aws-sdk-wafv2 1.47.0 → 1.49.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -10,7 +10,61 @@
10
10
  module Aws::WAFV2
11
11
  module Types
12
12
 
13
- # Details for your use of the Bot Control managed rule group, used in
13
+ # Details for your use of the account takeover prevention managed rule
14
+ # group, `AWSManagedRulesATPRuleSet`. This configuration is used in
15
+ # `ManagedRuleGroupConfig`.
16
+ #
17
+ # @!attribute [rw] login_path
18
+ # The path of the login endpoint for your application. For example,
19
+ # for the URL `https://example.com/web/login`, you would provide the
20
+ # path `/web/login`.
21
+ #
22
+ # The rule group inspects only HTTP `POST` requests to your specified
23
+ # login endpoint.
24
+ # @return [String]
25
+ #
26
+ # @!attribute [rw] request_inspection
27
+ # The criteria for inspecting login requests, used by the ATP rule
28
+ # group to validate credentials usage.
29
+ # @return [Types::RequestInspection]
30
+ #
31
+ # @!attribute [rw] response_inspection
32
+ # The criteria for inspecting responses to login requests, used by the
33
+ # ATP rule group to track login failure rates.
34
+ #
35
+ # The ATP rule group evaluates the responses that your protected
36
+ # resources send back to client login attempts, keeping count of
37
+ # successful and failed attempts from each IP address and client
38
+ # session. Using this information, the rule group labels and mitigates
39
+ # requests from client sessions and IP addresses that submit too many
40
+ # failed login attempts in a short amount of time.
41
+ #
42
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect
43
+ # Amazon CloudFront distributions.
44
+ #
45
+ # </note>
46
+ #
47
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1,
48
+ # it's possible to configure response inspection through the APIs,
49
+ # but ATP response inspection will not be enabled. You can only use
50
+ # the response inspection capabilities of the ATP managed rule group
51
+ # in web ACLs that protect CloudFront distributions.
52
+ #
53
+ # </note>
54
+ # @return [Types::ResponseInspection]
55
+ #
56
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/AWSManagedRulesATPRuleSet AWS API Documentation
57
+ #
58
+ class AWSManagedRulesATPRuleSet < Struct.new(
59
+ :login_path,
60
+ :request_inspection,
61
+ :response_inspection)
62
+ SENSITIVE = []
63
+ include Aws::Structure
64
+ end
65
+
66
+ # Details for your use of the Bot Control managed rule group,
67
+ # `AWSManagedRulesBotControlRuleSet`. This configuration is used in
14
68
  # `ManagedRuleGroupConfig`.
15
69
  #
16
70
  # @!attribute [rw] inspection_level
@@ -239,7 +293,7 @@ module Aws::WAFV2
239
293
  # @!attribute [rw] search_string
240
294
  # A string value that you want WAF to search for. WAF searches only in
241
295
  # the part of web requests that you designate for inspection in
242
- # FieldToMatch. The maximum length of the value is 50 bytes.
296
+ # FieldToMatch. The maximum length of the value is 200 bytes.
243
297
  #
244
298
  # Valid values depend on the component that you specify for inspection
245
299
  # in `FieldToMatch`\:
@@ -256,7 +310,7 @@ module Aws::WAFV2
256
310
  # **If you're using the WAF API**
257
311
  #
258
312
  # Specify a base64-encoded version of the value. The maximum length of
259
- # the value before you base64-encode it is 50 bytes.
313
+ # the value before you base64-encode it is 200 bytes.
260
314
  #
261
315
  # For example, suppose the value of `Type` is `HEADER` and the value
262
316
  # of `Data` is `User-Agent`. If you want to search the `User-Agent`
@@ -4209,6 +4263,11 @@ module Aws::WAFV2
4209
4263
  # Additional information that's used by a managed rule group. Many
4210
4264
  # managed rule groups don't require this.
4211
4265
  #
4266
+ # Use the `AWSManagedRulesATPRuleSet` configuration object for the
4267
+ # account takeover prevention managed rule group, to provide information
4268
+ # such as the sign-in page of your application and the type of content
4269
+ # to accept or reject from the client.
