aws-sdk-wafv2 1.81.0 → 1.83.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 0ddc94d4b33fb09be5a75ca88381ca1f61e236fb16a31373a686afb677eb5b07
4
- data.tar.gz: 7f462a53c3494408e6fae5a91c7e49a9c5422e96aeb2ed6edd65229f46699e30
3
+ metadata.gz: 632bbdb1c9a85228be9e1c7f182908c3d42f3fcad6539d1191540f8c53fa5000
4
+ data.tar.gz: e2ab40a42e7f08df75f064aeafb7b94a5e9ae43b57d80c69a4b580626a096f1c
5
5
  SHA512:
6
- metadata.gz: 19acdd679914ceac77fe2612169be8701d7d90bf0ca42d8a0cf0ccea5a36652d368eb28fa0796cb86f3d160d53092ece52bcf02b7d00865f03e0e2999fc592e6
7
- data.tar.gz: 662fcb2e20de1c0a270515a53c350ecbb3eeacaf1812432630a13f4c67eca63b1e429928c5d092cf6b6f6fa99eb08665e2dce4874ed6d1445726506722a593d4
6
+ metadata.gz: 3539d18be1ced9578de2596dcaf02d5a46e29dd168bdf666aa22110971da57f1aa7048b967200f3a187698a09b250fe1098d1fd08d79986998a44c04ed5e8188
7
+ data.tar.gz: f883469cb7895c2b9ea589d48c7ee67e9650c7b3aea53cfc685a1ff264c066d9526c844e88c7b68fa20966ee36dd480adbb8825eda078416eabebc226ca9cd3f
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.83.0 (2024-06-05)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.82.0 (2024-05-22)
10
+ ------------------
11
+
12
+ * Feature - You can now use Security Lake to collect web ACL traffic data.
13
+
4
14
  1.81.0 (2024-05-13)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.81.0
1
+ 1.83.0
@@ -3780,12 +3780,37 @@ module Aws::WAFV2
3780
3780
  # The Amazon Resource Name (ARN) of the web ACL from which you want to
3781
3781
  # delete the LoggingConfiguration.
3782
3782
  #
3783
+ # @option params [String] :log_type
3784
+ # Used to distinguish between various logging options. Currently, there
3785
+ # is one option.
3786
+ #
3787
+ # Default: `WAF_LOGS`
3788
+ #
3789
+ # @option params [String] :log_scope
3790
+ # The owner of the logging configuration, which must be set to
3791
+ # `CUSTOMER` for the configurations that you manage.
3792
+ #
3793
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
3794
+ # managed through Amazon Security Lake. You can use Security Lake to
3795
+ # collect log and event data from various sources for normalization,
3796
+ # analysis, and management. For information, see [Collecting data from
3797
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
3798
+ # guide*.
3799
+ #
3800
+ # Default: `CUSTOMER`
3801
+ #
3802
+ #
3803
+ #
3804
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
3805
+ #
3783
3806
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
3784
3807
  #
3785
3808
  # @example Request syntax with placeholder values
3786
3809
  #
3787
3810
  # resp = client.delete_logging_configuration({
3788
3811
  # resource_arn: "ResourceArn", # required
3812
+ # log_type: "WAF_LOGS", # accepts WAF_LOGS
3813
+ # log_scope: "CUSTOMER", # accepts CUSTOMER, SECURITY_LAKE
3789
3814
  # })
3790
3815
  #
3791
3816
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/DeleteLoggingConfiguration AWS API Documentation
@@ -4454,6 +4479,29 @@ module Aws::WAFV2
4454
4479
  # The Amazon Resource Name (ARN) of the web ACL for which you want to
4455
4480
  # get the LoggingConfiguration.
4456
4481
  #
4482
+ # @option params [String] :log_type
4483
+ # Used to distinguish between various logging options. Currently, there
4484
+ # is one option.
4485
+ #
4486
+ # Default: `WAF_LOGS`
4487
+ #
4488
+ # @option params [String] :log_scope
4489
+ # The owner of the logging configuration, which must be set to
4490
+ # `CUSTOMER` for the configurations that you manage.
4491
+ #
4492
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
4493
+ # managed through Amazon Security Lake. You can use Security Lake to
4494
+ # collect log and event data from various sources for normalization,
4495
+ # analysis, and management. For information, see [Collecting data from
4496
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
4497
+ # guide*.
4498
+ #
4499
+ # Default: `CUSTOMER`
4500
+ #
4501
+ #
4502
+ #
4503
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
4504
+ #
4457
4505
  # @return [Types::GetLoggingConfigurationResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
4458
4506
  #
4459
4507
  # * {Types::GetLoggingConfigurationResponse#logging_configuration #logging_configuration} => Types::LoggingConfiguration
@@ -4462,6 +4510,8 @@ module Aws::WAFV2
4462
4510
  #
4463
4511
  # resp = client.get_logging_configuration({
4464
4512
  # resource_arn: "ResourceArn", # required
4513
+ # log_type: "WAF_LOGS", # accepts WAF_LOGS
4514
+ # log_scope: "CUSTOMER", # accepts CUSTOMER, SECURITY_LAKE
