@aws-sdk/client-wafv2 3.197.0 → 3.199.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -4,6 +4,7 @@ export declare enum ActionValue {
4
4
  ALLOW = "ALLOW",
5
5
  BLOCK = "BLOCK",
6
6
  CAPTCHA = "CAPTCHA",
7
+ CHALLENGE = "CHALLENGE",
7
8
  COUNT = "COUNT",
8
9
  EXCLUDED_AS_COUNT = "EXCLUDED_AS_COUNT"
9
10
  }
@@ -12,8 +13,10 @@ export declare enum ActionValue {
12
13
  */
13
14
  export interface ActionCondition {
14
15
  /**
15
- * <p>The action setting that a log record must contain in order to meet the condition.
16
- * </p>
16
+ * <p>The action setting that a log record must contain in order to meet the condition. This is the action that WAF applied to the web request. </p>
17
+ * <p>For rule groups, this is either the configured rule action setting, or if you've applied a rule action override to the rule, it's the override action.
18
+ * The value <code>EXCLUDED_AS_COUNT</code> matches on
19
+ * excluded rules and also on rules that have a rule action override of Count. </p>
17
20
  */
18
21
  Action: ActionValue | string | undefined;
19
22
  }
@@ -45,7 +48,8 @@ export interface CustomHTTPHeader {
45
48
  }
46
49
  /**
47
50
  * <p>Custom request handling behavior that inserts custom headers into a web request. You can
48
- * add custom request handling for the rule actions allow and count. </p>
51
+ * add custom request handling for WAF to use when the rule action doesn't block the request.
52
+ * For example, <code>CaptchaAction</code> for requests with valid t okens, and <code>AllowAction</code>. </p>
49
53
  * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
50
54
  * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
51
55
  */
@@ -1290,10 +1294,10 @@ export interface LabelMatchStatement {
1290
1294
  Key: string | undefined;
1291
1295
  }
1292
1296
  /**
1293
- * <p>Specifies a single rule in a rule group whose action you want to override to
1294
- * <code>Count</code>. When you exclude a rule, WAF evaluates it exactly as it would if
1295
- * the rule action setting were <code>Count</code>. This is a useful option for testing the
1296
- * rules in a rule group without modifying how they handle your web traffic. </p>
1297
+ * <p>Specifies a single rule in a rule group whose action you want to override to <code>Count</code>. </p>
1298
+ * <note>
1299
+ * <p>Instead of this option, use <code>RuleActionOverrides</code>. It accepts any valid action setting, including <code>Count</code>.</p>
1300
+ * </note>
1297
1301
  */
1298
1302
  export interface ExcludedRule {
1299
1303
  /**
@@ -1301,6 +1305,21 @@ export interface ExcludedRule {
1301
1305
  */
1302
1306
  Name: string | undefined;
1303
1307
  }
1308
+ export declare enum InspectionLevel {
1309
+ COMMON = "COMMON",
1310
+ TARGETED = "TARGETED"
1311
+ }
1312
+ /**
1313
+ * <p>Details for your use of the Bot Control managed rule group, used in <code>ManagedRuleGroupConfig</code>. </p>
1314
+ */
1315
+ export interface AWSManagedRulesBotControlRuleSet {
1316
+ /**
1317
+ * <p>The inspection level to use for the Bot Control rule group. The common level is the least expensive. The
1318
+ * targeted level includes all common level rules and adds rules with more advanced inspection criteria. For
1319
+ * details, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-bot.html">WAF Bot Control rule group</a>.</p>
1320
+ */
1321
+ InspectionLevel: InspectionLevel | string | undefined;
1322
+ }
1304
1323
  /**
1305
1324
  * <p>Details about your login page password field, used in a
1306
1325
  * <code>ManagedRuleGroupConfig</code>. </p>
@@ -1326,10 +1345,9 @@ export interface UsernameField {
1326
1345
  Identifier: string | undefined;
1327
1346
  }
1328
1347
  /**
1329
- * <p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>
1330
- * <p>Use this for the account takeover prevention managed rule group
1331
- * <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>
1332
- * <p>You can provide multiple individual <code>ManagedRuleGroupConfig</code> objects for any rule group configuration, for example <code>UsernameField</code> and <code>PasswordField</code>. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: <code>LoginPath</code>, <code>PasswordField</code>, <code>PayloadType</code> and <code>UsernameField</code>.</p>
1348
+ * <p>Additional information that's used by a managed rule group. Many managed rule groups don't require this.</p>
1349
+ * <p>Use the <code>AWSManagedRulesBotControlRuleSet</code> configuration object to configure the
1350
+ * protection level that you want the Bot Control rule group to use. </p>
1333
1351
  * <p>For example specifications, see the examples section of <a>CreateWebACL</a>.</p>
1334
1352
  */
1335
1353
  export interface ManagedRuleGroupConfig {
@@ -1351,6 +1369,189 @@ export interface ManagedRuleGroupConfig {
1351
1369
  * <p>Details about your login page password field. </p>
1352
1370
  */
1353
1371
  PasswordField?: PasswordField;
1372
+ /**
1373
+ * <p>Additional configuration for using the Bot Control managed rule group. Use this to specify the
1374
+ * inspection level that you want to use. For information
1375
+ * about using the Bot Control managed rule group, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-bot.html">WAF Bot Control rule group</a>
1376