4270
+ #
4212
4271
  # Use the `AWSManagedRulesBotControlRuleSet` configuration object to
4213
4272
  # configure the protection level that you want the Bot Control rule
4214
4273
  # group to use.
@@ -4216,22 +4275,31 @@ module Aws::WAFV2
4216
4275
  # For example specifications, see the examples section of CreateWebACL.
4217
4276
  #
4218
4277
  # @!attribute [rw] login_path
4219
- # The path of the login endpoint for your application. For example,
4220
- # for the URL `https://example.com/web/login`, you would provide the
4221
- # path `/web/login`.
4278
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4279
+ # `AWSManagedRulesATPRuleSet`.
4280
+ #
4281
+ # </note>
4222
4282
  # @return [String]
4223
4283
  #
4224
4284
  # @!attribute [rw] payload_type
4225
- # The payload type for your login endpoint, either JSON or form
4226
- # encoded.
4285
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4286
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4287
+ #
4288
+ # </note>
4227
4289
  # @return [String]
4228
4290
  #
4229
4291
  # @!attribute [rw] username_field
4230
- # Details about your login page username field.
4292
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4293
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4294
+ #
4295
+ # </note>
4231
4296
  # @return [Types::UsernameField]
4232
4297
  #
4233
4298
  # @!attribute [rw] password_field
4234
- # Details about your login page password field.
4299
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4300
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4301
+ #
4302
+ # </note>
4235
4303
  # @return [Types::PasswordField]
4236
4304
  #
4237
4305
  # @!attribute [rw] aws_managed_rules_bot_control_rule_set
@@ -4247,6 +4315,36 @@ module Aws::WAFV2
4247
4315
  # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html
4248
4316
  # @return [Types::AWSManagedRulesBotControlRuleSet]
4249
4317
  #
4318
+ # @!attribute [rw] aws_managed_rules_atp_rule_set
4319
+ # Additional configuration for using the account takeover prevention
4320
+ # (ATP) managed rule group, `AWSManagedRulesATPRuleSet`. Use this to
4321
+ # provide login request information to the rule group. For web ACLs
4322
+ # that protect CloudFront distributions, use this to also provide the
4323
+ # information about how your distribution responds to login requests.
4324
+ #
4325
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1,
4326
+ # it's possible to configure response inspection through the APIs,
4327
+ # but ATP response inspection will not be enabled. You can only use
4328
+ # the response inspection capabilities of the ATP managed rule group
4329
+ # in web ACLs that protect CloudFront distributions.
4330
+ #
4331
+ # </note>
4332
+ #
4333
+ # This configuration replaces the individual configuration fields in
4334
+ # `ManagedRuleGroupConfig` and provides additional feature
4335
+ # configuration.
4336
+ #
4337
+ # For information about using the ATP managed rule group, see [WAF
4338
+ # Fraud Control account takeover prevention (ATP) rule group][1] and
4339
+ # [WAF Fraud Control account takeover prevention (ATP)][2] in the *WAF
4340
+ # Developer Guide*.
4341
+ #
4342
+ #
4343
+ #
4344
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-atp.html
4345
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-atp.html
4346
+ # @return [Types::AWSManagedRulesATPRuleSet]
4347
+ #
4250
4348
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ManagedRuleGroupConfig AWS API Documentation
4251
4349
  #
4252
4350
  class ManagedRuleGroupConfig < Struct.new(
@@ -4254,7 +4352,8 @@ module Aws::WAFV2
4254
4352
  :payload_type,
4255
4353
  :username_field,
4256
4354
  :password_field,
4257
- :aws_managed_rules_bot_control_rule_set)
4355
+ :aws_managed_rules_bot_control_rule_set,
4356
+ :aws_managed_rules_atp_rule_set)
4258
4357
  SENSITIVE = []
4259
4358
  include Aws::Structure
4260
4359
  end
@@ -4320,6 +4419,11 @@ module Aws::WAFV2
4320
4419
  # Additional information that's used by a managed rule group. Many
4321
4420
  # managed rule groups don't require this.
4322
4421
  #
4422
+ # Use the `AWSManagedRulesATPRuleSet` configuration object for the
4423
+ # account takeover prevention managed rule group, to provide
4424
+ # information such as the sign-in page of your application and the
4425
+ # type of content to accept or reject from the client.
