
|
5531
|
+
#
|
5532
|
+
# @!attribute [rw] success_values
|
5533
|
+
# Values in the response header with the specified name that indicate
|
5534
|
+
# a successful login attempt. To be counted as a successful login, the
|
5535
|
+
# value must be an exact match, including case. Each value must be
|
5536
|
+
# unique among the success and failure values.
|
5537
|
+
#
|
5538
|
+
# JSON example: `"SuccessValues": [ "LoginPassed", "Successful login"
|
5539
|
+
# ]`
|
5540
|
+
# @return [Array<String>]
|
5541
|
+
#
|
5542
|
+
# @!attribute [rw] failure_values
|
5543
|
+
# Values in the response header with the specified name that indicate
|
5544
|
+
# a failed login attempt. To be counted as a failed login, the value
|
5545
|
+
# must be an exact match, including case. Each value must be unique
|
5546
|
+
# among the success and failure values.
|
5547
|
+
#
|
5548
|
+
# JSON example: `"FailureValues": [ "LoginFailed", "Failed login" ]`
|
5549
|
+
# @return [Array<String>]
|
5550
|
+
#
|
5551
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionHeader AWS API Documentation
|
5552
|
+
#
|
5553
|
+
class ResponseInspectionHeader < Struct.new(
|
5554
|
+
:name,
|
5555
|
+
:success_values,
|
5556
|
+
:failure_values)
|
5557
|
+
SENSITIVE = []
|
5558
|
+
include Aws::Structure
|
5559
|
+
end
|
5560
|
+
|
5561
|
+
# Configures inspection of the response JSON. This is part of the
|
5562
|
+
# `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
|
5563
|
+
#
|
5564
|
+
# @!attribute [rw] identifier
|
5565
|
+
# The identifier for the value to match against in the JSON. The
|
5566
|
+
# identifier must be an exact match, including case.
|
5567
|
+
#
|
5568
|
+
# JSON example: `"Identifier": [ "/login/success" ]`
|
5569
|
+
# @return [String]
|
5570
|
+
#
|
5571
|
+
# @!attribute [rw] success_values
|
5572
|
+
# Values for the specified identifier in the response JSON that
|
5573
|
+
# indicate a successful login attempt. To be counted as a successful
|
5574
|
+
# login, the value must be an exact match, including case. Each value
|
5575
|
+
# must be unique among the success and failure values.
|
5576
|
+
#
|
5577
|
+
# JSON example: `"SuccessValues": [ "True", "Succeeded" ]`
|
5578
|
+
# @return [Array<String>]
|
5579
|
+
#
|
5580
|
+
# @!attribute [rw] failure_values
|
5581
|
+
# Values for the specified identifier in the response JSON that
|
5582
|
+
# indicate a failed login attempt. To be counted as a failed login,
|
5583
|
+
# the value must be an exact match, including case. Each value must be
|
5584
|
+
# unique among the success and failure values.
|
5585
|
+
#
|
5586
|
+
# JSON example: `"FailureValues": [ "False", "Failed" ]`
|
5587
|
+
# @return [Array<String>]
|
5588
|
+
#
|
5589
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionJson AWS API Documentation
|
5590
|
+
#
|
5591
|
+
class ResponseInspectionJson < Struct.new(
|
5592
|
+
:identifier,
|
5593
|
+
:success_values,
|
5594
|
+
:failure_values)
|
5595
|
+
SENSITIVE = []
|
5596
|
+
include Aws::Structure
|
5597
|
+
end
|
5598
|
+
|
5599
|
+
# Configures inspection of the response status code. This is part of the
|
5600
|
+
# `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
|
5601
|
+
#
|
5602
|
+
# @!attribute [rw] success_codes
|
5603
|
+
# Status codes in the response that indicate a successful login
|
5604
|
+
# attempt. To be counted as a successful login, the response status
|
5605
|
+
# code must match one of these. Each code must be unique among the
|
5606
|
+
# success and failure status codes.
|
5607
|
+
#
|
5608
|
+
# JSON example: `"SuccessCodes": [ 200, 201 ]`
|
5609
|
+
# @return [Array<Integer>]
|
5610
|
+
#
|
5611
|
+
# @!attribute [rw] failure_codes
|
5612
|
+
# Status codes in the response that indicate a failed login attempt.
|
5613
|
+
# To be counted as a failed login, the response status code must match
|
5614
|
+
# one of these. Each code must be unique among the success and failure
|
5615
|
+
# status codes.
|
5616
|
+
#
|
5617
|
+
# JSON example: `"FailureCodes": [ 400, 404 ]`
|
5618
|
+
# @return [Array<Integer>]
|
5619
|
+
#
|
5620
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionStatusCode AWS API Documentation
|
5621
|
+
#
|
5622
|
+
class ResponseInspectionStatusCode < Struct.new(
|
5623
|
+
:success_codes,
|
5624
|
+
:failure_codes)
|
5625
|
+
SENSITIVE = []
|
5626
|
+
include Aws::Structure
|
5627
|
+
end
|
5628
|
+
|
5275
5629
|
# A single rule, which you can use in a WebACL or RuleGroup to identify
|
5276
5630
|
# web requests that you want to allow, block, or count. Each rule
|
5277
5631
|
# includes one top-level Statement that WAF uses to identify matching
|
@@ -6070,7 +6424,7 @@ module Aws::WAFV2
|
|
6070
6424
|
# create a rate-based rule with a nested AND rule statement that
|
6071
6425
|
# contains the following nested statements:
|
6072
6426
|
#
|
6073
|
-
# * An IP match statement with an IP set that
|
6427
|
+
# * An IP match statement with an IP set that specifies the address
|
6074
6428
|
# 192.0.2.44.
|
6075
6429
|
#
|
6076
6430
|
# * A string match statement that searches in the User-Agent header
|
@@ -7016,8 +7370,9 @@ module Aws::WAFV2
|
|
7016
7370
|
#
|
7017
7371
|
class UriPath < Aws::EmptyStructure; end
|
7018
7372
|
|
7019
|
-
# Details about your login page username field
|
7020
|
-
# `
|
7373
|
+
# Details about your login page username field for request inspection,
|
7374
|
+
# used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
|
7375
|
+
# configuration.
|
7021
7376
|
#
|
7022
7377
|
# @!attribute [rw] identifier
|
7023
7378
|
# The name of the username field. For example `/form/username`.
|
data/lib/aws-sdk-wafv2.rb
CHANGED
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-wafv2
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.48.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2023-
|
11
|
+
date: 2023-02-15 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|