4465
4515
  # })
4466
4516
  #
4467
4517
  # @example Response structure
@@ -4500,6 +4550,8 @@ module Aws::WAFV2
4500
4550
  # resp.logging_configuration.logging_filter.filters[0].conditions[0].action_condition.action #=> String, one of "ALLOW", "BLOCK", "COUNT", "CAPTCHA", "CHALLENGE", "EXCLUDED_AS_COUNT"
4501
4551
  # resp.logging_configuration.logging_filter.filters[0].conditions[0].label_name_condition.label_name #=> String
4502
4552
  # resp.logging_configuration.logging_filter.default_behavior #=> String, one of "KEEP", "DROP"
4553
+ # resp.logging_configuration.log_type #=> String, one of "WAF_LOGS"
4554
+ # resp.logging_configuration.log_scope #=> String, one of "CUSTOMER", "SECURITY_LAKE"
4503
4555
  #
4504
4556
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/GetLoggingConfiguration AWS API Documentation
4505
4557
  #
@@ -5758,6 +5810,23 @@ module Aws::WAFV2
5758
5810
  # a `NextMarker` value that you can use in a subsequent call to get the
5759
5811
  # next batch of objects.
5760
5812
  #
5813
+ # @option params [String] :log_scope
5814
+ # The owner of the logging configuration, which must be set to
5815
+ # `CUSTOMER` for the configurations that you manage.
5816
+ #
5817
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
5818
+ # managed through Amazon Security Lake. You can use Security Lake to
5819
+ # collect log and event data from various sources for normalization,
5820
+ # analysis, and management. For information, see [Collecting data from
5821
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
5822
+ # guide*.
5823
+ #
5824
+ # Default: `CUSTOMER`
5825
+ #
5826
+ #
5827
+ #
5828
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
5829
+ #
5761
5830
  # @return [Types::ListLoggingConfigurationsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
5762
5831
  #
5763
5832
  # * {Types::ListLoggingConfigurationsResponse#logging_configurations #logging_configurations} => Array<Types::LoggingConfiguration>
@@ -5769,6 +5838,7 @@ module Aws::WAFV2
5769
5838
  # scope: "CLOUDFRONT", # required, accepts CLOUDFRONT, REGIONAL
5770
5839
  # next_marker: "NextMarker",
5771
5840
  # limit: 1,
5841
+ # log_scope: "CUSTOMER", # accepts CUSTOMER, SECURITY_LAKE
5772
5842
  # })
5773
5843
  #
5774
5844
  # @example Response structure
@@ -5808,6 +5878,8 @@ module Aws::WAFV2
5808
5878
  # resp.logging_configurations[0].logging_filter.filters[0].conditions[0].action_condition.action #=> String, one of "ALLOW", "BLOCK", "COUNT", "CAPTCHA", "CHALLENGE", "EXCLUDED_AS_COUNT"
5809
5879
  # resp.logging_configurations[0].logging_filter.filters[0].conditions[0].label_name_condition.label_name #=> String
5810
5880
  # resp.logging_configurations[0].logging_filter.default_behavior #=> String, one of "KEEP", "DROP"
5881
+ # resp.logging_configurations[0].log_type #=> String, one of "WAF_LOGS"
5882
+ # resp.logging_configurations[0].log_scope #=> String, one of "CUSTOMER", "SECURITY_LAKE"
5811
5883
  # resp.next_marker #=> String
5812
5884
  #
5813
5885
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ListLoggingConfigurations AWS API Documentation
@@ -6401,6 +6473,8 @@ module Aws::WAFV2
6401
6473
  # ],
6402
6474
  # default_behavior: "KEEP", # required, accepts KEEP, DROP
6403
6475
  # },
6476
+ # log_type: "WAF_LOGS", # accepts WAF_LOGS
6477
+ # log_scope: "CUSTOMER", # accepts CUSTOMER, SECURITY_LAKE
6404
6478
  # },
6405
6479
  # })
6406
6480
  #
@@ -6440,6 +6514,8 @@ module Aws::WAFV2
6440
6514
  # resp.logging_configuration.logging_filter.filters[0].conditions[0].action_condition.action #=> String, one of "ALLOW", "BLOCK", "COUNT", "CAPTCHA", "CHALLENGE", "EXCLUDED_AS_COUNT"
6441
6515
  # resp.logging_configuration.logging_filter.filters[0].conditions[0].label_name_condition.label_name #=> String
6442
6516
  # resp.logging_configuration.logging_filter.default_behavior #=> String, one of "KEEP", "DROP"
6517
+ # resp.logging_configuration.log_type #=> String, one of "WAF_LOGS"
6518
+ # resp.logging_configuration.log_scope #=> String, one of "CUSTOMER", "SECURITY_LAKE"
6443
6519
  #
6444
6520
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/PutLoggingConfiguration AWS API Documentation
6445
6521
  #
@@ -9108,7 +9184,7 @@ module Aws::WAFV2
9108
9184
  params: params,
9109
9185
  config: config)
9110
9186
  context[:gem_name] = 'aws-sdk-wafv2'
9111
- context[:gem_version] = '1.81.0'
9187
+ context[:gem_version] = '1.83.0'
9112
9188
  Seahorse::Client::Request.new(handlers, context)
9113
9189
  end
9114
9190
 