4426
+ #
4323
4427
  # Use the `AWSManagedRulesBotControlRuleSet` configuration object to
4324
4428
  # configure the protection level that you want the Bot Control rule
4325
4429
  # group to use.
@@ -4785,8 +4889,9 @@ module Aws::WAFV2
4785
4889
  include Aws::Structure
4786
4890
  end
4787
4891
 
4788
- # Details about your login page password field, used in a
4789
- # `ManagedRuleGroupConfig`.
4892
+ # Details about your login page password field for request inspection,
4893
+ # used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
4894
+ # configuration.
4790
4895
  #
4791
4896
  # @!attribute [rw] identifier
4792
4897
  # The name of the password field. For example `/form/password`.
@@ -4990,7 +5095,7 @@ module Aws::WAFV2
4990
5095
  # rate-based rule with a nested AND rule statement that contains the
4991
5096
  # following nested statements:
4992
5097
  #
4993
- # * An IP match statement with an IP set that specified the address
5098
+ # * An IP match statement with an IP set that specifies the address
4994
5099
  # 192.0.2.44.
4995
5100
  #
4996
5101
  # * A string match statement that searches in the User-Agent header for
@@ -5272,6 +5377,332 @@ module Aws::WAFV2
5272
5377
  include Aws::Structure
5273
5378
  end
5274
5379
 
5380
+ # The criteria for inspecting login requests, used by the ATP rule group
5381
+ # to validate credentials usage.
5382
+ #
5383
+ # This is part of the `AWSManagedRulesATPRuleSet` configuration in
5384
+ # `ManagedRuleGroupConfig`.
5385
+ #
5386
+ # In these settings, you specify how your application accepts login
5387
+ # attempts by providing the request payload type and the names of the
5388
+ # fields within the request body where the username and password are
5389
+ # provided.
5390
+ #
5391
+ # @!attribute [rw] payload_type
5392
+ # The payload type for your login endpoint, either JSON or form
5393
+ # encoded.
5394
+ # @return [String]
5395
+ #
5396
+ # @!attribute [rw] username_field
5397
+ # Details about your login page username field.
5398
+ #
5399
+ # How you specify this depends on the payload type.
5400
+ #
5401
+ # * For JSON payloads, specify the field name in JSON pointer syntax.
5402
+ # For information about the JSON Pointer syntax, see the Internet
5403
+ # Engineering Task Force (IETF) documentation [JavaScript Object
5404
+ # Notation (JSON) Pointer][1].
5405
+ #
5406
+ # For example, for the JSON payload `\{ "login": \{ "username":
5407
+ # "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
5408
+ # field specification is `/login/username` and the password field
5409
+ # specification is `/login/password`.
5410
+ #
5411
+ # * For form encoded payload types, use the HTML form names.
5412
+ #
5413
+ # For example, for an HTML form with input elements named
5414
+ # `username1` and `password1`, the username field specification is
5415
+ # `username1` and the password field specification is `password1`.
5416
+ #
5417
+ #
5418
+ #
5419
+ # [1]: https://tools.ietf.org/html/rfc6901
5420
+ # @return [Types::UsernameField]
5421
+ #
5422
+ # @!attribute [rw] password_field
5423
+ # Details about your login page password field.
5424
+ #
5425
+ # How you specify this depends on the payload type.
5426
+ #
5427
+ # * For JSON payloads, specify the field name in JSON pointer syntax.
5428
+ # For information about the JSON Pointer syntax, see the Internet
5429
+ # Engineering Task Force (IETF) documentation [JavaScript Object
5430
+ # Notation (JSON) Pointer][1].
5431
+ #
5432
+ # For example, for the JSON payload `\{ "login": \{ "username":
5433
+ # "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
5434
+ # field specification is `/login/username` and the password field
5435
+ # specification is `/login/password`.
5436
+ #
5437
+ # * For form encoded payload types, use the HTML form names.
