aws-sdk-wafv2 1.47.0 → 1.48.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 960b988b9949275485163b7947eb4b36cba6a408fa00fca07b1c0ea9382c0471
4
- data.tar.gz: f56cbb0272a221a37c7b4cf29901cbc63cdc216f075eca3b2671d3ad04b2caff
3
+ metadata.gz: 4531f8ed92204cae6ddb9366213f1b30c68deeda302adbadc229032135373637
4
+ data.tar.gz: 970e1a5542a9e6d7f311dd69c01a604c9a3a2831f07d39ff1540c08850012d6d
5
5
  SHA512:
6
- metadata.gz: ddadf8ab33aed3c00d2c5fbd0444de6758abc6515824e7155cd4deceaf83970d21c6a04c2246f3a32a5f6be97d24a6c91d51c01a3cfe910a072e8555c2d81e1a
7
- data.tar.gz: 292707fda25b8c3f6b4ad01abb84cdd68e01748691129cec6ed0272be226462d8fe6a0b7325ae57e7be53f42693cead9cd8a27824f0221d8302b2a9ac148e2c9
6
+ metadata.gz: 42f4c2f44c6fbed19ff483b0f455a653e9d2ca50eab5832aa503579386a24d2aa6949f8c4680d3d8b124e729e2fd79f441f89f0495434dfb25a3c10aed8abbce
7
+ data.tar.gz: cd15da52802d7331e644bae2ab4cd09268edd0c3eaf3e5910c2829e46d30738c253115c6076710b3e2fee81fa4abea8dd629e8a5f1e5d58475a1f25a4043ea0e
data/CHANGELOG.md CHANGED
@@ -1,6 +1,11 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.48.0 (2023-02-15)
5
+ ------------------
6
+
7
+ * Feature - For protected CloudFront distributions, you can now use the AWS WAF Fraud Control account takeover prevention (ATP) managed rule group to block new login attempts from clients that have recently submitted too many failed login attempts.
8
+
4
9
  1.47.0 (2023-01-18)
5
10
  ------------------
6
11
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.47.0
1
+ 1.48.0
@@ -919,6 +919,38 @@ module Aws::WAFV2
919
919
  # aws_managed_rules_bot_control_rule_set: {
920
920
  # inspection_level: "COMMON", # required, accepts COMMON, TARGETED
921
921
  # },
922
+ # aws_managed_rules_atp_rule_set: {
923
+ # login_path: "String", # required
924
+ # request_inspection: {
925
+ # payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
926
+ # username_field: { # required
927
+ # identifier: "FieldIdentifier", # required
928
+ # },
929
+ # password_field: { # required
930
+ # identifier: "FieldIdentifier", # required
931
+ # },
932
+ # },
933
+ # response_inspection: {
934
+ # status_code: {
935
+ # success_codes: [1], # required
936
+ # failure_codes: [1], # required
937
+ # },
938
+ # header: {
939
+ # name: "ResponseInspectionHeaderName", # required
940
+ # success_values: ["SuccessValue"], # required
941
+ # failure_values: ["FailureValue"], # required
942
+ # },
943
+ # body_contains: {
944
+ # success_strings: ["SuccessValue"], # required
945
+ # failure_strings: ["FailureValue"], # required
946
+ # },
947
+ # json: {
948
+ # identifier: "FieldIdentifier", # required
949
+ # success_values: ["SuccessValue"], # required
950
+ # failure_values: ["FailureValue"], # required
951
+ # },
952
+ # },
953
+ # },
922
954
  # },
923
955
  # ],
924
956
  # rule_action_overrides: [
@@ -1854,6 +1886,38 @@ module Aws::WAFV2
1854
1886
  # aws_managed_rules_bot_control_rule_set: {
1855
1887
  # inspection_level: "COMMON", # required, accepts COMMON, TARGETED
1856
1888
  # },
1889
+ # aws_managed_rules_atp_rule_set: {
1890
+ # login_path: "String", # required
1891
+ # request_inspection: {
1892
+ # payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
1893
+ # username_field: { # required
1894
+ # identifier: "FieldIdentifier", # required
1895
+ # },
1896
+ # password_field: { # required
1897
+ # identifier: "FieldIdentifier", # required
1898
+ # },
1899
+ # },
1900
+ # response_inspection: {
1901
+ # status_code: {
1902
+ # success_codes: [1], # required
1903
+ # failure_codes: [1], # required
1904
+ # },
1905
+ # header: {
1906
+ # name: "ResponseInspectionHeaderName", # required
1907
+ # success_values: ["SuccessValue"], # required
1908
+ # failure_values: ["FailureValue"], # required
1909
+ # },
1910
+ # body_contains: {
1911
+ # success_strings: ["SuccessValue"], # required
1912
+ # failure_strings: ["FailureValue"], # required
1913
+ # },
1914
+ # json: {
1915
+ # identifier: "FieldIdentifier", # required
1916
+ # success_values: ["SuccessValue"], # required
1917
+ # failure_values: ["FailureValue"], # required
1918
+ # },
1919
+ # },
1920
+ # },
1857
1921
  # },
1858
1922
  # ],
1859
1923
  # rule_action_overrides: [
@@ -2669,6 +2733,38 @@ module Aws::WAFV2
2669
2733
  # aws_managed_rules_bot_control_rule_set: {
2670
2734
  # inspection_level: "COMMON", # required, accepts COMMON, TARGETED
2671
2735
  # },
2736
+ # aws_managed_rules_atp_rule_set: {
2737
+ # login_path: "String", # required
2738
+ # request_inspection: {
2739
+ # payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
2740
+ # username_field: { # required
2741
+ # identifier: "FieldIdentifier", # required
2742
+ # },
2743
+ # password_field: { # required
2744
+ # identifier: "FieldIdentifier", # required
2745
+ # },
2746
+ # },
2747
+ # response_inspection: {
2748
+ # status_code: {
2749
+ # success_codes: [1], # required
2750
+ # failure_codes: [1], # required
2751
+ # },
2752
+ # header: {
2753
+ # name: "ResponseInspectionHeaderName", # required
2754
+ # success_values: ["SuccessValue"], # required
2755
+ # failure_values: ["FailureValue"], # required
2756
+ # },
2757
+ # body_contains: {
2758
+ # success_strings: ["SuccessValue"], # required
2759
+ # failure_strings: ["FailureValue"], # required
2760
+ # },
2761
+ # json: {
2762
+ # identifier: "FieldIdentifier", # required
2763
+ # success_values: ["SuccessValue"], # required
2764
+ # failure_values: ["FailureValue"], # required
2765
+ # },
2766
+ # },
2767
+ # },
2672
2768
  # },
2673
2769
  # ],
2674
2770
  # rule_action_overrides: [
@@ -4100,6 +4196,28 @@ module Aws::WAFV2
4100
4196
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
4101
4197
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
4102
4198
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
4199
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
4200
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
4201
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
4202
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
4203
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
4204
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
4205
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
4206
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
4207
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
4208
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
4209
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
4210
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
4211
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
4212
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
4213
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
4214
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
4215
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
4216
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
4217
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
4218
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
4219
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
4220
+ # resp.rule_group.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
4103
4221
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
4104
4222
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
4105
4223
  # resp.rule_group.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -4534,6 +4652,28 @@ module Aws::WAFV2
4534
4652
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
4535
4653
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
4536
4654
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
4655
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
4656
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
4657
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
4658
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
4659
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
4660
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
4661
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
4662
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
4663
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
4664
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
4665
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
4666
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
4667
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
4668
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
4669
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
4670
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
4671
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
4672
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
4673
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
4674
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
4675
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
4676
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
4537
4677
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
4538
4678
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
4539
4679
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -4812,6 +4952,28 @@ module Aws::WAFV2
4812
4952
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
4813
4953
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
4814
4954
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
4955
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
4956
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
4957
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
4958
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
4959
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
4960
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
4961
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
4962
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
4963
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
4964
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
4965
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
4966
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
4967
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
4968
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
4969
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
4970
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
4971
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
4972
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
4973
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
4974
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
4975
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
4976
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
4815
4977
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
4816
4978
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
4817
4979
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -5061,6 +5223,28 @@ module Aws::WAFV2
5061
5223
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
5062
5224