@@ -223,6 +223,8 @@ module Aws::WAFV2
223
223
  ListWebACLsResponse = Shapes::StructureShape.new(name: 'ListWebACLsResponse')
224
224
  LockToken = Shapes::StringShape.new(name: 'LockToken')
225
225
  LogDestinationConfigs = Shapes::ListShape.new(name: 'LogDestinationConfigs')
226
+ LogScope = Shapes::StringShape.new(name: 'LogScope')
227
+ LogType = Shapes::StringShape.new(name: 'LogType')
226
228
  LoggingConfiguration = Shapes::StructureShape.new(name: 'LoggingConfiguration')
227
229
  LoggingConfigurations = Shapes::ListShape.new(name: 'LoggingConfigurations')
228
230
  LoggingFilter = Shapes::StructureShape.new(name: 'LoggingFilter')
@@ -644,6 +646,8 @@ module Aws::WAFV2
644
646
  DeleteIPSetResponse.struct_class = Types::DeleteIPSetResponse
645
647
 
646
648
  DeleteLoggingConfigurationRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: ResourceArn, required: true, location_name: "ResourceArn"))
649
+ DeleteLoggingConfigurationRequest.add_member(:log_type, Shapes::ShapeRef.new(shape: LogType, location_name: "LogType"))
650
+ DeleteLoggingConfigurationRequest.add_member(:log_scope, Shapes::ShapeRef.new(shape: LogScope, location_name: "LogScope"))
647
651
  DeleteLoggingConfigurationRequest.struct_class = Types::DeleteLoggingConfigurationRequest
648
652
 
649
653
  DeleteLoggingConfigurationResponse.struct_class = Types::DeleteLoggingConfigurationResponse
@@ -785,6 +789,8 @@ module Aws::WAFV2
785
789
  GetIPSetResponse.struct_class = Types::GetIPSetResponse
786
790
 