5438
+ #
5439
+ # For example, for an HTML form with input elements named
5440
+ # `username1` and `password1`, the username field specification is
5441
+ # `username1` and the password field specification is `password1`.
5442
+ #
5443
+ #
5444
+ #
5445
+ # [1]: https://tools.ietf.org/html/rfc6901
5446
+ # @return [Types::PasswordField]
5447
+ #
5448
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/RequestInspection AWS API Documentation
5449
+ #
5450
+ class RequestInspection < Struct.new(
5451
+ :payload_type,
5452
+ :username_field,
5453
+ :password_field)
5454
+ SENSITIVE = []
5455
+ include Aws::Structure
5456
+ end
5457
+
5458
+ # The criteria for inspecting responses to login requests, used by the
5459
+ # ATP rule group to track login failure rates.
5460
+ #
5461
+ # The ATP rule group evaluates the responses that your protected
5462
+ # resources send back to client login attempts, keeping count of
5463
+ # successful and failed attempts from each IP address and client
5464
+ # session. Using this information, the rule group labels and mitigates
5465
+ # requests from client sessions and IP addresses that submit too many
5466
+ # failed login attempts in a short amount of time.
5467
+ #
5468
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5469
+ # CloudFront distributions.
5470
+ #
5471
+ # </note>
5472
+ #
5473
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1, it's
5474
+ # possible to configure response inspection through the APIs, but ATP
5475
+ # response inspection will not be enabled. You can only use the response
5476
+ # inspection capabilities of the ATP managed rule group in web ACLs that
5477
+ # protect CloudFront distributions.
5478
+ #
5479
+ # </note>
5480
+ #
5481
+ # This is part of the `AWSManagedRulesATPRuleSet` configuration in
5482
+ # `ManagedRuleGroupConfig`.
5483
+ #
5484
+ # Enable login response inspection by configuring exactly one component
5485
+ # of the response to inspect. You can't configure more than one. If you
5486
+ # don't configure any of the response inspection options, response
5487
+ # inspection is disabled.
5488
+ #
5489
+ # @!attribute [rw] status_code
5490
+ # Configures inspection of the response status code.
5491
+ # @return [Types::ResponseInspectionStatusCode]
5492
+ #
5493
+ # @!attribute [rw] header
5494
+ # Configures inspection of the response header.
5495
+ # @return [Types::ResponseInspectionHeader]
5496
+ #
5497
+ # @!attribute [rw] body_contains
5498
+ # Configures inspection of the response body.
5499
+ # @return [Types::ResponseInspectionBodyContains]
5500
+ #
5501
+ # @!attribute [rw] json
5502
+ # Configures inspection of the response JSON.
5503
+ # @return [Types::ResponseInspectionJson]
5504
+ #
5505
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspection AWS API Documentation
5506
+ #
5507
+ class ResponseInspection < Struct.new(
5508
+ :status_code,
5509
+ :header,
5510
+ :body_contains,
5511
+ :json)
5512
+ SENSITIVE = []
5513
+ include Aws::Structure
5514
+ end
5515
+
5516
+ # Configures inspection of the response body. This is part of the
5517
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5518
+ #
5519
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5520
+ # CloudFront distributions.
5521
+ #
5522
+ # </note>
5523
+ #
5524
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1, it's
5525
+ # possible to configure response inspection through the APIs, but ATP
5526
+ # response inspection will not be enabled. You can only use the response
5527
+ # inspection capabilities of the ATP managed rule group in web ACLs that
5528
+ # protect CloudFront distributions.
5529
+ #
5530
+ # </note>
5531
+ #
5532
+ # @!attribute [rw] success_strings
5533
+ # Strings in the body of the response that indicate a successful login
5534
+ # attempt. To be counted as a successful login, the string can be
5535
+ # anywhere in the body and must be an exact match, including case.
5536
+ # Each string must be unique among the success and failure strings.