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
5063
5225
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
5226
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
5227
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
5228
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
5229
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
5230
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
5231
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
5232
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
5233
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
5234
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
5235
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
5236
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
5237
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
5238
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
5239
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
5240
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
5241
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
5242
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
5243
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
5244
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
5245
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
5246
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
5247
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
5064
5248
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
5065
5249
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
5066
5250
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -5350,6 +5534,28 @@ module Aws::WAFV2
5350
5534
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
5351
5535
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
5352
5536
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
5537
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
5538
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
5539
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
5540
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
5541
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
5542
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
5543
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
5544
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
5545
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
5546
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
5547
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
5548
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
5549
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
5550
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
5551
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
5552
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
5553
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
5554
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
5555
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
5556
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
5557
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
5558
+ # resp.web_acl.rules[0].statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
5353
5559
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides #=> Array
5354
5560
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
5355
5561
  # resp.web_acl.rules[0].statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -5628,6 +5834,28 @@ module Aws::WAFV2
5628
5834
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
5629
5835
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
5630
5836
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
5837
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
5838
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
5839
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
5840
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
5841
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
5842
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
5843
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
5844
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
5845
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
5846
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
5847
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
5848
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
5849
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
5850
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
5851
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
5852
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
5853
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
5854
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
5855
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
5856
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
5857
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
5858
+ # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
5631
5859
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
5632
5860
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
5633
5861
  # resp.web_acl.pre_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -5877,6 +6105,28 @@ module Aws::WAFV2
5877
6105
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].username_field.identifier #=> String
5878
6106
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].password_field.identifier #=> String
5879
6107
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_bot_control_rule_set.inspection_level #=> String, one of "COMMON", "TARGETED"
6108
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.login_path #=> String
6109
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.payload_type #=> String, one of "JSON", "FORM_ENCODED"
6110
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.username_field.identifier #=> String
6111
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.request_inspection.password_field.identifier #=> String
6112
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes #=> Array
6113
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.success_codes[0] #=> Integer
6114
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes #=> Array
6115
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.status_code.failure_codes[0] #=> Integer
6116
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.name #=> String
6117
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values #=> Array
6118
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.success_values[0] #=> String
6119
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values #=> Array
6120
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.header.failure_values[0] #=> String
6121
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings #=> Array
6122
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.success_strings[0] #=> String
6123
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings #=> Array
6124
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.body_contains.failure_strings[0] #=> String
6125
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.identifier #=> String
6126
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values #=> Array
6127
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.success_values[0] #=> String
6128
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values #=> Array
6129
+ # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.managed_rule_group_configs[0].aws_managed_rules_atp_rule_set.response_inspection.json.failure_values[0] #=> String
5880
6130
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides #=> Array
5881
6131
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].name #=> String
5882
6132
  # resp.web_acl.post_process_firewall_manager_rule_groups[0].firewall_manager_statement.managed_rule_group_statement.rule_action_overrides[0].action_to_use.block.custom_response.response_code #=> Integer
@@ -7947,6 +8197,38 @@ module Aws::WAFV2
7947
8197
  # aws_managed_rules_bot_control_rule_set: {
7948
8198
  # inspection_level: "COMMON", # required, accepts COMMON, TARGETED
7949
8199
  # },
8200
+ # aws_managed_rules_atp_rule_set: {
8201
+ # login_path: "String", # required
8202
+ # request_inspection: {
8203
+ # payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
8204
+ # username_field: { # required
8205
+ # identifier: "FieldIdentifier", # required
8206
+ # },
8207
+ # password_field: { # required
8208
+ # identifier: "FieldIdentifier", # required
8209
+ # },
8210
+ # },
8211
+ # response_inspection: {
8212
+ # status_code: {
8213
+ # success_codes: [1], # required
8214
+ # failure_codes: [1], # required
8215
+ # },
8216
+ # header: {
8217
+ # name: "ResponseInspectionHeaderName", # required
8218
+ # success_values: ["SuccessValue"], # required
8219
+ # failure_values: ["FailureValue"], # required
8220
+ # },
8221
+ # body_contains: {
8222
+ # success_strings: ["SuccessValue"], # required
8223
+ # failure_strings: ["FailureValue"], # required
8224
+ # },
8225
+ # json: {
8226
+ # identifier: "FieldIdentifier", # required
8227
+ # success_values: ["SuccessValue"], # required
8228
+ # failure_values: ["FailureValue"], # required
8229
+ # },
8230
+ # },
8231
+ # },
7950
8232
  # },
7951
8233
  # ],
7952
8234
  # rule_action_overrides: [
@@ -8796,6 +9078,38 @@ module Aws::WAFV2
8796
9078
  # aws_managed_rules_bot_control_rule_set: {
8797
9079
  # inspection_level: "COMMON", # required, accepts COMMON, TARGETED
8798
9080
  # },
9081
+ # aws_managed_rules_atp_rule_set: {
9082
+ # login_path: "String", # required
9083
+ # request_inspection: {
9084
+ # payload_type: "JSON", # required, accepts JSON, FORM_ENCODED
9085
+ # username_field: { # required
9086
+ # identifier: "FieldIdentifier", # required
9087
+ # },
9088
+ # password_field: { # required
9089
+ # identifier: "FieldIdentifier", # required
9090
+ # },
9091
+ # },
9092
+ # response_inspection: {
9093
+ # status_code: {
9094
+ # success_codes: [1], # required
9095
+ # failure_codes: [1], # required
9096
+ # },
9097
+ # header: {
9098
+ # name: "ResponseInspectionHeaderName", # required
9099
+ # success_values: ["SuccessValue"], # required
9100
+ # failure_values: ["FailureValue"], # required
9101
+ # },
9102
+ # body_contains: {
9103
+ # success_strings: ["SuccessValue"], # required
9104
+ # failure_strings: ["FailureValue"], # required
9105
+ # },
9106
+ # json: {
9107
+ # identifier: "FieldIdentifier", # required
9108
+ # success_values: ["SuccessValue"], # required
9109
+ # failure_values: ["FailureValue"], # required
9110
+ # },
9111
+ # },
9112
+ # },
8799
9113
  # },
8800
9114
  # ],
8801
9115
  # rule_action_overrides: [
@@ -9062,7 +9376,7 @@ module Aws::WAFV2
9062
9376
  params: params,
9063
9377
  config: config)
9064
9378
  context[:gem_name] = 'aws-sdk-wafv2'
9065
- context[:gem_version] = '1.47.0'
9379
+ context[:gem_version] = '1.48.0'
9066
9380
  Seahorse::Client::Request.new(handlers, context)
9067
9381
  end
9068
9382
 