787
791
  GetLoggingConfigurationRequest.add_member(:resource_arn, Shapes::ShapeRef.new(shape: ResourceArn, required: true, location_name: "ResourceArn"))
792
+ GetLoggingConfigurationRequest.add_member(:log_type, Shapes::ShapeRef.new(shape: LogType, location_name: "LogType"))
793
+ GetLoggingConfigurationRequest.add_member(:log_scope, Shapes::ShapeRef.new(shape: LogScope, location_name: "LogScope"))
788
794
  GetLoggingConfigurationRequest.struct_class = Types::GetLoggingConfigurationRequest
789
795
 
790
796
  GetLoggingConfigurationResponse.add_member(:logging_configuration, Shapes::ShapeRef.new(shape: LoggingConfiguration, location_name: "LoggingConfiguration"))
@@ -1005,6 +1011,7 @@ module Aws::WAFV2
1005
1011
  ListLoggingConfigurationsRequest.add_member(:scope, Shapes::ShapeRef.new(shape: Scope, required: true, location_name: "Scope"))
1006
1012
  ListLoggingConfigurationsRequest.add_member(:next_marker, Shapes::ShapeRef.new(shape: NextMarker, location_name: "NextMarker"))
1007
1013
  ListLoggingConfigurationsRequest.add_member(:limit, Shapes::ShapeRef.new(shape: PaginationLimit, location_name: "Limit"))
1014
+ ListLoggingConfigurationsRequest.add_member(:log_scope, Shapes::ShapeRef.new(shape: LogScope, location_name: "LogScope"))
1008
1015
  ListLoggingConfigurationsRequest.struct_class = Types::ListLoggingConfigurationsRequest
1009
1016
 
1010
1017
  ListLoggingConfigurationsResponse.add_member(:logging_configurations, Shapes::ShapeRef.new(shape: LoggingConfigurations, location_name: "LoggingConfigurations"))
@@ -1079,6 +1086,8 @@ module Aws::WAFV2
1079
1086
  LoggingConfiguration.add_member(:redacted_fields, Shapes::ShapeRef.new(shape: RedactedFields, location_name: "RedactedFields"))
1080
1087
  LoggingConfiguration.add_member(:managed_by_firewall_manager, Shapes::ShapeRef.new(shape: Boolean, location_name: "ManagedByFirewallManager"))
1081
1088
  LoggingConfiguration.add_member(:logging_filter, Shapes::ShapeRef.new(shape: LoggingFilter, location_name: "LoggingFilter"))
1089
+ LoggingConfiguration.add_member(:log_type, Shapes::ShapeRef.new(shape: LogType, location_name: "LogType"))
1090
+ LoggingConfiguration.add_member(:log_scope, Shapes::ShapeRef.new(shape: LogScope, location_name: "LogScope"))
1082
1091
  LoggingConfiguration.struct_class = Types::LoggingConfiguration
1083
1092
 