5537
+ #
5538
+ # JSON example: `"SuccessStrings": [ "Login successful", "Welcome to
5539
+ # our site!" ]`
5540
+ # @return [Array<String>]
5541
+ #
5542
+ # @!attribute [rw] failure_strings
5543
+ # Strings in the body of the response that indicate a failed login
5544
+ # attempt. To be counted as a failed login, the string can be anywhere
5545
+ # in the body and must be an exact match, including case. Each string
5546
+ # must be unique among the success and failure strings.
5547
+ #
5548
+ # JSON example: `"FailureStrings": [ "Login failed" ]`
5549
+ # @return [Array<String>]
5550
+ #
5551
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionBodyContains AWS API Documentation
5552
+ #
5553
+ class ResponseInspectionBodyContains < Struct.new(
5554
+ :success_strings,
5555
+ :failure_strings)
5556
+ SENSITIVE = []
5557
+ include Aws::Structure
5558
+ end
5559
+
5560
+ # Configures inspection of the response header. This is part of the
5561
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5562
+ #
5563
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5564
+ # CloudFront distributions.
5565
+ #
5566
+ # </note>
5567
+ #
5568
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1, it's
5569
+ # possible to configure response inspection through the APIs, but ATP
5570
+ # response inspection will not be enabled. You can only use the response
5571
+ # inspection capabilities of the ATP managed rule group in web ACLs that
5572
+ # protect CloudFront distributions.
5573
+ #
5574
+ # </note>
5575
+ #
5576
+ # @!attribute [rw] name
5577
+ # The name of the header to match against. The name must be an exact
5578
+ # match, including case.
5579
+ #
5580
+ # JSON example: `"Name": [ "LoginResult" ]`
5581
+ # @return [String]
5582
+ #
5583
+ # @!attribute [rw] success_values
5584
+ # Values in the response header with the specified name that indicate
5585
+ # a successful login attempt. To be counted as a successful login, the
5586
+ # value must be an exact match, including case. Each value must be
5587
+ # unique among the success and failure values.
5588
+ #
5589
+ # JSON example: `"SuccessValues": [ "LoginPassed", "Successful login"
5590
+ # ]`
5591
+ # @return [Array<String>]
5592
+ #
5593
+ # @!attribute [rw] failure_values
5594
+ # Values in the response header with the specified name that indicate
5595
+ # a failed login attempt. To be counted as a failed login, the value
5596
+ # must be an exact match, including case. Each value must be unique
5597
+ # among the success and failure values.
5598
+ #
5599
+ # JSON example: `"FailureValues": [ "LoginFailed", "Failed login" ]`
5600
+ # @return [Array<String>]
5601
+ #
5602
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionHeader AWS API Documentation
5603
+ #
5604
+ class ResponseInspectionHeader < Struct.new(
5605
+ :name,
5606
+ :success_values,
5607
+ :failure_values)
5608
+ SENSITIVE = []
5609
+ include Aws::Structure
5610
+ end
5611
+
5612
+ # Configures inspection of the response JSON. This is part of the
5613
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5614
+ #
5615
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5616
+ # CloudFront distributions.
5617
+ #
5618
+ # </note>
5619
+ #
5620
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1, it's
5621
+ # possible to configure response inspection through the APIs, but ATP
5622
+ # response inspection will not be enabled. You can only use the response
5623
+ # inspection capabilities of the ATP managed rule group in web ACLs that
5624
+ # protect CloudFront distributions.
5625
+ #
5626
+ # </note>
5627
+ #
5628
+ # @!attribute [rw] identifier
5629
+ # The identifier for the value to match against in the JSON. The
5630
+ # identifier must be an exact match, including case.
5631
+ #
5632
+ # JSON example: `"Identifier": [ "/login/success" ]`
5633
+ # @return [String]
5634
+ #
5635
+ # @!attribute [rw] success_values
5636
+ # Values for the specified identifier in the response JSON that
5637
+ # indicate a successful login attempt. To be counted as a successful
5638
+ # login, the value must be an exact match, including case. Each value
5639
+ # must be unique among the success and failure values.