@@ -13,6 +13,7 @@ module Aws::WAFV2
13
13
 
14
14
  include Seahorse::Model
15
15
 
16
+ AWSManagedRulesATPRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesATPRuleSet')
16
17
  AWSManagedRulesBotControlRuleSet = Shapes::StructureShape.new(name: 'AWSManagedRulesBotControlRuleSet')
17
18
  Action = Shapes::StringShape.new(name: 'Action')
18
19
  ActionCondition = Shapes::StructureShape.new(name: 'ActionCondition')
@@ -91,7 +92,9 @@ module Aws::WAFV2
91
92
  ErrorReason = Shapes::StringShape.new(name: 'ErrorReason')
92
93
  ExcludedRule = Shapes::StructureShape.new(name: 'ExcludedRule')
93
94
  ExcludedRules = Shapes::ListShape.new(name: 'ExcludedRules')
95
+ FailureCode = Shapes::IntegerShape.new(name: 'FailureCode')
94
96
  FailureReason = Shapes::StringShape.new(name: 'FailureReason')
97
+ FailureValue = Shapes::StringShape.new(name: 'FailureValue')
95
98
  FallbackBehavior = Shapes::StringShape.new(name: 'FallbackBehavior')
96
99
  FieldIdentifier = Shapes::StringShape.new(name: 'FieldIdentifier')
97
100
  FieldToMatch = Shapes::StructureShape.new(name: 'FieldToMatch')
@@ -250,12 +253,27 @@ module Aws::WAFV2
250
253
  ReleaseNotes = Shapes::StringShape.new(name: 'ReleaseNotes')
251
254
  ReleaseSummaries = Shapes::ListShape.new(name: 'ReleaseSummaries')
252
255
  ReleaseSummary = Shapes::StructureShape.new(name: 'ReleaseSummary')
256
+ RequestInspection = Shapes::StructureShape.new(name: 'RequestInspection')
253
257
  ResourceArn = Shapes::StringShape.new(name: 'ResourceArn')
254
258
  ResourceArns = Shapes::ListShape.new(name: 'ResourceArns')
255
259
  ResourceType = Shapes::StringShape.new(name: 'ResourceType')
256
260
  ResponseCode = Shapes::IntegerShape.new(name: 'ResponseCode')
257
261
  ResponseContent = Shapes::StringShape.new(name: 'ResponseContent')
258
262
  ResponseContentType = Shapes::StringShape.new(name: 'ResponseContentType')
263
+ ResponseInspection = Shapes::StructureShape.new(name: 'ResponseInspection')
264
+ ResponseInspectionBodyContains = Shapes::StructureShape.new(name: 'ResponseInspectionBodyContains')
265
+ ResponseInspectionBodyContainsFailureStrings = Shapes::ListShape.new(name: 'ResponseInspectionBodyContainsFailureStrings')
266
+ ResponseInspectionBodyContainsSuccessStrings = Shapes::ListShape.new(name: 'ResponseInspectionBodyContainsSuccessStrings')
267
+ ResponseInspectionHeader = Shapes::StructureShape.new(name: 'ResponseInspectionHeader')
268
+ ResponseInspectionHeaderFailureValues = Shapes::ListShape.new(name: 'ResponseInspectionHeaderFailureValues')
269
+ ResponseInspectionHeaderName = Shapes::StringShape.new(name: 'ResponseInspectionHeaderName')
270
+ ResponseInspectionHeaderSuccessValues = Shapes::ListShape.new(name: 'ResponseInspectionHeaderSuccessValues')
271
+ ResponseInspectionJson = Shapes::StructureShape.new(name: 'ResponseInspectionJson')
272
+ ResponseInspectionJsonFailureValues = Shapes::ListShape.new(name: 'ResponseInspectionJsonFailureValues')
273
+ ResponseInspectionJsonSuccessValues = Shapes::ListShape.new(name: 'ResponseInspectionJsonSuccessValues')
274
+ ResponseInspectionStatusCode = Shapes::StructureShape.new(name: 'ResponseInspectionStatusCode')
275
+ ResponseInspectionStatusCodeFailureCodes = Shapes::ListShape.new(name: 'ResponseInspectionStatusCodeFailureCodes')
276
+ ResponseInspectionStatusCodeSuccessCodes = Shapes::ListShape.new(name: 'ResponseInspectionStatusCodeSuccessCodes')
259
277
  ResponseStatusCode = Shapes::IntegerShape.new(name: 'ResponseStatusCode')
260
278
  Rule = Shapes::StructureShape.new(name: 'Rule')
261
279
  RuleAction = Shapes::StructureShape.new(name: 'RuleAction')
@@ -284,6 +302,9 @@ module Aws::WAFV2
284
302
  SqliMatchStatement = Shapes::StructureShape.new(name: 'SqliMatchStatement')
285
303
  Statement = Shapes::StructureShape.new(name: 'Statement')
286
304
  Statements = Shapes::ListShape.new(name: 'Statements')
305
+ String = Shapes::StringShape.new(name: 'String')
306
+ SuccessCode = Shapes::IntegerShape.new(name: 'SuccessCode')
307
+ SuccessValue = Shapes::StringShape.new(name: 'SuccessValue')
287
308
  Tag = Shapes::StructureShape.new(name: 'Tag')
288
309
  TagInfoForResource = Shapes::StructureShape.new(name: 'TagInfoForResource')
289
310
  TagKey = Shapes::StringShape.new(name: 'TagKey')
@@ -345,6 +366,11 @@ module Aws::WAFV2
345
366
  WebACLSummary = Shapes::StructureShape.new(name: 'WebACLSummary')
346
367
  XssMatchStatement = Shapes::StructureShape.new(name: 'XssMatchStatement')
347
368
 
369
+ AWSManagedRulesATPRuleSet.add_member(:login_path, Shapes::ShapeRef.new(shape: String, required: true, location_name: "LoginPath"))
370
+ AWSManagedRulesATPRuleSet.add_member(:request_inspection, Shapes::ShapeRef.new(shape: RequestInspection, location_name: "RequestInspection"))
371
+ AWSManagedRulesATPRuleSet.add_member(:response_inspection, Shapes::ShapeRef.new(shape: ResponseInspection, location_name: "ResponseInspection"))
372
+ AWSManagedRulesATPRuleSet.struct_class = Types::AWSManagedRulesATPRuleSet
373
+
348
374
  AWSManagedRulesBotControlRuleSet.add_member(:inspection_level, Shapes::ShapeRef.new(shape: InspectionLevel, required: true, location_name: "InspectionLevel"))
349
375
  AWSManagedRulesBotControlRuleSet.struct_class = Types::AWSManagedRulesBotControlRuleSet
350
376
 
@@ -923,11 +949,12 @@ module Aws::WAFV2
923
949
  LoggingFilter.add_member(:default_behavior, Shapes::ShapeRef.new(shape: FilterBehavior, required: true, location_name: "DefaultBehavior"))
924
950
  LoggingFilter.struct_class = Types::LoggingFilter
925
951
 