1084
1093
  LoggingConfigurations.member = Shapes::ShapeRef.new(shape: LoggingConfiguration)
@@ -1702,6 +1711,7 @@ module Aws::WAFV2
1702
1711
  "endpointPrefix" => "wafv2",
1703
1712
  "jsonVersion" => "1.1",
1704
1713
  "protocol" => "json",
1714
+ "protocols" => ["json"],
1705
1715
  "serviceAbbreviation" => "WAFV2",
1706
1716
  "serviceFullName" => "AWS WAFV2",
1707
1717
  "serviceId" => "WAFV2",
@@ -559,12 +559,14 @@ module Aws::WAFV2
559
559
  # * `UriPath`: The value that you want WAF to search for in the URI
560
560
  # path, for example, `/images/daily-ad.jpg`.
561
561
  #
562
- # * `JA3Fingerprint`: Match against the request's JA3 fingerprint.
563
- # The JA3 fingerprint is a 32-character hash derived from the TLS
564
- # Client Hello of an incoming request. This fingerprint serves as a
565
- # unique identifier for the client's TLS configuration. You can use
566
- # this choice only with a string match `ByteMatchStatement` with the
567
- # `PositionalConstraint` set to `EXACTLY`.
562
+ # * `JA3Fingerprint`: Available for use with Amazon CloudFront
563
+ # distributions and Application Load Balancers. Match against the
564
+ # request's JA3 fingerprint. The JA3 fingerprint is a 32-character
565
+ # hash derived from the TLS Client Hello of an incoming request.
566
+ # This fingerprint serves as a unique identifier for the client's
567
+ # TLS configuration. You can use this choice only with a string
568
+ # match `ByteMatchStatement` with the `PositionalConstraint` set to
569
+ # `EXACTLY`.
568
570
  #
569
571
  # You can obtain the JA3 fingerprint for client requests from the
570
572
  # web ACL logs. If WAF is able to calculate the fingerprint, it
@@ -1849,10 +1851,37 @@ module Aws::WAFV2
1849
1851
  # delete the LoggingConfiguration.
1850
1852
  # @return [String]
1851
1853
  #
1854
+ # @!attribute [rw] log_type
1855
+ # Used to distinguish between various logging options. Currently,
1856
+ # there is one option.
1857
+ #
1858
+ # Default: `WAF_LOGS`
1859
+ # @return [String]
1860
+ #
1861
+ # @!attribute [rw] log_scope
1862
+ # The owner of the logging configuration, which must be set to
1863
+ # `CUSTOMER` for the configurations that you manage.
1864
+ #
1865
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
1866
+ # managed through Amazon Security Lake. You can use Security Lake to
1867
+ # collect log and event data from various sources for normalization,
1868
+ # analysis, and management. For information, see [Collecting data from
1869
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
1870
+ # guide*.
1871
+ #
1872
+ # Default: `CUSTOMER`
1873
+ #
1874
+ #
1875
+ #
1876
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
1877
+ # @return [String]
1878
+ #
1852
1879
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/DeleteLoggingConfigurationRequest AWS API Documentation
1853
1880
  #
1854
1881
  class DeleteLoggingConfigurationRequest < Struct.new(
1855
- :resource_arn)
1882
+ :resource_arn,
1883
+ :log_type,
1884
+ :log_scope)
1856
1885
  SENSITIVE = []
1857
1886
  include Aws::Structure
1858
1887
  end
@@ -2379,6 +2408,11 @@ module Aws::WAFV2
2379
2408
  # for field redaction, you are specifying the component type to
2380
2409
  # redact from the logs.
2381
2410
  #
2411