+ * and <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html">WAF Bot Control</a>
1377
+ * in the <i>WAF Developer Guide</i>.</p>
1378
+ */
1379
+ AWSManagedRulesBotControlRuleSet?: AWSManagedRulesBotControlRuleSet;
1380
+ }
1381
+ /**
1382
+ * <p>A custom response to send to the client. You can define a custom response for rule
1383
+ * actions and default web ACL actions that are set to <a>BlockAction</a>. </p>
1384
+ * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1385
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1386
+ */
1387
+ export interface CustomResponse {
1388
+ /**
1389
+ * <p>The HTTP status code to return to the client. </p>
1390
+ * <p>For a list of status codes that you can use in your custom responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/customizing-the-response-status-codes.html">Supported status codes for custom response</a> in the
1391
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1392
+ */
1393
+ ResponseCode: number | undefined;
1394
+ /**
1395
+ * <p>References the response body that you want WAF to return to the web request
1396
+ * client. You can define a custom response for a rule action or a default web ACL action that
1397
+ * is set to block. To do this, you first define the response body key and value in the
1398
+ * <code>CustomResponseBodies</code> setting for the <a>WebACL</a> or <a>RuleGroup</a> where you want to use it. Then, in the rule action or web ACL
1399
+ * default action <code>BlockAction</code> setting, you reference the response body using this
1400
+ * key. </p>
1401
+ */
1402
+ CustomResponseBodyKey?: string;
1403
+ /**
1404
+ * <p>The HTTP headers to use in the response. Duplicate header names are not allowed. </p>
1405
+ * <p>For information about the limits on count and size for custom request and response settings, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/limits.html">WAF quotas</a> in the
1406
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1407
+ */
1408
+ ResponseHeaders?: CustomHTTPHeader[];
1409
+ }
1410
+ /**
1411
+ * <p>Specifies that WAF should block the request and optionally defines additional
1412
+ * custom handling for the response to the web request.</p>
1413
+ * <p>This is used in the context of other settings, for example to specify values for <a>RuleAction</a> and web ACL <a>DefaultAction</a>. </p>
1414
+ */
1415
+ export interface BlockAction {
1416
+ /**
1417
+ * <p>Defines a custom response for the web request.</p>
1418
+ * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1419
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1420
+ */
1421
+ CustomResponse?: CustomResponse;
1422
+ }
1423
+ /**
1424
+ * <p>Specifies that WAF should run a <code>CAPTCHA</code> check against the request: </p>
1425
+ * <ul>
1426
+ * <li>
1427
+ * <p>If the request includes a valid, unexpired <code>CAPTCHA</code> token,
1428
+ * WAF applies any custom request handling and labels that you've configured and then allows the web request inspection to
1429
+ * proceed to the next rule, similar to a <code>CountAction</code>. </p>
1430
+ * </li>
1431
+ * <li>
1432
+ * <p>If the request doesn't include a valid, unexpired token, WAF
1433
+ * discontinues the web ACL evaluation of the request and blocks it from going to its intended destination.</p>
1434
+ * <p>WAF generates a response that it sends back to the client, which includes the following: </p>
1435
+ * <ul>
1436
+ * <li>
1437
+ * <p>The header <code>x-amzn-waf-action</code> with a value of <code>captcha</code>. </p>
1438
+ * </li>
1439
+ * <li>
1440
+ * <p>The HTTP status code <code>405 Method Not Allowed</code>. </p>
1441
+ * </li>
1442
+ * <li>
1443
+ * <p>If the request contains an <code>Accept</code> header with a value of <code>text/html</code>, the response includes a <code>CAPTCHA</code> JavaScript page interstitial. </p>
1444
+ * </li>
1445
+ * </ul>
1446
+ * </li>
1447
+ * </ul>
1448
+ * <p>You can configure the expiration time
1449
+ * in the <code>CaptchaConfig</code>
1450
+ * <code>ImmunityTimeProperty</code> setting at the rule and web ACL level. The rule setting overrides the web ACL setting. </p>
1451
+ * <p>This action option is available for rules. It isn't available for web ACL default actions. </p>
1452
+ */
1453
+ export interface CaptchaAction {
1454
+ /**
1455
+ * <p>Defines custom handling for the web request, used when the <code>CAPTCHA</code> inspection determines that the request's token is valid and unexpired.</p>
1456
+ * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1457
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1458
+ */
1459
+ CustomRequestHandling?: CustomRequestHandling;
1460
+ }
1461
+ /**
1462
+ * <p>Specifies that WAF should run a <code>Challenge</code> check against the request to verify that the request is coming from a legitimate client session: </p>
1463
+ * <ul>
1464
+ * <li>
1465
+ * <p>If the request includes a valid, unexpired challenge token,
1466
+ * WAF applies any custom request handling and labels that you've configured and then allows the web request inspection to
1467
+ * proceed to the next rule, similar to a <code>CountAction</code>. </p>
1468
+ * </li>
1469
+ * <li>
1470
+ * <p>If the request doesn't include a valid, unexpired challenge token, WAF
1471