5640
+ #
5641
+ # JSON example: `"SuccessValues": [ "True", "Succeeded" ]`
5642
+ # @return [Array<String>]
5643
+ #
5644
+ # @!attribute [rw] failure_values
5645
+ # Values for the specified identifier in the response JSON that
5646
+ # indicate a failed login attempt. To be counted as a failed login,
5647
+ # the value must be an exact match, including case. Each value must be
5648
+ # unique among the success and failure values.
5649
+ #
5650
+ # JSON example: `"FailureValues": [ "False", "Failed" ]`
5651
+ # @return [Array<String>]
5652
+ #
5653
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionJson AWS API Documentation
5654
+ #
5655
+ class ResponseInspectionJson < Struct.new(
5656
+ :identifier,
5657
+ :success_values,
5658
+ :failure_values)
5659
+ SENSITIVE = []
5660
+ include Aws::Structure
5661
+ end
5662
+
5663
+ # Configures inspection of the response status code. This is part of the
5664
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5665
+ #
5666
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5667
+ # CloudFront distributions.
5668
+ #
5669
+ # </note>
5670
+ #
5671
+ # <note markdown="1"> For regional web ACLs in Region US East (N. Virginia) us-east-1, it's
5672
+ # possible to configure response inspection through the APIs, but ATP
5673
+ # response inspection will not be enabled. You can only use the response
5674
+ # inspection capabilities of the ATP managed rule group in web ACLs that
5675
+ # protect CloudFront distributions.
5676
+ #
5677
+ # </note>
5678
+ #
5679
+ # @!attribute [rw] success_codes
5680
+ # Status codes in the response that indicate a successful login
5681
+ # attempt. To be counted as a successful login, the response status
5682
+ # code must match one of these. Each code must be unique among the
5683
+ # success and failure status codes.
5684
+ #
5685
+ # JSON example: `"SuccessCodes": [ 200, 201 ]`
5686
+ # @return [Array<Integer>]
5687
+ #
5688
+ # @!attribute [rw] failure_codes
5689
+ # Status codes in the response that indicate a failed login attempt.
5690
+ # To be counted as a failed login, the response status code must match
5691
+ # one of these. Each code must be unique among the success and failure
5692
+ # status codes.
5693
+ #
5694
+ # JSON example: `"FailureCodes": [ 400, 404 ]`
5695
+ # @return [Array<Integer>]
5696
+ #
5697
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionStatusCode AWS API Documentation
5698
+ #
5699
+ class ResponseInspectionStatusCode < Struct.new(
5700
+ :success_codes,
5701
+ :failure_codes)
5702
+ SENSITIVE = []
5703
+ include Aws::Structure
5704
+ end
5705
+
5275
5706
  # A single rule, which you can use in a WebACL or RuleGroup to identify
5276
5707
  # web requests that you want to allow, block, or count. Each rule
5277
5708
  # includes one top-level Statement that WAF uses to identify matching
@@ -6070,7 +6501,7 @@ module Aws::WAFV2
6070
6501
  # create a rate-based rule with a nested AND rule statement that
6071
6502
  # contains the following nested statements:
6072
6503
  #
6073
- # * An IP match statement with an IP set that specified the address
6504
+ # * An IP match statement with an IP set that specifies the address
6074
6505
  # 192.0.2.44.
6075
6506
  #
6076
6507
  # * A string match statement that searches in the User-Agent header
@@ -7016,8 +7447,9 @@ module Aws::WAFV2
7016
7447
  #
7017
7448
  class UriPath < Aws::EmptyStructure; end
7018
7449
 
7019
- # Details about your login page username field, used in a
7020
- # `ManagedRuleGroupConfig`.
7450
+ # Details about your login page username field for request inspection,
7451
+ # used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
7452
+ # configuration.
7021
7453
  #
7022
7454
  # @!attribute [rw] identifier
7023
7455
  # The name of the username field. For example `/form/username`.
data/lib/aws-sdk-wafv2.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-wafv2/customizations'
52
52
  # @!group service
53
53
  module Aws::WAFV2
54
54
 
55
- GEM_VERSION = '1.47.0'
55
+ GEM_VERSION = '1.49.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-wafv2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.47.0
4
+ version: 1.49.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-18 00:00:00.000000000 Z
11
+ date: 2023-02-16 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core