+ # * If you have request sampling enabled, the redacted fields
2412
+ # configuration for logging has no impact on sampling. The only way
2413
+ # to exclude fields from request sampling is by disabling sampling
2414
+ # in the web ACL visibility configuration.
2415
+ #
2382
2416
  # @!attribute [rw] single_header
2383
2417
  # Inspect a single header. Provide the name of the header to inspect,
2384
2418
  # for example, `User-Agent` or `Referer`. This setting isn't case
@@ -2501,13 +2535,14 @@ module Aws::WAFV2
2501
2535
  # @return [Types::HeaderOrder]
2502
2536
  #
2503
2537
  # @!attribute [rw] ja3_fingerprint
2504
- # Match against the request's JA3 fingerprint. The JA3 fingerprint is
2505
- # a 32-character hash derived from the TLS Client Hello of an incoming
2506
- # request. This fingerprint serves as a unique identifier for the
2507
- # client's TLS configuration. WAF calculates and logs this
2508
- # fingerprint for each request that has enough TLS Client Hello
2509
- # information for the calculation. Almost all web requests include
2510
- # this information.
2538
+ # Available for use with Amazon CloudFront distributions and
2539
+ # Application Load Balancers. Match against the request's JA3
2540
+ # fingerprint. The JA3 fingerprint is a 32-character hash derived from
2541
+ # the TLS Client Hello of an incoming request. This fingerprint serves
2542
+ # as a unique identifier for the client's TLS configuration. WAF
2543
+ # calculates and logs this fingerprint for each request that has
2544
+ # enough TLS Client Hello information for the calculation. Almost all
2545
+ # web requests include this information.
2511
2546
  #
2512
2547
  # <note markdown="1"> You can use this choice only with a string match
2513
2548
  # `ByteMatchStatement` with the `PositionalConstraint` set to
@@ -2925,10 +2960,37 @@ module Aws::WAFV2
2925
2960
  # get the LoggingConfiguration.
2926
2961
  # @return [String]
2927
2962
  #
2963
+ # @!attribute [rw] log_type
2964
+ # Used to distinguish between various logging options. Currently,
2965
+ # there is one option.
2966
+ #
2967
+ # Default: `WAF_LOGS`
2968
+ # @return [String]
2969
+ #
2970
+ # @!attribute [rw] log_scope
2971
+ # The owner of the logging configuration, which must be set to
2972
+ # `CUSTOMER` for the configurations that you manage.
2973
+ #
2974
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
2975
+ # managed through Amazon Security Lake. You can use Security Lake to
2976
+ # collect log and event data from various sources for normalization,
2977
+ # analysis, and management. For information, see [Collecting data from
2978
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
2979
+ # guide*.
2980
+ #
2981
+ # Default: `CUSTOMER`
2982
+ #
2983
+ #
2984
+ #
2985
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
2986
+ # @return [String]
2987
+ #
2928
2988
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/GetLoggingConfigurationRequest AWS API Documentation
2929
2989
  #
2930
2990
  class GetLoggingConfigurationRequest < Struct.new(
2931
- :resource_arn)
2991
+ :resource_arn,
2992
+ :log_type,
2993
+ :log_scope)
2932
2994
  SENSITIVE = []
2933
2995
  include Aws::Structure
2934
2996
  end
@@ -3960,12 +4022,14 @@ module Aws::WAFV2
3960
4022
  include Aws::Structure
3961
4023
  end
3962
4024
 