926
- ManagedRuleGroupConfig.add_member(:login_path, Shapes::ShapeRef.new(shape: LoginPathString, location_name: "LoginPath"))
927
- ManagedRuleGroupConfig.add_member(:payload_type, Shapes::ShapeRef.new(shape: PayloadType, location_name: "PayloadType"))
928
- ManagedRuleGroupConfig.add_member(:username_field, Shapes::ShapeRef.new(shape: UsernameField, location_name: "UsernameField"))
929
- ManagedRuleGroupConfig.add_member(:password_field, Shapes::ShapeRef.new(shape: PasswordField, location_name: "PasswordField"))
952
+ ManagedRuleGroupConfig.add_member(:login_path, Shapes::ShapeRef.new(shape: LoginPathString, deprecated: true, location_name: "LoginPath", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet LoginPath"}))
953
+ ManagedRuleGroupConfig.add_member(:payload_type, Shapes::ShapeRef.new(shape: PayloadType, deprecated: true, location_name: "PayloadType", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet RequestInspection PayloadType"}))
954
+ ManagedRuleGroupConfig.add_member(:username_field, Shapes::ShapeRef.new(shape: UsernameField, deprecated: true, location_name: "UsernameField", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet RequestInspection UsernameField"}))
955
+ ManagedRuleGroupConfig.add_member(:password_field, Shapes::ShapeRef.new(shape: PasswordField, deprecated: true, location_name: "PasswordField", metadata: {"deprecatedMessage"=>"Deprecated. Use AWSManagedRulesATPRuleSet RequestInspection PasswordField"}))
930
956
  ManagedRuleGroupConfig.add_member(:aws_managed_rules_bot_control_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesBotControlRuleSet, location_name: "AWSManagedRulesBotControlRuleSet"))
957
+ ManagedRuleGroupConfig.add_member(:aws_managed_rules_atp_rule_set, Shapes::ShapeRef.new(shape: AWSManagedRulesATPRuleSet, location_name: "AWSManagedRulesATPRuleSet"))
931
958
  ManagedRuleGroupConfig.struct_class = Types::ManagedRuleGroupConfig
932
959
 
933
960
  ManagedRuleGroupConfigs.member = Shapes::ShapeRef.new(shape: ManagedRuleGroupConfig)
@@ -1082,8 +1109,53 @@ module Aws::WAFV2
1082
1109
  ReleaseSummary.add_member(:timestamp, Shapes::ShapeRef.new(shape: Timestamp, location_name: "Timestamp"))
1083
1110
  ReleaseSummary.struct_class = Types::ReleaseSummary
1084
1111
 
1112
+ RequestInspection.add_member(:payload_type, Shapes::ShapeRef.new(shape: PayloadType, required: true, location_name: "PayloadType"))
1113
+ RequestInspection.add_member(:username_field, Shapes::ShapeRef.new(shape: UsernameField, required: true, location_name: "UsernameField"))
1114
+ RequestInspection.add_member(:password_field, Shapes::ShapeRef.new(shape: PasswordField, required: true, location_name: "PasswordField"))
1115
+ RequestInspection.struct_class = Types::RequestInspection
1116
+
1085
1117
  ResourceArns.member = Shapes::ShapeRef.new(shape: ResourceArn)
1086
1118
 
1119
+ ResponseInspection.add_member(:status_code, Shapes::ShapeRef.new(shape: ResponseInspectionStatusCode, location_name: "StatusCode"))
1120
+ ResponseInspection.add_member(:header, Shapes::ShapeRef.new(shape: ResponseInspectionHeader, location_name: "Header"))
1121
+ ResponseInspection.add_member(:body_contains, Shapes::ShapeRef.new(shape: ResponseInspectionBodyContains, location_name: "BodyContains"))
1122
+ ResponseInspection.add_member(:json, Shapes::ShapeRef.new(shape: ResponseInspectionJson, location_name: "Json"))
1123
+ ResponseInspection.struct_class = Types::ResponseInspection
1124
+
1125
+ ResponseInspectionBodyContains.add_member(:success_strings, Shapes::ShapeRef.new(shape: ResponseInspectionBodyContainsSuccessStrings, required: true, location_name: "SuccessStrings"))
1126
+ ResponseInspectionBodyContains.add_member(:failure_strings, Shapes::ShapeRef.new(shape: ResponseInspectionBodyContainsFailureStrings, required: true, location_name: "FailureStrings"))
1127
+ ResponseInspectionBodyContains.struct_class = Types::ResponseInspectionBodyContains
1128
+
1129
+ ResponseInspectionBodyContainsFailureStrings.member = Shapes::ShapeRef.new(shape: FailureValue)
1130
+
1131
+ ResponseInspectionBodyContainsSuccessStrings.member = Shapes::ShapeRef.new(shape: SuccessValue)
1132
+
1133
+ ResponseInspectionHeader.add_member(:name, Shapes::ShapeRef.new(shape: ResponseInspectionHeaderName, required: true, location_name: "Name"))
1134
+ ResponseInspectionHeader.add_member(:success_values, Shapes::ShapeRef.new(shape: ResponseInspectionHeaderSuccessValues, required: true, location_name: "SuccessValues"))
1135
+ ResponseInspectionHeader.add_member(:failure_values, Shapes::ShapeRef.new(shape: ResponseInspectionHeaderFailureValues, required: true, location_name: "FailureValues"))
1136
+ ResponseInspectionHeader.struct_class = Types::ResponseInspectionHeader
1137
+
1138
+ ResponseInspectionHeaderFailureValues.member = Shapes::ShapeRef.new(shape: FailureValue)
1139
+
1140
+ ResponseInspectionHeaderSuccessValues.member = Shapes::ShapeRef.new(shape: SuccessValue)
1141
+
1142
+ ResponseInspectionJson.add_member(:identifier, Shapes::ShapeRef.new(shape: FieldIdentifier, required: true, location_name: "Identifier"))
1143
+ ResponseInspectionJson.add_member(:success_values, Shapes::ShapeRef.new(shape: ResponseInspectionJsonSuccessValues, required: true, location_name: "SuccessValues"))
1144
+ ResponseInspectionJson.add_member(:failure_values, Shapes::ShapeRef.new(shape: ResponseInspectionJsonFailureValues, required: true, location_name: "FailureValues"))
1145
+ ResponseInspectionJson.struct_class = Types::ResponseInspectionJson
1146
+
1147
+ ResponseInspectionJsonFailureValues.member = Shapes::ShapeRef.new(shape: FailureValue)
1148
+
1149
+ ResponseInspectionJsonSuccessValues.member = Shapes::ShapeRef.new(shape: SuccessValue)
1150
+
1151
+ ResponseInspectionStatusCode.add_member(:success_codes, Shapes::ShapeRef.new(shape: ResponseInspectionStatusCodeSuccessCodes, required: true, location_name: "SuccessCodes"))
1152
+ ResponseInspectionStatusCode.add_member(:failure_codes, Shapes::ShapeRef.new(shape: ResponseInspectionStatusCodeFailureCodes, required: true, location_name: "FailureCodes"))
1153
+ ResponseInspectionStatusCode.struct_class = Types::ResponseInspectionStatusCode
1154
+
1155
+ ResponseInspectionStatusCodeFailureCodes.member = Shapes::ShapeRef.new(shape: FailureCode)
1156
+
1157
+ ResponseInspectionStatusCodeSuccessCodes.member = Shapes::ShapeRef.new(shape: SuccessCode)
1158
+
1087
1159
  Rule.add_member(:name, Shapes::ShapeRef.new(shape: EntityName, required: true, location_name: "Name"))
1088
1160
  Rule.add_member(:priority, Shapes::ShapeRef.new(shape: RulePriority, required: true, location_name: "Priority"))
1089
1161
  Rule.add_member(:statement, Shapes::ShapeRef.new(shape: Statement, required: true, location_name: "Statement"))
@@ -50,9 +50,6 @@ module Aws::WAFV2
50
50
 