+ * discontinues the web ACL evaluation of the request and blocks it from going to its intended destination.</p>
1472
+ * <p>WAF then generates a challenge response that it sends back to the client, which includes the following: </p>
1473
+ * <ul>
1474
+ * <li>
1475
+ * <p>The header <code>x-amzn-waf-action</code> with a value of <code>challenge</code>. </p>
1476
+ * </li>
1477
+ * <li>
1478
+ * <p>The HTTP status code <code>202 Request Accepted</code>. </p>
1479
+ * </li>
1480
+ * <li>
1481
+ * <p>If the request contains an <code>Accept</code> header with a value of <code>text/html</code>, the response includes a JavaScript page interstitial with a challenge script. </p>
1482
+ * </li>
1483
+ * </ul>
1484
+ * <p>Challenges run silent browser interrogations in the background, and don't generally affect the end user experience. </p>
1485
+ * <p>A challenge enforces token acquisition using an interstitial JavaScript challenge that inspects the client session for legitimate behavior. The challenge blocks bots or at least increases the cost of operating sophisticated bots. </p>
1486
+ * <p>After the client session successfully responds to
1487
+ * the challenge, it receives a new token from WAF, which the challenge script uses to resubmit the original request. </p>
1488
+ * </li>
1489
+ * </ul>
1490
+ * <p>You can configure the expiration time
1491
+ * in the <code>ChallengeConfig</code>
1492
+ * <code>ImmunityTimeProperty</code> setting at the rule and web ACL level. The rule setting overrides the web ACL setting. </p>
1493
+ * <p>This action option is available for rules. It isn't available for web ACL default actions. </p>
1494
+ */
1495
+ export interface ChallengeAction {
1496
+ /**
1497
+ * <p>Defines custom handling for the web request, used when the challenge inspection determines that the request's token is valid and unexpired.</p>
1498
+ * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1499
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1500
+ */
1501
+ CustomRequestHandling?: CustomRequestHandling;
1502
+ }
1503
+ /**
1504
+ * <p>Specifies that WAF should count the request. Optionally defines additional custom
1505
+ * handling for the request.</p>
1506
+ * <p>This is used in the context of other settings, for example to specify values for <a>RuleAction</a> and web ACL <a>DefaultAction</a>. </p>
1507
+ */
1508
+ export interface CountAction {
1509
+ /**
1510
+ * <p>Defines custom handling for the web request.</p>
1511
+ * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1512
+ * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1513
+ */
1514
+ CustomRequestHandling?: CustomRequestHandling;
1515
+ }
1516
+ /**
1517
+ * <p>The action that WAF should take on a web request when it matches a rule's
1518
+ * statement. Settings at the web ACL level can override the rule action setting. </p>
1519
+ */
1520
+ export interface RuleAction {
1521
+ /**
1522
+ * <p>Instructs WAF to block the web request.</p>
1523
+ */
1524
+ Block?: BlockAction;
1525
+ /**
1526
+ * <p>Instructs WAF to allow the web request.</p>
1527
+ */
1528
+ Allow?: AllowAction;
1529
+ /**
1530
+ * <p>Instructs WAF to count the web request and then continue evaluating the request using the remaining rules in the web ACL.</p>
1531
+ */
1532
+ Count?: CountAction;
1533
+ /**
1534
+ * <p>Instructs WAF to run a <code>CAPTCHA</code> check against the web request.</p>
1535
+ */
1536
+ Captcha?: CaptchaAction;
1537
+ /**
1538
+ * <p>Instructs WAF to run a <code>Challenge</code> check against the web request.</p>
1539
+ */
1540
+ Challenge?: ChallengeAction;
1541
+ }
1542
+ /**
1543
+ * <p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>
1544
+ * <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>
1545
+ */
1546
+ export interface RuleActionOverride {
1547
+ /**
1548
+ * <p>The name of the rule to override.</p>
1549
+ */
1550
+ Name: string | undefined;
1551
+ /**
1552
+ * <p>The override action to use, in place of the configured action of the rule in the rule group. </p>
1553
+ */
1554
+ ActionToUse: RuleAction | undefined;
1354
1555
  }
1355
1556
  export declare enum RateBasedStatementAggregateKeyType {
1356
1557
  FORWARDED_IP = "FORWARDED_IP",
@@ -1407,12 +1608,17 @@ export interface RuleGroupReferenceStatement {
1407
1608
  */
1408
1609
  ARN: string | undefined;
1409
1610
  /**
1410
- * <p>The rules in the referenced rule group whose actions are set to <code>Count</code>. When
1411
- * you exclude a rule, WAF evaluates it exactly as it would if the rule action setting were
1412
- * <code>Count</code>. This is a useful option for testing the rules in a rule group
1413
- * without modifying how they handle your web traffic.</p>
1611
+ * <p>Rules in the referenced rule group whose actions are set to <code>Count</code>. </p>
1612
+ * <note>
1613
+ * <p>Instead of this option, use <code>RuleActionOverrides</code>. It accepts any valid action setting, including <code>Count</code>.</p>
1614
+ * </note>
1414
1615
  */
1415
1616
  ExcludedRules?: ExcludedRule[];
1617
+ /**
1618
+ * <p>Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change. </p>
1619
+ * <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>
1620
+ */
1621
+ RuleActionOverrides?: RuleActionOverride[];
1416
1622
  }
1417
1623