3963
- # Match against the request's JA3 fingerprint. The JA3 fingerprint is a
3964
- # 32-character hash derived from the TLS Client Hello of an incoming
3965
- # request. This fingerprint serves as a unique identifier for the
3966
- # client's TLS configuration. WAF calculates and logs this fingerprint
3967
- # for each request that has enough TLS Client Hello information for the
3968
- # calculation. Almost all web requests include this information.
4025
+ # Available for use with Amazon CloudFront distributions and Application
4026
+ # Load Balancers. Match against the request's JA3 fingerprint. The JA3
4027
+ # fingerprint is a 32-character hash derived from the TLS Client Hello
4028
+ # of an incoming request. This fingerprint serves as a unique identifier
4029
+ # for the client's TLS configuration. WAF calculates and logs this
4030
+ # fingerprint for each request that has enough TLS Client Hello
4031
+ # information for the calculation. Almost all web requests include this
4032
+ # information.
3969
4033
  #
3970
4034
  # <note markdown="1"> You can use this choice only with a string match `ByteMatchStatement`
3971
4035
  # with the `PositionalConstraint` set to `EXACTLY`.
@@ -4564,12 +4628,31 @@ module Aws::WAFV2
4564
4628
  # to get the next batch of objects.
4565
4629
  # @return [Integer]
4566
4630
  #
4631
+ # @!attribute [rw] log_scope
4632
+ # The owner of the logging configuration, which must be set to
4633
+ # `CUSTOMER` for the configurations that you manage.
4634
+ #
4635
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
4636
+ # managed through Amazon Security Lake. You can use Security Lake to
4637
+ # collect log and event data from various sources for normalization,
4638
+ # analysis, and management. For information, see [Collecting data from
4639
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
4640
+ # guide*.
4641
+ #
4642
+ # Default: `CUSTOMER`
4643
+ #
4644
+ #
4645
+ #
4646
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
4647
+ # @return [String]
4648
+ #
4567
4649
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ListLoggingConfigurationsRequest AWS API Documentation
4568
4650
  #
4569
4651
  class ListLoggingConfigurationsRequest < Struct.new(
4570
4652
  :scope,
4571
4653
  :next_marker,
4572
- :limit)
4654
+ :limit,
4655
+ :log_scope)
4573
4656
  SENSITIVE = []
4574
4657
  include Aws::Structure
4575
4658
  end
@@ -5064,6 +5147,12 @@ module Aws::WAFV2
5064
5147
  # `QueryString`, `SingleHeader`, and `Method`.
5065
5148
  #
5066
5149
  # </note>
5150
+ #
5151
+ # <note markdown="1"> This setting has no impact on request sampling. With request
5152
+ # sampling, the only way to exclude fields is by disabling sampling in
5153
+ # the web ACL visibility configuration.
5154
+ #
5155
+ # </note>
5067
5156
  # @return [Array<Types::FieldToMatch>]
5068
5157
  #
5069
5158
  # @!attribute [rw] managed_by_firewall_manager
@@ -5079,6 +5168,31 @@ module Aws::WAFV2
5079
5168
  # evaluation.
5080
5169
  # @return [Types::LoggingFilter]
5081
5170
  #
5171
+ # @!attribute [rw] log_type
5172
+ # Used to distinguish between various logging options. Currently,
5173
+ # there is one option.
5174
+ #
5175
+ # Default: `WAF_LOGS`
5176
+ # @return [String]
5177
+ #
5178
+ # @!attribute [rw] log_scope
5179
+ # The owner of the logging configuration, which must be set to
5180
+ # `CUSTOMER` for the configurations that you manage.
5181
+ #
5182
+ # The log scope `SECURITY_LAKE` indicates a configuration that is
5183
+ # managed through Amazon Security Lake. You can use Security Lake to
5184
+ # collect log and event data from various sources for normalization,
5185
+ # analysis, and management. For information, see [Collecting data from
5186
+ # Amazon Web Services services][1] in the *Amazon Security Lake user
5187
+ # guide*.
5188
+ #
5189
+ # Default: `CUSTOMER`
5190
+ #
5191
+ #
5192
+ #
5193
+ # [1]: https://docs.aws.amazon.com/security-lake/latest/userguide/internal-sources.html
5194
+ # @return [String]
5195
+ #
5082
5196
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/LoggingConfiguration AWS API Documentation
5083
5197
  #
5084
5198
  class LoggingConfiguration < Struct.new(
@@ -5086,7 +5200,9 @@ module Aws::WAFV2
5086
5200
  :log_destination_configs,
5087
5201
  :redacted_fields,
5088
5202
  :managed_by_firewall_manager,
5089
- :logging_filter)
5203
+ :logging_filter,
5204
+ :log_type,
5205
+ :log_scope)
5090
5206
  SENSITIVE = []
5091
5207
  include Aws::Structure
5092
5208
  end
@@ -9235,6 +9351,14 @@ module Aws::WAFV2
9235
9351
  # Indicates whether WAF should store a sampling of the web requests
9236
9352
  # that match the rules. You can view the sampled requests through the
9237
9353
  # WAF console.
9354
+ #
9355
+ # <note markdown="1"> Request sampling doesn't provide a field redaction option, and any
9356
+ # field redaction that you specify in your logging configuration
9357
+ # doesn't affect sampling. The only way to exclude fields from
9358
+ # request sampling is by disabling sampling in the web ACL visibility
9359
+ # configuration.
9360
+ #
9361
+ # </note>
9238
9362
  # @return [Boolean]
9239
9363
  #
9240
9364
  # @!attribute [rw] cloud_watch_metrics_enabled
data/lib/aws-sdk-wafv2.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-wafv2/customizations'
52
52
  # @!group service
53
53
  module Aws::WAFV2
54
54
 