51
51
  def initialize(options = {})
52
52
  self[:region] = options[:region]
53
- if self[:region].nil?
54
- raise ArgumentError, "Missing required EndpointParameter: :region"
55
- end
56
53
  self[:use_dual_stack] = options[:use_dual_stack]
57
54
  self[:use_dual_stack] = false if self[:use_dual_stack].nil?
58
55
  if self[:use_dual_stack].nil?
@@ -14,36 +14,117 @@ module Aws::WAFV2
14
14
  use_dual_stack = parameters.use_dual_stack
15
15
  use_fips = parameters.use_fips
16
16
  endpoint = parameters.endpoint
17
- if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
18
- if Aws::Endpoints::Matchers.set?(endpoint)
17
+ if Aws::Endpoints::Matchers.set?(endpoint)
18
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
19
+ raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
20
+ end
21
+ if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
22
+ raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
23
+ end
24
+ return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
25
+ end
26
+ if Aws::Endpoints::Matchers.set?(region)
27
+ if (partition_result = Aws::Endpoints::Matchers.aws_partition(region))
28
+ if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
29
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
30
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
31
+ end
32
+ raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
33
+ end
19
34
  if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
20
- raise ArgumentError, "Invalid Configuration: FIPS and custom endpoint are not supported"
35
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
36
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
37
+ end
38
+ raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
21
39
  end
22
40
  if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
23
- raise ArgumentError, "Invalid Configuration: Dualstack and custom endpoint are not supported"
41
+ if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
42
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
43
+ end
44
+ raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
24
45
  end
25
- return Aws::Endpoints::Endpoint.new(url: endpoint, headers: {}, properties: {})
26
- end
27
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true) && Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
28
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS")) && Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
29
- return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
46
+ if Aws::Endpoints::Matchers.string_equals?(region, "af-south-1")
47
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.af-south-1.amazonaws.com", headers: {}, properties: {})
30
48
  end
31
- raise ArgumentError, "FIPS and DualStack are enabled, but this partition does not support one or both"
32
- end
33
- if Aws::Endpoints::Matchers.boolean_equals?(use_fips, true)
34
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsFIPS"))
35
- return Aws::Endpoints::Endpoint.new(url: "https://wafv2-fips.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
49
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-east-1")
50
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-east-1.amazonaws.com", headers: {}, properties: {})
36
51
  end
37
- raise ArgumentError, "FIPS is enabled but this partition does not support FIPS"
38
- end
39
- if Aws::Endpoints::Matchers.boolean_equals?(use_dual_stack, true)
40
- if Aws::Endpoints::Matchers.boolean_equals?(true, Aws::Endpoints::Matchers.attr(partition_result, "supportsDualStack"))
41
- return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dualStackDnsSuffix']}", headers: {}, properties: {})
52
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-1")
53
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-northeast-1.amazonaws.com", headers: {}, properties: {})
54
+ end
55
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-2")
56
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-northeast-2.amazonaws.com", headers: {}, properties: {})
57
+ end
58
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-3")
59
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-northeast-3.amazonaws.com", headers: {}, properties: {})
60
+ end
61
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-south-1")
62
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-south-1.amazonaws.com", headers: {}, properties: {})
63
+ end
64
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-1")
65
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-southeast-1.amazonaws.com", headers: {}, properties: {})
66
+ end
67
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-2")
68
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-southeast-2.amazonaws.com", headers: {}, properties: {})
69
+ end
70
+ if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-3")
71
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ap-southeast-3.amazonaws.com", headers: {}, properties: {})
72
+ end
73
+ if Aws::Endpoints::Matchers.string_equals?(region, "ca-central-1")
74
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.ca-central-1.amazonaws.com", headers: {}, properties: {})
75
+ end
76
+ if Aws::Endpoints::Matchers.string_equals?(region, "eu-central-1")
77
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-central-1.amazonaws.com", headers: {}, properties: {})
78
+ end
79
+ if Aws::Endpoints::Matchers.string_equals?(region, "eu-north-1")
80
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-north-1.amazonaws.com", headers: {}, properties: {})
81
+ end
82
+ if Aws::Endpoints::Matchers.string_equals?(region, "eu-south-1")
83
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-south-1.amazonaws.com", headers: {}, properties: {})
84
+ end
85
+ if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-1")
86
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-west-1.amazonaws.com", headers: {}, properties: {})
87
+ end
88
+ if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-2")
89
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-west-2.amazonaws.com", headers: {}, properties: {})
90
+ end
91
+ if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-3")
92
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.eu-west-3.amazonaws.com", headers: {}, properties: {})
93
+ end
94
+ if Aws::Endpoints::Matchers.string_equals?(region, "me-south-1")
95
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.me-south-1.amazonaws.com", headers: {}, properties: {})
96
+ end
97
+ if Aws::Endpoints::Matchers.string_equals?(region, "sa-east-1")
98
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.sa-east-1.amazonaws.com", headers: {}, properties: {})
99
+ end
100
+ if Aws::Endpoints::Matchers.string_equals?(region, "us-east-1")
101
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-east-1.amazonaws.com", headers: {}, properties: {})
102
+ end
103
+ if Aws::Endpoints::Matchers.string_equals?(region, "us-east-2")
104
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-east-2.amazonaws.com", headers: {}, properties: {})
105
+ end
106
+ if Aws::Endpoints::Matchers.string_equals?(region, "us-west-1")
107
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-west-1.amazonaws.com", headers: {}, properties: {})
108
+ end
109
+ if Aws::Endpoints::Matchers.string_equals?(region, "us-west-2")
110
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-west-2.amazonaws.com", headers: {}, properties: {})
111
+ end
112
+ if Aws::Endpoints::Matchers.string_equals?(region, "cn-north-1")
113
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.cn-north-1.amazonaws.com.cn", headers: {}, properties: {})
114
+ end
115
+ if Aws::Endpoints::Matchers.string_equals?(region, "cn-northwest-1")
116
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.cn-northwest-1.amazonaws.com.cn", headers: {}, properties: {})
117
+ end
118
+ if Aws::Endpoints::Matchers.string_equals?(region, "us-gov-east-1")
119
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-gov-east-1.amazonaws.com", headers: {}, properties: {})
120
+ end
121
+ if Aws::Endpoints::Matchers.string_equals?(region, "us-gov-west-1")
122
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.us-gov-west-1.amazonaws.com", headers: {}, properties: {})
42
123
  end
43
- raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
124
+ return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
44
125
  end
45
- return Aws::Endpoints::Endpoint.new(url: "https://wafv2.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
46
126
  end
127
+ raise ArgumentError, "Invalid Configuration: Missing Region"
47
128
  raise ArgumentError, 'No endpoint could be resolved'
48
129
 
49
130
  end
@@ -10,7 +10,53 @@
10
10
  module Aws::WAFV2
11
11
  module Types
12
12
 
13
- # Details for your use of the Bot Control managed rule group, used in
13
+ # Details for your use of the account takeover prevention managed rule
14
+ # group, `AWSManagedRulesATPRuleSet`. This configuration is used in
15
+ # `ManagedRuleGroupConfig`.
16
+ #
17
+ # @!attribute [rw] login_path
18
+ # The path of the login endpoint for your application. For example,
19
+ # for the URL `https://example.com/web/login`, you would provide the
20
+ # path `/web/login`.
21
+ #
22
+ # The rule group inspects only HTTP `POST` requests to your specified
23
+ # login endpoint.
24
+ # @return [String]
25
+ #
26
+ # @!attribute [rw] request_inspection
27
+ # The criteria for inspecting login requests, used by the ATP rule
28
+ # group to validate credentials usage.
29
+ # @return [Types::RequestInspection]
30
+ #
31
+ # @!attribute [rw] response_inspection
32
+ # The criteria for inspecting responses to login requests, used by the
33
+ # ATP rule group to track login failure rates.
34
+ #
35
+ # The ATP rule group evaluates the responses that your protected
36
+ # resources send back to client login attempts, keeping count of
37
+ # successful and failed attempts from each IP address and client
38
+ # session. Using this information, the rule group labels and mitigates
39
+ # requests from client sessions and IP addresses that submit too many
40
+ # failed login attempts in a short amount of time.
41
+ #
42
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect
43
+ # Amazon CloudFront distributions.
44
+ #
45
+ # </note>
46
+ # @return [Types::ResponseInspection]
47
+ #
48
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/AWSManagedRulesATPRuleSet AWS API Documentation
49
+ #
50
+ class AWSManagedRulesATPRuleSet < Struct.new(
51
+ :login_path,
52
+ :request_inspection,
53
+ :response_inspection)
54
+ SENSITIVE = []
55
+ include Aws::Structure
56
+ end
57
+
58
+ # Details for your use of the Bot Control managed rule group,
59
+ # `AWSManagedRulesBotControlRuleSet`. This configuration is used in
14
60
  # `ManagedRuleGroupConfig`.
15
61
  #
16
62
  # @!attribute [rw] inspection_level
@@ -239,7 +285,7 @@ module Aws::WAFV2
239
285
  # @!attribute [rw] search_string
240
286
  # A string value that you want WAF to search for. WAF searches only in
241
287
  # the part of web requests that you designate for inspection in
242
- # FieldToMatch. The maximum length of the value is 50 bytes.
288
+ # FieldToMatch. The maximum length of the value is 200 bytes.
243
289
  #
244
290
  # Valid values depend on the component that you specify for inspection
245
291
  # in `FieldToMatch`\:
@@ -256,7 +302,7 @@ module Aws::WAFV2
256
302
  # **If you're using the WAF API**
257
303
  #
258
304
  # Specify a base64-encoded version of the value. The maximum length of
259
- # the value before you base64-encode it is 50 bytes.
305
+ # the value before you base64-encode it is 200 bytes.
260
306
  #
261
307
  # For example, suppose the value of `Type` is `HEADER` and the value
262
308
  # of `Data` is `User-Agent`. If you want to search the `User-Agent`
@@ -4209,6 +4255,11 @@ module Aws::WAFV2
4209
4255
  # Additional information that's used by a managed rule group. Many
4210
4256
  # managed rule groups don't require this.
4211
4257
  #
4258
+ # Use the `AWSManagedRulesATPRuleSet` configuration object for the
4259
+ # account takeover prevention managed rule group, to provide information
4260
+ # such as the sign-in page of your application and the type of content
4261
+ # to accept or reject from the client.
4262
+ #
4212
4263
  # Use the `AWSManagedRulesBotControlRuleSet` configuration object to
4213
4264
  # configure the protection level that you want the Bot Control rule
4214
4265
  # group to use.
@@ -4216,22 +4267,31 @@ module Aws::WAFV2
4216
4267
  # For example specifications, see the examples section of CreateWebACL.
4217
4268
  #
4218
4269
  # @!attribute [rw] login_path
4219
- # The path of the login endpoint for your application. For example,
4220
- # for the URL `https://example.com/web/login`, you would provide the
4221
- # path `/web/login`.
4270
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4271
+ # `AWSManagedRulesATPRuleSet`.
4272
+ #
4273
+ # </note>
4222
4274
  # @return [String]
4223
4275
  #
4224
4276
  # @!attribute [rw] payload_type
4225
- # The payload type for your login endpoint, either JSON or form
4226
- # encoded.
4277
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4278
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4279
+ #
4280
+ # </note>
4227
4281
  # @return [String]
4228
4282
  #
4229
4283
  # @!attribute [rw] username_field
4230
- # Details about your login page username field.
4284
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4285
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4286
+ #
4287
+ # </note>
4231
4288
  # @return [Types::UsernameField]
4232
4289
  #
4233
4290
  # @!attribute [rw] password_field
4234
- # Details about your login page password field.
4291
+ # <note markdown="1"> Instead of this setting, provide your configuration under
4292
+ # `AWSManagedRulesATPRuleSet` `RequestInspection`.
4293
+ #
4294
+ # </note>
4235
4295
  # @return [Types::PasswordField]
4236
4296
  #
4237
4297
  # @!attribute [rw] aws_managed_rules_bot_control_rule_set
@@ -4247,6 +4307,27 @@ module Aws::WAFV2
4247
4307
  # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html
4248
4308
  # @return [Types::AWSManagedRulesBotControlRuleSet]
4249
4309
  #
4310
+ # @!attribute [rw] aws_managed_rules_atp_rule_set
4311
+ # Additional configuration for using the account takeover prevention
4312
+ # (ATP) managed rule group, `AWSManagedRulesATPRuleSet`. Use this to
4313
+ # provide login request information to the rule group. For web ACLs
4314
+ # that protect CloudFront distributions, use this to also provide the
4315
+ # information about how your distribution responds to login requests.
4316
+ # This configuration replaces the individual configuration fields in
4317
+ # `ManagedRuleGroupConfig` and provides additional feature
4318
+ # configuration.
4319
+ #
4320
+ # For information about using the ATP managed rule group, see [WAF
4321
+ # Fraud Control account takeover prevention (ATP) rule group][1] and
4322
+ # [WAF Fraud Control account takeover prevention (ATP)][2] in the *WAF
4323
+ # Developer Guide*.
4324
+ #
4325
+ #
4326
+ #
4327
+ # [1]: https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-atp.html
4328
+ # [2]: https://docs.aws.amazon.com/waf/latest/developerguide/waf-atp.html
4329
+ # @return [Types::AWSManagedRulesATPRuleSet]
4330
+ #
4250
4331
  # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ManagedRuleGroupConfig AWS API Documentation
4251
4332
  #
4252
4333
  class ManagedRuleGroupConfig < Struct.new(
@@ -4254,7 +4335,8 @@ module Aws::WAFV2
4254
4335
  :payload_type,
4255
4336
  :username_field,
4256
4337
  :password_field,
4257
- :aws_managed_rules_bot_control_rule_set)
4338
+ :aws_managed_rules_bot_control_rule_set,
4339
+ :aws_managed_rules_atp_rule_set)
4258
4340
  SENSITIVE = []
4259
4341
  include Aws::Structure
4260
4342
  end
@@ -4320,6 +4402,11 @@ module Aws::WAFV2
4320
4402
  # Additional information that's used by a managed rule group. Many
4321
4403
  # managed rule groups don't require this.
4322
4404
  #
4405
+ # Use the `AWSManagedRulesATPRuleSet` configuration object for the
4406
+ # account takeover prevention managed rule group, to provide
4407
+ # information such as the sign-in page of your application and the
4408
+ # type of content to accept or reject from the client.
4409
+ #
4323
4410
  # Use the `AWSManagedRulesBotControlRuleSet` configuration object to
4324
4411
  # configure the protection level that you want the Bot Control rule
4325
4412
  # group to use.
@@ -4785,8 +4872,9 @@ module Aws::WAFV2
4785
4872
  include Aws::Structure
4786
4873
  end
4787
4874
 
4788
- # Details about your login page password field, used in a
4789
- # `ManagedRuleGroupConfig`.
4875
+ # Details about your login page password field for request inspection,
4876
+ # used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
4877
+ # configuration.
4790
4878
  #
4791
4879
  # @!attribute [rw] identifier
4792
4880
  # The name of the password field. For example `/form/password`.
@@ -4990,7 +5078,7 @@ module Aws::WAFV2
4990
5078
  # rate-based rule with a nested AND rule statement that contains the
4991
5079
  # following nested statements:
4992
5080
  #
4993
- # * An IP match statement with an IP set that specified the address
5081
+ # * An IP match statement with an IP set that specifies the address
4994
5082
  # 192.0.2.44.
4995
5083
  #
4996
5084
  # * A string match statement that searches in the User-Agent header for
@@ -5272,6 +5360,272 @@ module Aws::WAFV2
5272
5360
  include Aws::Structure
5273
5361
  end
5274
5362
 
5363
+ # The criteria for inspecting login requests, used by the ATP rule group
5364
+ # to validate credentials usage.
5365
+ #
5366
+ # This is part of the `AWSManagedRulesATPRuleSet` configuration in
5367
+ # `ManagedRuleGroupConfig`.
5368
+ #
5369
+ # In these settings, you specify how your application accepts login
5370
+ # attempts by providing the request payload type and the names of the
5371
+ # fields within the request body where the username and password are
5372
+ # provided.
5373
+ #
5374
+ # @!attribute [rw] payload_type
5375
+ # The payload type for your login endpoint, either JSON or form
5376
+ # encoded.
5377
+ # @return [String]
5378
+ #
5379
+ # @!attribute [rw] username_field
5380
+ # Details about your login page username field.
5381
+ #
5382
+ # How you specify this depends on the payload type.
5383
+ #
5384
+ # * For JSON payloads, specify the field name in JSON pointer syntax.
5385
+ # For information about the JSON Pointer syntax, see the Internet
5386
+ # Engineering Task Force (IETF) documentation [JavaScript Object
5387
+ # Notation (JSON) Pointer][1].
5388
+ #
5389
+ # For example, for the JSON payload `\{ "login": \{ "username":
5390
+ # "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
5391
+ # field specification is `/login/username` and the password field
5392
+ # specification is `/login/password`.
5393
+ #
5394
+ # * For form encoded payload types, use the HTML form names.
5395
+ #
5396
+ # For example, for an HTML form with input elements named
5397
+ # `username1` and `password1`, the username field specification is
5398
+ # `username1` and the password field specification is `password1`.
5399
+ #
5400
+ #
5401
+ #
5402
+ # [1]: https://tools.ietf.org/html/rfc6901
5403
+ # @return [Types::UsernameField]
5404
+ #
5405
+ # @!attribute [rw] password_field
5406
+ # Details about your login page password field.
5407
+ #
5408
+ # How you specify this depends on the payload type.
5409
+ #
5410
+ # * For JSON payloads, specify the field name in JSON pointer syntax.
5411
+ # For information about the JSON Pointer syntax, see the Internet
5412
+ # Engineering Task Force (IETF) documentation [JavaScript Object
5413
+ # Notation (JSON) Pointer][1].
5414
+ #
5415
+ # For example, for the JSON payload `\{ "login": \{ "username":
5416
+ # "THE_USERNAME", "password": "THE_PASSWORD" \} \}`, the username
5417
+ # field specification is `/login/username` and the password field
5418
+ # specification is `/login/password`.
5419
+ #
5420
+ # * For form encoded payload types, use the HTML form names.
5421
+ #
5422
+ # For example, for an HTML form with input elements named
5423
+ # `username1` and `password1`, the username field specification is
5424
+ # `username1` and the password field specification is `password1`.
5425
+ #
5426
+ #
5427
+ #
5428
+ # [1]: https://tools.ietf.org/html/rfc6901
5429
+ # @return [Types::PasswordField]
5430
+ #
5431
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/RequestInspection AWS API Documentation
5432
+ #
5433
+ class RequestInspection < Struct.new(
5434
+ :payload_type,
5435
+ :username_field,
5436
+ :password_field)
5437
+ SENSITIVE = []
5438
+ include Aws::Structure
5439
+ end
5440
+
5441
+ # The criteria for inspecting responses to login requests, used by the
5442
+ # ATP rule group to track login failure rates.
5443
+ #
5444
+ # The ATP rule group evaluates the responses that your protected
5445
+ # resources send back to client login attempts, keeping count of
5446
+ # successful and failed attempts from each IP address and client
5447
+ # session. Using this information, the rule group labels and mitigates
5448
+ # requests from client sessions and IP addresses that submit too many
5449
+ # failed login attempts in a short amount of time.
5450
+ #
5451
+ # <note markdown="1"> Response inspection is available only in web ACLs that protect Amazon
5452
+ # CloudFront distributions.
5453
+ #
5454
+ # </note>
5455
+ #
5456
+ # This is part of the `AWSManagedRulesATPRuleSet` configuration in
5457
+ # `ManagedRuleGroupConfig`.
5458
+ #
5459
+ # Enable login response inspection by configuring exactly one component
5460
+ # of the response to inspect. You can't configure more than one. If you
5461
+ # don't configure any of the response inspection options, response
5462
+ # inspection is disabled.
5463
+ #
5464
+ # @!attribute [rw] status_code
5465
+ # Configures inspection of the response status code.
5466
+ # @return [Types::ResponseInspectionStatusCode]
5467
+ #
5468
+ # @!attribute [rw] header
5469
+ # Configures inspection of the response header.
5470
+ # @return [Types::ResponseInspectionHeader]
5471
+ #
5472
+ # @!attribute [rw] body_contains
5473
+ # Configures inspection of the response body.
5474
+ # @return [Types::ResponseInspectionBodyContains]
5475
+ #
5476
+ # @!attribute [rw] json
5477
+ # Configures inspection of the response JSON.
5478
+ # @return [Types::ResponseInspectionJson]
5479
+ #
5480
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspection AWS API Documentation
5481
+ #
5482
+ class ResponseInspection < Struct.new(
5483
+ :status_code,
5484
+ :header,
5485
+ :body_contains,
5486
+ :json)
5487
+ SENSITIVE = []
5488
+ include Aws::Structure
5489
+ end
5490
+
5491
+ # Configures inspection of the response body. This is part of the
5492
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5493
+ #
5494
+ # @!attribute [rw] success_strings
5495
+ # Strings in the body of the response that indicate a successful login
5496
+ # attempt. To be counted as a successful login, the string can be
5497
+ # anywhere in the body and must be an exact match, including case.
5498
+ # Each string must be unique among the success and failure strings.
5499
+ #
5500
+ # JSON example: `"SuccessStrings": [ "Login successful", "Welcome to
5501
+ # our site!" ]`
5502
+ # @return [Array<String>]
5503
+ #
5504
+ # @!attribute [rw] failure_strings
5505
+ # Strings in the body of the response that indicate a failed login
5506
+ # attempt. To be counted as a failed login, the string can be anywhere
5507
+ # in the body and must be an exact match, including case. Each string
5508
+ # must be unique among the success and failure strings.
5509
+ #
5510
+ # JSON example: `"FailureStrings": [ "Login failed" ]`
5511
+ # @return [Array<String>]
5512
+ #
5513
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionBodyContains AWS API Documentation
5514
+ #
5515
+ class ResponseInspectionBodyContains < Struct.new(
5516
+ :success_strings,
5517
+ :failure_strings)
5518
+ SENSITIVE = []
5519
+ include Aws::Structure
5520
+ end
5521
+
5522
+ # Configures inspection of the response header. This is part of the
5523
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5524
+ #
5525
+ # @!attribute [rw] name
5526
+ # The name of the header to match against. The name must be an exact
5527
+ # match, including case.
5528
+ #
5529
+ # JSON example: `"Name": [ "LoginResult" ]`
5530
+ # @return [String]
5531
+ #
5532
+ # @!attribute [rw] success_values
5533
+ # Values in the response header with the specified name that indicate
5534
+ # a successful login attempt. To be counted as a successful login, the
5535
+ # value must be an exact match, including case. Each value must be
5536
+ # unique among the success and failure values.
5537
+ #
5538
+ # JSON example: `"SuccessValues": [ "LoginPassed", "Successful login"
5539
+ # ]`
5540
+ # @return [Array<String>]
5541
+ #
5542
+ # @!attribute [rw] failure_values
5543
+ # Values in the response header with the specified name that indicate
5544
+ # a failed login attempt. To be counted as a failed login, the value
5545
+ # must be an exact match, including case. Each value must be unique
5546
+ # among the success and failure values.
5547
+ #
5548
+ # JSON example: `"FailureValues": [ "LoginFailed", "Failed login" ]`
5549
+ # @return [Array<String>]
5550
+ #
5551
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionHeader AWS API Documentation
5552
+ #
5553
+ class ResponseInspectionHeader < Struct.new(
5554
+ :name,
5555
+ :success_values,
5556
+ :failure_values)
5557
+ SENSITIVE = []
5558
+ include Aws::Structure
5559
+ end
5560
+
5561
+ # Configures inspection of the response JSON. This is part of the
5562
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5563
+ #
5564
+ # @!attribute [rw] identifier
5565
+ # The identifier for the value to match against in the JSON. The
5566
+ # identifier must be an exact match, including case.
5567
+ #
5568
+ # JSON example: `"Identifier": [ "/login/success" ]`
5569
+ # @return [String]
5570
+ #
5571
+ # @!attribute [rw] success_values
5572
+ # Values for the specified identifier in the response JSON that
5573
+ # indicate a successful login attempt. To be counted as a successful
5574
+ # login, the value must be an exact match, including case. Each value
5575
+ # must be unique among the success and failure values.
5576
+ #
5577
+ # JSON example: `"SuccessValues": [ "True", "Succeeded" ]`
5578
+ # @return [Array<String>]
5579
+ #
5580
+ # @!attribute [rw] failure_values
5581
+ # Values for the specified identifier in the response JSON that
5582
+ # indicate a failed login attempt. To be counted as a failed login,
5583
+ # the value must be an exact match, including case. Each value must be
5584
+ # unique among the success and failure values.
5585
+ #
5586
+ # JSON example: `"FailureValues": [ "False", "Failed" ]`
5587
+ # @return [Array<String>]
5588
+ #
5589
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionJson AWS API Documentation
5590
+ #
5591
+ class ResponseInspectionJson < Struct.new(
5592
+ :identifier,
5593
+ :success_values,
5594
+ :failure_values)
5595
+ SENSITIVE = []
5596
+ include Aws::Structure
5597
+ end
5598
+
5599
+ # Configures inspection of the response status code. This is part of the
5600
+ # `ResponseInspection` configuration for `AWSManagedRulesATPRuleSet`.
5601
+ #
5602
+ # @!attribute [rw] success_codes
5603
+ # Status codes in the response that indicate a successful login
5604
+ # attempt. To be counted as a successful login, the response status
5605
+ # code must match one of these. Each code must be unique among the
5606
+ # success and failure status codes.
5607
+ #
5608
+ # JSON example: `"SuccessCodes": [ 200, 201 ]`
5609
+ # @return [Array<Integer>]
5610
+ #
5611
+ # @!attribute [rw] failure_codes
5612
+ # Status codes in the response that indicate a failed login attempt.
5613
+ # To be counted as a failed login, the response status code must match
5614
+ # one of these. Each code must be unique among the success and failure
5615
+ # status codes.
5616
+ #
5617
+ # JSON example: `"FailureCodes": [ 400, 404 ]`
5618
+ # @return [Array<Integer>]
5619
+ #
5620
+ # @see http://docs.aws.amazon.com/goto/WebAPI/wafv2-2019-07-29/ResponseInspectionStatusCode AWS API Documentation
5621
+ #
5622
+ class ResponseInspectionStatusCode < Struct.new(
5623
+ :success_codes,
5624
+ :failure_codes)
5625
+ SENSITIVE = []
5626
+ include Aws::Structure
5627
+ end
5628
+
5275
5629
  # A single rule, which you can use in a WebACL or RuleGroup to identify
5276
5630
  # web requests that you want to allow, block, or count. Each rule
5277
5631
  # includes one top-level Statement that WAF uses to identify matching
@@ -6070,7 +6424,7 @@ module Aws::WAFV2
6070
6424
  # create a rate-based rule with a nested AND rule statement that
6071
6425
  # contains the following nested statements:
6072
6426
  #
6073
- # * An IP match statement with an IP set that specified the address
6427
+ # * An IP match statement with an IP set that specifies the address
6074
6428
  # 192.0.2.44.
6075
6429
  #
6076
6430
  # * A string match statement that searches in the User-Agent header
@@ -7016,8 +7370,9 @@ module Aws::WAFV2
7016
7370
  #
7017
7371
  class UriPath < Aws::EmptyStructure; end
7018
7372
 
7019
- # Details about your login page username field, used in a
7020
- # `ManagedRuleGroupConfig`.
7373
+ # Details about your login page username field for request inspection,
7374
+ # used in the `AWSManagedRulesATPRuleSet` `RequestInspection`
7375
+ # configuration.
7021
7376
  #
7022
7377
  # @!attribute [rw] identifier
7023
7378
  # The name of the username field. For example `/form/username`.
data/lib/aws-sdk-wafv2.rb CHANGED
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-wafv2/customizations'
52
52
  # @!group service
53
53
  module Aws::WAFV2
54
54
 
55
- GEM_VERSION = '1.47.0'
55
+ GEM_VERSION = '1.48.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-wafv2
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.47.0
4
+ version: 1.48.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-01-18 00:00:00.000000000 Z
11
+ date: 2023-02-15 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core