  export declare enum ComparisonOperator {
1418
1624
  EQ = "EQ",
@@ -1564,6 +1770,7 @@ export declare enum ParameterExceptionField {
1564
1770
  ASSOCIABLE_RESOURCE = "ASSOCIABLE_RESOURCE",
1565
1771
  BODY_PARSING_FALLBACK_BEHAVIOR = "BODY_PARSING_FALLBACK_BEHAVIOR",
1566
1772
  BYTE_MATCH_STATEMENT = "BYTE_MATCH_STATEMENT",
1773
+ CHALLENGE_CONFIG = "CHALLENGE_CONFIG",
1567
1774
  CHANGE_PROPAGATION_STATUS = "CHANGE_PROPAGATION_STATUS",
1568
1775
  COOKIE_MATCH_PATTERN = "COOKIE_MATCH_PATTERN",
1569
1776
  CUSTOM_REQUEST_HANDLING = "CUSTOM_REQUEST_HANDLING",
@@ -1621,6 +1828,7 @@ export declare enum ParameterExceptionField {
1621
1828
  TAGS = "TAGS",
1622
1829
  TAG_KEYS = "TAG_KEYS",
1623
1830
  TEXT_TRANSFORMATION = "TEXT_TRANSFORMATION",
1831
+ TOKEN_DOMAIN = "TOKEN_DOMAIN",
1624
1832
  WEB_ACL = "WEB_ACL",
1625
1833
  XSS_MATCH_STATEMENT = "XSS_MATCH_STATEMENT"
1626
1834
  }
@@ -1697,128 +1905,14 @@ export declare class WAFUnavailableEntityException extends __BaseException {
1697
1905
  constructor(opts: __ExceptionOptionType<WAFUnavailableEntityException, __BaseException>);
1698
1906
  }
1699
1907
  /**
1700
- * <p>A custom response to send to the client. You can define a custom response for rule
1701
- * actions and default web ACL actions that are set to <a>BlockAction</a>. </p>
1702
- * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1703
- * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1704
- */
1705
- export interface CustomResponse {
1706
- /**
1707
- * <p>The HTTP status code to return to the client. </p>
1708
- * <p>For a list of status codes that you can use in your custom responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/customizing-the-response-status-codes.html">Supported status codes for custom response</a> in the
1709
- * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1710
- */
1711
- ResponseCode: number | undefined;
1712
- /**
1713
- * <p>References the response body that you want WAF to return to the web request
1714
- * client. You can define a custom response for a rule action or a default web ACL action that
1715
- * is set to block. To do this, you first define the response body key and value in the
1716
- * <code>CustomResponseBodies</code> setting for the <a>WebACL</a> or <a>RuleGroup</a> where you want to use it. Then, in the rule action or web ACL
1717
- * default action <code>BlockAction</code> setting, you reference the response body using this
1718
- * key. </p>
1719
- */
1720
- CustomResponseBodyKey?: string;
1721
- /**
1722
- * <p>The HTTP headers to use in the response. Duplicate header names are not allowed. </p>
1723
- * <p>For information about the limits on count and size for custom request and response settings, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/limits.html">WAF quotas</a> in the
1724
- * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1725
- */
1726
- ResponseHeaders?: CustomHTTPHeader[];
1727
- }
1728
- /**
1729
- * <p>Specifies that WAF should block the request and optionally defines additional
1730
- * custom handling for the response to the web request.</p>
1731
- * <p>This is used in the context of other settings, for example to specify values for <a>RuleAction</a> and web ACL <a>DefaultAction</a>. </p>
1732
- */
1733
- export interface BlockAction {
1734
- /**
1735
- * <p>Defines a custom response for the web request.</p>
1736
- * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1737
- * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1738
- */
1739
- CustomResponse?: CustomResponse;
1740
- }
1741
- /**
1742
- * <p>Specifies that WAF should run a <code>CAPTCHA</code> check against the request: </p>
1743
- * <ul>
1744
- * <li>
1745
- * <p>If the request includes a valid, unexpired <code>CAPTCHA</code> token,
1746
- * WAF allows the web request inspection to
1747
- * proceed to the next rule, similar to a <code>CountAction</code>. </p>
1748
- * </li>
1749
- * <li>
1750
- * <p>If the request doesn't include a valid, unexpired <code>CAPTCHA</code> token, WAF
1751
- * discontinues the web ACL evaluation of the request and blocks it from going to its intended destination.</p>
1752
- * <p>WAF generates a response that it sends back to the client, which includes the following: </p>
1753
- * <ul>
1754
- * <li>
1755
- * <p>The header <code>x-amzn-waf-action</code> with a value of <code>captcha</code>. </p>
1756
- * </li>
1757
- * <li>
1758
- * <p>The HTTP status code <code>405 Method Not Allowed</code>. </p>
1759
- * </li>
1760
- * <li>
1761
- * <p>If the request contains an <code>Accept</code> header with a value of <code>text/html</code>, the response includes a <code>CAPTCHA</code> challenge. </p>
1762
- * </li>
1763
- * </ul>
1764
- * </li>
1765
- * </ul>
1766
- * <p>You can configure the expiration time
1767
- * in the <code>CaptchaConfig</code>
1768
- * <code>ImmunityTimeProperty</code> setting at the rule and web ACL level. The rule setting overrides the web ACL setting. </p>
1769
- * <p>This action option is available for rules. It isn't available for web ACL default actions. </p>
1770
- */
1771
- export interface CaptchaAction {
1772
- /**
1773
- * <p>Defines custom handling for the web request.</p>
1774
- * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1775
- * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1776
- */
1777
- CustomRequestHandling?: CustomRequestHandling;
1778
- }
1779
- /**
1780
- * <p>Specifies that WAF should count the request. Optionally defines additional custom
1781
- * handling for the request.</p>
1782
- * <p>This is used in the context of other settings, for example to specify values for <a>RuleAction</a> and web ACL <a>DefaultAction</a>. </p>
1783
- */
1784
- export interface CountAction {
1785
- /**
1786
- * <p>Defines custom handling for the web request.</p>
1787
- * <p>For information about customizing web requests and responses, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-custom-request-response.html">Customizing web requests and responses in WAF</a> in the
1788
- * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-chapter.html">WAF Developer Guide</a>. </p>
1789
- */
1790
- CustomRequestHandling?: CustomRequestHandling;
1791
- }
1792
- /**
1793
- * <p>The action that WAF should take on a web request when it matches a rule's
1794
- * statement. Settings at the web ACL level can override the rule action setting. </p>
1795
- */
1796
- export interface RuleAction {
1797
- /**
1798
- * <p>Instructs WAF to block the web request.</p>
1799
- */
1800
- Block?: BlockAction;
1801
- /**
1802
- * <p>Instructs WAF to allow the web request.</p>
1803
- */
1804
- Allow?: AllowAction;
1805
- /**
1806
- * <p>Instructs WAF to count the web request and then continue evaluating the request using the remaining rules in the web ACL.</p>
1807
- */
1808
- Count?: CountAction;
1809
- /**
1810
- * <p>Instructs WAF to run a <code>CAPTCHA</code> check against the web request.</p>
1811
- */
1812
- Captcha?: CaptchaAction;
1813
- }
1814
- /**
1815
- * <p>Determines how long a <code>CAPTCHA</code> token remains valid after the client
1816
- * successfully solves a <code>CAPTCHA</code> puzzle. </p>
1908
+ * <p>Used for CAPTCHA and challenge token settings. Determines
1909
+ * how long a <code>CAPTCHA</code> or challenge timestamp remains valid after WAF updates it for a successful <code>CAPTCHA</code> or challenge response. </p>
1817
1910
  */
1818
1911
  export interface ImmunityTimeProperty {
1819
1912
  /**
1820
- * <p>The amount of time, in seconds, that a <code>CAPTCHA</code> token is valid. The default
1821
- * setting is 300.</p>
1913
+ * <p>The amount of time, in seconds, that a <code>CAPTCHA</code> or challenge timestamp is considered valid by WAF. The default
1914
+ * setting is 300. </p>
1915
+ * <p>For the Challenge action, the minimum setting is 300. </p>
1822
1916
  */
1823
1917
  ImmunityTime: number | undefined;
1824
1918
  }
@@ -1828,11 +1922,22 @@ export interface ImmunityTimeProperty {
1828
1922
  */
1829
1923
  export interface CaptchaConfig {
1830
1924
  /**
1831
- * <p>Determines how long a <code>CAPTCHA</code> token remains valid after the client
1925
+ * <p>Determines how long a <code>CAPTCHA</code> timestamp in the token remains valid after the client
1832
1926
  * successfully solves a <code>CAPTCHA</code> puzzle. </p>
1833
1927
  */
1834
1928
  ImmunityTimeProperty?: ImmunityTimeProperty;
1835
1929
  }
1930
+ /**
1931
+ * <p>Specifies how WAF should handle <code>Challenge</code> evaluations. This is
1932
+ * available at the web ACL level and in each rule. </p>
1933
+ */
1934
+ export interface ChallengeConfig {
1935
+ /**
1936
+ * <p>Determines how long a challenge timestamp in the token remains valid after the client
1937
+ * successfully responds to a challenge. </p>
1938
+ */
1939
+ ImmunityTimeProperty?: ImmunityTimeProperty;
1940
+ }
1836
1941
  /**
1837
1942
  * <p>Specifies that WAF should do nothing. This is used for the
1838
1943
  * <code>OverrideAction</code> setting on a <a>Rule</a> when the rule uses a
@@ -1848,7 +1953,7 @@ export interface NoneAction {
1848
1953
  * <p>You can only use this for rule statements that reference a rule group, like <code>RuleGroupReferenceStatement</code> and <code>ManagedRuleGroupStatement</code>. </p>
1849
1954
  * <note>
1850
1955
  * <p>This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count
1851
- * matches, do not use this and instead exclude those rules in your rule group reference statement settings. </p>
1956
+ * matches, do not use this and instead use the rule action override option, with <code>Count</code> action, in your rule group reference statement settings. </p>
1852
1957
  * </note>
1853
1958
  */
1854
1959
  export interface OverrideAction {
@@ -1856,7 +1961,7 @@ export interface OverrideAction {
1856
1961
  * <p>Override the rule group evaluation result to count only. </p>
1857
1962
  * <note>
1858
1963
  * <p>This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count
1859
- * matches, do not use this and instead exclude those rules in your rule group reference statement settings. </p>
1964
+ * matches, do not use this and instead use the rule action override option, with <code>Count</code> action, in your rule group reference statement settings. </p>
1860
1965
  * </note>
1861
1966
  */
1862
1967
  Count?: CountAction;
@@ -3069,7 +3174,7 @@ export interface GetMobileSdkReleaseRequest {
3069
3174
  }
3070
3175
  /**
3071
3176
  * <p>Information for a release of the mobile SDK, including release notes and tags.</p>
3072
- * <p>The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see
3177
+ * <p>The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see
3073
3178
  * <a href="https://docs.aws.amazon.com/waf/latest/developerguide/waf-application-integration.html">WAF client application integration</a> in the <i>WAF Developer Guide</i>.</p>
3074
3179
  */
3075
3180
  export interface MobileSdkRelease {
@@ -3329,12 +3434,13 @@ export interface GetSampledRequestsRequest {
3329
3434
  MaxItems: number | undefined;
3330
3435
  }
3331
3436
  export declare enum FailureReason {
3437
+ TOKEN_DOMAIN_MISMATCH = "TOKEN_DOMAIN_MISMATCH",
3332
3438
  TOKEN_EXPIRED = "TOKEN_EXPIRED",
3439
+ TOKEN_INVALID = "TOKEN_INVALID",
3333
3440
  TOKEN_MISSING = "TOKEN_MISSING"
3334
3441
  }
3335
3442
  /**
3336
- * <p>The result from the inspection of the web request for a valid <code>CAPTCHA</code>
3337
- * token. </p>
3443
+ * <p>The result from the inspection of the web request for a valid <code>CAPTCHA</code> token. </p>
3338
3444
  */
3339
3445
  export interface CaptchaResponse {
3340
3446
  /**
@@ -3344,7 +3450,25 @@ export interface CaptchaResponse {
3344
3450
  */
3345
3451
  ResponseCode?: number;
3346
3452
  /**
3347
- * <p>The time that the <code>CAPTCHA</code> puzzle was solved for the supplied token. </p>
3453
+ * <p>The time that the <code>CAPTCHA</code> was last solved for the supplied token. </p>
3454
+ */
3455
+ SolveTimestamp?: number;
3456
+ /**
3457
+ * <p>The reason for failure, populated when the evaluation of the token fails.</p>
3458
+ */
3459
+ FailureReason?: FailureReason | string;
3460
+ }
3461
+ /**
3462
+ * <p>The result from the inspection of the web request for a valid challenge token. </p>
3463
+ */
3464
+ export interface ChallengeResponse {
3465
+ /**
3466
+ * <p>The HTTP response code indicating the status of the challenge token in the
3467
+ * web request. If the token is missing, invalid, or expired, this code is <code>202 Request Accepted</code>.</p>
3468
+ */
3469
+ ResponseCode?: number;
3470
+ /**
3471
+ * <p>The time that the challenge was last solved for the supplied token. </p>
3348
3472
  */
3349
3473
  SolveTimestamp?: number;
3350
3474
  /**
@@ -3442,8 +3566,7 @@ export interface SampledHTTPRequest {
3442
3566
  */
3443
3567
  Timestamp?: Date;
3444
3568
  /**
3445
- * <p>The action for the <code>Rule</code> that the request matched: <code>Allow</code>,
3446
- * <code>Block</code>, or <code>Count</code>.</p>
3569
+ * <p>The action that WAF applied to the request.</p>
3447
3570
  */
3448
3571
  Action?: string;
3449
3572
  /**
@@ -3476,6 +3599,14 @@ export interface SampledHTTPRequest {
3476
3599
  * <p>The <code>CAPTCHA</code> response for the request.</p>
3477
3600
  */
3478
3601
  CaptchaResponse?: CaptchaResponse;
3602
+ /**
3603
+ * <p>The <code>Challenge</code> response for the request.</p>
3604
+ */
3605
+ ChallengeResponse?: ChallengeResponse;
3606
+ /**
3607
+ * <p>Used only for rule group rules that have a rule action override in place in the web ACL. This is the action that the rule group rule is configured for, and not the action that was applied to the request. The action that WAF applied is the <code>Action</code> value. </p>
3608
+ */
3609
+ OverriddenAction?: string;
3479
3610
  }
3480
3611
  export interface GetSampledRequestsResponse {
3481
3612
  /**
@@ -4587,10 +4718,10 @@ export interface ManagedRuleGroupStatement {
4587
4718
  */
4588
4719
  Version?: string;
4589
4720
  /**
4590
- * <p>The rules in the referenced rule group whose actions are set to <code>Count</code>. When
4591
- * you exclude a rule, WAF evaluates it exactly as it would if the rule action setting were
4592
- * <code>Count</code>. This is a useful option for testing the rules in a rule group
4593
- * without modifying how they handle your web traffic.</p>
4721
+ * <p>Rules in the referenced rule group whose actions are set to <code>Count</code>. </p>
4722
+ * <note>
4723
+ * <p>Instead of this option, use <code>RuleActionOverrides</code>. It accepts any valid action setting, including <code>Count</code>.</p>
4724
+ * </note>
4594
4725
  */
4595
4726
  ExcludedRules?: ExcludedRule[];
4596
4727
  /**
@@ -4602,12 +4733,16 @@ export interface ManagedRuleGroupStatement {
4602
4733
  */
4603
4734
  ScopeDownStatement?: Statement;
4604
4735
  /**
4605
- * <p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>
4606
- * <p>Use this for the account takeover prevention managed rule group
4607
- * <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>
4608
- * <p>You can provide multiple individual <code>ManagedRuleGroupConfig</code> objects for any rule group configuration, for example <code>UsernameField</code> and <code>PasswordField</code>. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: <code>LoginPath</code>, <code>PasswordField</code>, <code>PayloadType</code> and <code>UsernameField</code>.</p>
4736
+ * <p>Additional information that's used by a managed rule group. Many managed rule groups don't require this.</p>
4737
+ * <p>Use the <code>AWSManagedRulesBotControlRuleSet</code> configuration object to configure the
4738
+ * protection level that you want the Bot Control rule group to use. </p>
4609
4739
  */
4610
4740
  ManagedRuleGroupConfigs?: ManagedRuleGroupConfig[];
4741
+ /**
4742
+ * <p>Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change. </p>
4743
+ * <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>
4744
+ */
4745
+ RuleActionOverrides?: RuleActionOverride[];
4611
4746
  }
4612
4747
  /**
4613
4748
  * <p>A logical rule statement used to negate the results of another rule statement. You provide one <a>Statement</a> within the <code>NotStatement</code>.</p>
@@ -4718,7 +4853,7 @@ export interface Rule {
4718
4853
  * <p>You can only use this for rule statements that reference a rule group, like <code>RuleGroupReferenceStatement</code> and <code>ManagedRuleGroupStatement</code>. </p>
4719
4854
  * <note>
4720
4855
  * <p>This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count
4721
- * matches, do not use this and instead exclude those rules in your rule group reference statement settings. </p>
4856
+ * matches, do not use this and instead use the rule action override option, with <code>Count</code> action, in your rule group reference statement settings. </p>
4722
4857
  * </note>
4723
4858
  */
4724
4859
  OverrideAction?: OverrideAction;
@@ -4759,6 +4894,10 @@ export interface Rule {
4759
4894
  * <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations. If you don't specify this, WAF uses the <code>CAPTCHA</code> configuration that's defined for the web ACL. </p>
4760
4895
  */
4761
4896
  CaptchaConfig?: CaptchaConfig;
4897
+ /**
4898
+ * <p>Specifies how WAF should handle <code>Challenge</code> evaluations. If you don't specify this, WAF uses the challenge configuration that's defined for the web ACL. </p>
4899
+ */
4900
+ ChallengeConfig?: ChallengeConfig;
4762
4901
  }
4763
4902
  /**
4764
4903
  * <p>A logical rule statement used to combine other rule statements with AND logic. You provide more than one <a>Statement</a> within the <code>AndStatement</code>. </p>
@@ -4823,7 +4962,7 @@ export interface FirewallManagerRuleGroup {
4823
4962
  * <p>You can only use this for rule statements that reference a rule group, like <code>RuleGroupReferenceStatement</code> and <code>ManagedRuleGroupStatement</code>. </p>
4824
4963
  * <note>
4825
4964
  * <p>This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count
4826
- * matches, do not use this and instead exclude those rules in your rule group reference statement settings. </p>
4965
+ * matches, do not use this and instead use the rule action override option, with <code>Count</code> action, in your rule group reference statement settings. </p>
4827
4966
  * </note>
4828
4967
  */
4829
4968
  OverrideAction: OverrideAction | undefined;
@@ -4966,6 +5105,17 @@ export interface CreateWebACLRequest {
4966
5105
  * <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations for rules that don't have their own <code>CaptchaConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>CaptchaConfig</code>. </p>
4967
5106
  */
4968
5107
  CaptchaConfig?: CaptchaConfig;
5108
+ /**
5109
+ * <p>Specifies how WAF should handle challenge evaluations for rules that don't have
5110
+ * their own <code>ChallengeConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>ChallengeConfig</code>. </p>
5111
+ */
5112
+ ChallengeConfig?: ChallengeConfig;
5113
+ /**
5114
+ * <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
5115
+ * <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code>
5116
+ * </p>
5117
+ */
5118
+ TokenDomains?: string[];
4969
5119
  }
4970
5120
  /**
4971
5121
  * <p> A rule group defines a collection of rules to inspect and control web requests that you can use in a <a>WebACL</a>. When you create a rule group, you define an immutable capacity limit. If you update a rule group, you must stay within the capacity. This allows others to reuse the rule group with confidence in its capacity requirements. </p>
@@ -5156,6 +5306,17 @@ export interface UpdateWebACLRequest {
5156
5306
  * <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations for rules that don't have their own <code>CaptchaConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>CaptchaConfig</code>. </p>
5157
5307
  */
5158
5308
  CaptchaConfig?: CaptchaConfig;
5309
+ /**
5310
+ * <p>Specifies how WAF should handle challenge evaluations for rules that don't have
5311
+ * their own <code>ChallengeConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>ChallengeConfig</code>. </p>
5312
+ */
5313
+ ChallengeConfig?: ChallengeConfig;
5314
+ /**
5315
+ * <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
5316
+ * <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code>
5317
+ * </p>
5318
+ */
5319
+ TokenDomains?: string[];
5159
5320
  }
5160
5321
  export interface GetRuleGroupResponse {
5161
5322
  /**
@@ -5273,6 +5434,15 @@ export interface WebACL {
5273
5434
  * <p>Specifies how WAF should handle <code>CAPTCHA</code> evaluations for rules that don't have their own <code>CaptchaConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>CaptchaConfig</code>. </p>
5274
5435
  */
5275
5436
  CaptchaConfig?: CaptchaConfig;
5437
+ /**
5438
+ * <p>Specifies how WAF should handle challenge evaluations for rules that don't have
5439
+ * their own <code>ChallengeConfig</code> settings. If you don't specify this, WAF uses its default settings for <code>ChallengeConfig</code>. </p>
5440
+ */
5441
+ ChallengeConfig?: ChallengeConfig;
5442
+ /**
5443
+ * <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
5444
+ */
5445
+ TokenDomains?: string[];
5276
5446
  }
5277
5447
  export interface GetWebACLForResourceResponse {
5278
5448
  /**
@@ -5404,6 +5574,10 @@ export declare const LabelMatchStatementFilterSensitiveLog: (obj: LabelMatchStat
5404
5574
  * @internal
5405
5575
  */
5406
5576
  export declare const ExcludedRuleFilterSensitiveLog: (obj: ExcludedRule) => any;
5577
+ /**
5578
+ * @internal
5579
+ */
5580
+ export declare const AWSManagedRulesBotControlRuleSetFilterSensitiveLog: (obj: AWSManagedRulesBotControlRuleSet) => any;
5407
5581
  /**
5408
5582
  * @internal
5409
5583
  */
@@ -5419,55 +5593,63 @@ export declare const ManagedRuleGroupConfigFilterSensitiveLog: (obj: ManagedRule
5419
5593
  /**
5420
5594
  * @internal
5421
5595
  */
5422
- export declare const RegexMatchStatementFilterSensitiveLog: (obj: RegexMatchStatement) => any;
5596
+ export declare const CustomResponseFilterSensitiveLog: (obj: CustomResponse) => any;
5423
5597
  /**
5424
5598
  * @internal
5425
5599
  */
5426
- export declare const RegexPatternSetReferenceStatementFilterSensitiveLog: (obj: RegexPatternSetReferenceStatement) => any;
5600
+ export declare const BlockActionFilterSensitiveLog: (obj: BlockAction) => any;
5427
5601
  /**
5428
5602
  * @internal
5429
5603
  */
5430
- export declare const RuleGroupReferenceStatementFilterSensitiveLog: (obj: RuleGroupReferenceStatement) => any;
5604
+ export declare const CaptchaActionFilterSensitiveLog: (obj: CaptchaAction) => any;
5431
5605
  /**
5432
5606
  * @internal
5433
5607
  */
5434
- export declare const SizeConstraintStatementFilterSensitiveLog: (obj: SizeConstraintStatement) => any;
5608
+ export declare const ChallengeActionFilterSensitiveLog: (obj: ChallengeAction) => any;
5435
5609
  /**
5436
5610
  * @internal
5437
5611
  */
5438
- export declare const SqliMatchStatementFilterSensitiveLog: (obj: SqliMatchStatement) => any;
5612
+ export declare const CountActionFilterSensitiveLog: (obj: CountAction) => any;
5439
5613
  /**
5440
5614
  * @internal
5441
5615
  */
5442
- export declare const XssMatchStatementFilterSensitiveLog: (obj: XssMatchStatement) => any;
5616
+ export declare const RuleActionFilterSensitiveLog: (obj: RuleAction) => any;
5443
5617
  /**
5444
5618
  * @internal
5445
5619
  */
5446
- export declare const AssociateWebACLRequestFilterSensitiveLog: (obj: AssociateWebACLRequest) => any;
5620
+ export declare const RuleActionOverrideFilterSensitiveLog: (obj: RuleActionOverride) => any;
5447
5621
  /**
5448
5622
  * @internal
5449
5623
  */
5450
- export declare const AssociateWebACLResponseFilterSensitiveLog: (obj: AssociateWebACLResponse) => any;
5624
+ export declare const RegexMatchStatementFilterSensitiveLog: (obj: RegexMatchStatement) => any;
5451
5625
  /**
5452
5626
  * @internal
5453
5627
  */
5454
- export declare const CustomResponseFilterSensitiveLog: (obj: CustomResponse) => any;
5628
+ export declare const RegexPatternSetReferenceStatementFilterSensitiveLog: (obj: RegexPatternSetReferenceStatement) => any;
5455
5629
  /**
5456
5630
  * @internal
5457
5631
  */
5458
- export declare const BlockActionFilterSensitiveLog: (obj: BlockAction) => any;
5632
+ export declare const RuleGroupReferenceStatementFilterSensitiveLog: (obj: RuleGroupReferenceStatement) => any;
5459
5633
  /**
5460
5634
  * @internal
5461
5635
  */
5462
- export declare const CaptchaActionFilterSensitiveLog: (obj: CaptchaAction) => any;
5636
+ export declare const SizeConstraintStatementFilterSensitiveLog: (obj: SizeConstraintStatement) => any;
5463
5637
  /**
5464
5638
  * @internal
5465
5639
  */
5466
- export declare const CountActionFilterSensitiveLog: (obj: CountAction) => any;
5640
+ export declare const SqliMatchStatementFilterSensitiveLog: (obj: SqliMatchStatement) => any;
5467
5641
  /**
5468
5642
  * @internal
5469
5643
  */
5470
- export declare const RuleActionFilterSensitiveLog: (obj: RuleAction) => any;
5644
+ export declare const XssMatchStatementFilterSensitiveLog: (obj: XssMatchStatement) => any;
5645
+ /**
5646
+ * @internal
5647
+ */
5648
+ export declare const AssociateWebACLRequestFilterSensitiveLog: (obj: AssociateWebACLRequest) => any;
5649
+ /**
5650
+ * @internal
5651
+ */
5652
+ export declare const AssociateWebACLResponseFilterSensitiveLog: (obj: AssociateWebACLResponse) => any;
5471
5653
  /**
5472
5654
  * @internal
5473
5655
  */
@@ -5476,6 +5658,10 @@ export declare const ImmunityTimePropertyFilterSensitiveLog: (obj: ImmunityTimeP
5476
5658
  * @internal
5477
5659
  */
5478
5660
  export declare const CaptchaConfigFilterSensitiveLog: (obj: CaptchaConfig) => any;
5661
+ /**
5662
+ * @internal
5663
+ */
5664
+ export declare const ChallengeConfigFilterSensitiveLog: (obj: ChallengeConfig) => any;
5479
5665
  /**
5480
5666
  * @internal
5481
5667
  */
@@ -5756,6 +5942,10 @@ export declare const GetSampledRequestsRequestFilterSensitiveLog: (obj: GetSampl
5756
5942
  * @internal
5757
5943
  */
5758
5944
  export declare const CaptchaResponseFilterSensitiveLog: (obj: CaptchaResponse) => any;
5945
+ /**
5946
+ * @internal
5947
+ */
5948
+ export declare const ChallengeResponseFilterSensitiveLog: (obj: ChallengeResponse) => any;
5759
5949
  /**
5760
5950
  * @internal
5761
5951
  */