55
- GEM_VERSION = '1.81.0'
55
+ GEM_VERSION = '1.83.0'
56
56
 
57
57
  end
data/sig/client.rbs CHANGED
@@ -2716,7 +2716,9 @@ module Aws
2716
2716
  end
2717
2717
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/WAFV2/Client.html#delete_logging_configuration-instance_method
2718
2718
  def delete_logging_configuration: (
2719
- resource_arn: ::String
2719
+ resource_arn: ::String,
2720
+ ?log_type: ("WAF_LOGS"),
2721
+ ?log_scope: ("CUSTOMER" | "SECURITY_LAKE")
2720
2722
  ) -> _DeleteLoggingConfigurationResponseSuccess
2721
2723
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _DeleteLoggingConfigurationResponseSuccess
2722
2724
 
@@ -2856,7 +2858,9 @@ module Aws
2856
2858
  end
2857
2859
  # https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/WAFV2/Client.html#get_logging_configuration-instance_method
2858
2860
  def get_logging_configuration: (
2859
- resource_arn: ::String
2861
+ resource_arn: ::String,
2862
+ ?log_type: ("WAF_LOGS"),
2863
+ ?log_scope: ("CUSTOMER" | "SECURITY_LAKE")
2860
2864
  ) -> _GetLoggingConfigurationResponseSuccess
2861
2865
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _GetLoggingConfigurationResponseSuccess
2862
2866
 
@@ -3044,7 +3048,8 @@ module Aws
3044
3048
  def list_logging_configurations: (
3045
3049
  scope: ("CLOUDFRONT" | "REGIONAL"),
3046
3050
  ?next_marker: ::String,
3047
- ?limit: ::Integer
3051
+ ?limit: ::Integer,
3052
+ ?log_scope: ("CUSTOMER" | "SECURITY_LAKE")
3048
3053
  ) -> _ListLoggingConfigurationsResponseSuccess
3049
3054
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _ListLoggingConfigurationsResponseSuccess
3050
3055
 
@@ -3222,7 +3227,9 @@ module Aws
3222
3227
  },
3223
3228
  ],
3224
3229
  default_behavior: ("KEEP" | "DROP")
3225
- }?
3230
+ }?,
3231
+ log_type: ("WAF_LOGS")?,
3232
+ log_scope: ("CUSTOMER" | "SECURITY_LAKE")?
3226
3233
  }
3227
3234
  ) -> _PutLoggingConfigurationResponseSuccess
3228
3235
  | (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _PutLoggingConfigurationResponseSuccess
data/sig/types.rbs CHANGED
@@ -308,6 +308,8 @@ module Aws::WAFV2
308
308
 
309
309
  class DeleteLoggingConfigurationRequest
310
310
  attr_accessor resource_arn: ::String
311
+ attr_accessor log_type: ("WAF_LOGS")
312
+ attr_accessor log_scope: ("CUSTOMER" | "SECURITY_LAKE")
311
313
  SENSITIVE: []
312
314
  end
313
315
 
@@ -501,6 +503,8 @@ module Aws::WAFV2
501
503
 
502
504
  class GetLoggingConfigurationRequest
503
505
  attr_accessor resource_arn: ::String
506
+ attr_accessor log_type: ("WAF_LOGS")
507
+ attr_accessor log_scope: ("CUSTOMER" | "SECURITY_LAKE")
504
508
  SENSITIVE: []
505
509
  end
506
510
 
@@ -797,6 +801,7 @@ module Aws::WAFV2
797
801
  attr_accessor scope: ("CLOUDFRONT" | "REGIONAL")
798
802
  attr_accessor next_marker: ::String
799
803
  attr_accessor limit: ::Integer
804
+ attr_accessor log_scope: ("CUSTOMER" | "SECURITY_LAKE")
800
805
  SENSITIVE: []
801
806
  end
802
807
 
@@ -901,6 +906,8 @@ module Aws::WAFV2
901
906
  attr_accessor redacted_fields: ::Array[Types::FieldToMatch]
902
907
  attr_accessor managed_by_firewall_manager: bool
903
908
  attr_accessor logging_filter: Types::LoggingFilter
909
+ attr_accessor log_type: ("WAF_LOGS")
910
+ attr_accessor log_scope: ("CUSTOMER" | "SECURITY_LAKE")
904
911
  SENSITIVE: []
905
912
  end
906
913
 
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-wafv2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.81.0
4
+ version: 1.83.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2024-05-13 00:00:00.000000000 Z
11
+ date: 2024-06-05 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.193.0
22
+ version: 3.197.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.193.0
32
+ version: 3.197.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement