@aws-sdk/client-wafv2 3.226.0 → 3.231.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/dist-cjs/endpoint/ruleset.js +1 -10
- package/dist-cjs/runtimeConfig.browser.js +3 -3
- package/dist-cjs/runtimeConfig.js +2 -1
- package/dist-es/endpoint/ruleset.js +1 -10
- package/dist-es/runtimeConfig.browser.js +1 -1
- package/dist-es/runtimeConfig.js +2 -1
- package/dist-types/WAFV2.d.ts +4 -8
- package/dist-types/commands/AssociateWebACLCommand.d.ts +0 -1
- package/dist-types/commands/PutLoggingConfigurationCommand.d.ts +4 -3
- package/dist-types/commands/UpdateIPSetCommand.d.ts +0 -1
- package/dist-types/commands/UpdateRegexPatternSetCommand.d.ts +0 -1
- package/dist-types/commands/UpdateRuleGroupCommand.d.ts +0 -1
- package/dist-types/commands/UpdateWebACLCommand.d.ts +0 -1
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/models/models_0.d.ts +26 -50
- package/dist-types/runtimeConfig.browser.d.ts +1 -1
- package/dist-types/runtimeConfig.d.ts +1 -1
- package/dist-types/runtimeConfig.native.d.ts +1 -1
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/ts3.4/runtimeConfig.browser.d.ts +4 -1
- package/dist-types/ts3.4/runtimeConfig.d.ts +4 -1
- package/dist-types/ts3.4/runtimeConfig.native.d.ts +4 -1
- package/package.json +7 -6
|
@@ -6,7 +6,7 @@ exports.ruleSet = {
|
|
|
6
6
|
parameters: {
|
|
7
7
|
Region: {
|
|
8
8
|
builtIn: "AWS::Region",
|
|
9
|
-
required:
|
|
9
|
+
required: true,
|
|
10
10
|
documentation: "The AWS region used to dispatch the request.",
|
|
11
11
|
type: "String",
|
|
12
12
|
},
|
|
@@ -56,15 +56,6 @@ exports.ruleSet = {
|
|
|
56
56
|
},
|
|
57
57
|
],
|
|
58
58
|
},
|
|
59
|
-
{
|
|
60
|
-
fn: "parseURL",
|
|
61
|
-
argv: [
|
|
62
|
-
{
|
|
63
|
-
ref: "Endpoint",
|
|
64
|
-
},
|
|
65
|
-
],
|
|
66
|
-
assign: "url",
|
|
67
|
-
},
|
|
68
59
|
],
|
|
69
60
|
type: "tree",
|
|
70
61
|
rules: [
|
|
@@ -7,8 +7,8 @@ const sha256_browser_1 = require("@aws-crypto/sha256-browser");
|
|
|
7
7
|
const config_resolver_1 = require("@aws-sdk/config-resolver");
|
|
8
8
|
const fetch_http_handler_1 = require("@aws-sdk/fetch-http-handler");
|
|
9
9
|
const invalid_dependency_1 = require("@aws-sdk/invalid-dependency");
|
|
10
|
-
const middleware_retry_1 = require("@aws-sdk/middleware-retry");
|
|
11
10
|
const util_body_length_browser_1 = require("@aws-sdk/util-body-length-browser");
|
|
11
|
+
const util_retry_1 = require("@aws-sdk/util-retry");
|
|
12
12
|
const util_user_agent_browser_1 = require("@aws-sdk/util-user-agent-browser");
|
|
13
13
|
const util_utf8_browser_1 = require("@aws-sdk/util-utf8-browser");
|
|
14
14
|
const runtimeConfig_shared_1 = require("./runtimeConfig.shared");
|
|
@@ -27,10 +27,10 @@ const getRuntimeConfig = (config) => {
|
|
|
27
27
|
credentialDefaultProvider: config?.credentialDefaultProvider ?? ((_) => () => Promise.reject(new Error("Credential is missing"))),
|
|
28
28
|
defaultUserAgentProvider: config?.defaultUserAgentProvider ??
|
|
29
29
|
(0, util_user_agent_browser_1.defaultUserAgent)({ serviceId: clientSharedValues.serviceId, clientVersion: package_json_1.default.version }),
|
|
30
|
-
maxAttempts: config?.maxAttempts ??
|
|
30
|
+
maxAttempts: config?.maxAttempts ?? util_retry_1.DEFAULT_MAX_ATTEMPTS,
|
|
31
31
|
region: config?.region ?? (0, invalid_dependency_1.invalidProvider)("Region is missing"),
|
|
32
32
|
requestHandler: config?.requestHandler ?? new fetch_http_handler_1.FetchHttpHandler(defaultConfigProvider),
|
|
33
|
-
retryMode: config?.retryMode ?? (async () => (await defaultConfigProvider()).retryMode ||
|
|
33
|
+
retryMode: config?.retryMode ?? (async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE),
|
|
34
34
|
sha256: config?.sha256 ?? sha256_browser_1.Sha256,
|
|
35
35
|
streamCollector: config?.streamCollector ?? fetch_http_handler_1.streamCollector,
|
|
36
36
|
useDualstackEndpoint: config?.useDualstackEndpoint ?? (() => Promise.resolve(config_resolver_1.DEFAULT_USE_DUALSTACK_ENDPOINT)),
|
|
@@ -11,6 +11,7 @@ const middleware_retry_1 = require("@aws-sdk/middleware-retry");
|
|
|
11
11
|
const node_config_provider_1 = require("@aws-sdk/node-config-provider");
|
|
12
12
|
const node_http_handler_1 = require("@aws-sdk/node-http-handler");
|
|
13
13
|
const util_body_length_node_1 = require("@aws-sdk/util-body-length-node");
|
|
14
|
+
const util_retry_1 = require("@aws-sdk/util-retry");
|
|
14
15
|
const util_user_agent_node_1 = require("@aws-sdk/util-user-agent-node");
|
|
15
16
|
const util_utf8_node_1 = require("@aws-sdk/util-utf8-node");
|
|
16
17
|
const runtimeConfig_shared_1 = require("./runtimeConfig.shared");
|
|
@@ -37,7 +38,7 @@ const getRuntimeConfig = (config) => {
|
|
|
37
38
|
retryMode: config?.retryMode ??
|
|
38
39
|
(0, node_config_provider_1.loadConfig)({
|
|
39
40
|
...middleware_retry_1.NODE_RETRY_MODE_CONFIG_OPTIONS,
|
|
40
|
-
default: async () => (await defaultConfigProvider()).retryMode ||
|
|
41
|
+
default: async () => (await defaultConfigProvider()).retryMode || util_retry_1.DEFAULT_RETRY_MODE,
|
|
41
42
|
}),
|
|
42
43
|
sha256: config?.sha256 ?? hash_node_1.Hash.bind(null, "sha256"),
|
|
43
44
|
streamCollector: config?.streamCollector ?? node_http_handler_1.streamCollector,
|
|
@@ -3,7 +3,7 @@ export const ruleSet = {
|
|
|
3
3
|
parameters: {
|
|
4
4
|
Region: {
|
|
5
5
|
builtIn: "AWS::Region",
|
|
6
|
-
required:
|
|
6
|
+
required: true,
|
|
7
7
|
documentation: "The AWS region used to dispatch the request.",
|
|
8
8
|
type: "String",
|
|
9
9
|
},
|
|
@@ -53,15 +53,6 @@ export const ruleSet = {
|
|
|
53
53
|
},
|
|
54
54
|
],
|
|
55
55
|
},
|
|
56
|
-
{
|
|
57
|
-
fn: "parseURL",
|
|
58
|
-
argv: [
|
|
59
|
-
{
|
|
60
|
-
ref: "Endpoint",
|
|
61
|
-
},
|
|
62
|
-
],
|
|
63
|
-
assign: "url",
|
|
64
|
-
},
|
|
65
56
|
],
|
|
66
57
|
type: "tree",
|
|
67
58
|
rules: [
|
|
@@ -3,8 +3,8 @@ import { Sha256 } from "@aws-crypto/sha256-browser";
|
|
|
3
3
|
import { DEFAULT_USE_DUALSTACK_ENDPOINT, DEFAULT_USE_FIPS_ENDPOINT } from "@aws-sdk/config-resolver";
|
|
4
4
|
import { FetchHttpHandler as RequestHandler, streamCollector } from "@aws-sdk/fetch-http-handler";
|
|
5
5
|
import { invalidProvider } from "@aws-sdk/invalid-dependency";
|
|
6
|
-
import { DEFAULT_MAX_ATTEMPTS, DEFAULT_RETRY_MODE } from "@aws-sdk/middleware-retry";
|
|
7
6
|
import { calculateBodyLength } from "@aws-sdk/util-body-length-browser";
|
|
7
|
+
import { DEFAULT_MAX_ATTEMPTS, DEFAULT_RETRY_MODE } from "@aws-sdk/util-retry";
|
|
8
8
|
import { defaultUserAgent } from "@aws-sdk/util-user-agent-browser";
|
|
9
9
|
import { fromUtf8, toUtf8 } from "@aws-sdk/util-utf8-browser";
|
|
10
10
|
import { getRuntimeConfig as getSharedRuntimeConfig } from "./runtimeConfig.shared";
|
package/dist-es/runtimeConfig.js
CHANGED
|
@@ -3,10 +3,11 @@ import { decorateDefaultCredentialProvider } from "@aws-sdk/client-sts";
|
|
|
3
3
|
import { NODE_REGION_CONFIG_FILE_OPTIONS, NODE_REGION_CONFIG_OPTIONS, NODE_USE_DUALSTACK_ENDPOINT_CONFIG_OPTIONS, NODE_USE_FIPS_ENDPOINT_CONFIG_OPTIONS, } from "@aws-sdk/config-resolver";
|
|
4
4
|
import { defaultProvider as credentialDefaultProvider } from "@aws-sdk/credential-provider-node";
|
|
5
5
|
import { Hash } from "@aws-sdk/hash-node";
|
|
6
|
-
import {
|
|
6
|
+
import { NODE_MAX_ATTEMPT_CONFIG_OPTIONS, NODE_RETRY_MODE_CONFIG_OPTIONS } from "@aws-sdk/middleware-retry";
|
|
7
7
|
import { loadConfig as loadNodeConfig } from "@aws-sdk/node-config-provider";
|
|
8
8
|
import { NodeHttpHandler as RequestHandler, streamCollector } from "@aws-sdk/node-http-handler";
|
|
9
9
|
import { calculateBodyLength } from "@aws-sdk/util-body-length-node";
|
|
10
|
+
import { DEFAULT_RETRY_MODE } from "@aws-sdk/util-retry";
|
|
10
11
|
import { defaultUserAgent } from "@aws-sdk/util-user-agent-node";
|
|
11
12
|
import { fromUtf8, toUtf8 } from "@aws-sdk/util-utf8-node";
|
|
12
13
|
import { getRuntimeConfig as getSharedRuntimeConfig } from "./runtimeConfig.shared";
|
package/dist-types/WAFV2.d.ts
CHANGED
|
@@ -116,7 +116,6 @@ export declare class WAFV2 extends WAFV2Client {
|
|
|
116
116
|
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
|
|
117
117
|
* associate a web ACL, in the CloudFront call <code>UpdateDistribution</code>, set the web ACL ID
|
|
118
118
|
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
|
|
119
|
-
*
|
|
120
119
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
121
120
|
*/
|
|
122
121
|
associateWebACL(args: AssociateWebACLCommandInput, options?: __HttpHandlerOptions): Promise<AssociateWebACLCommandOutput>;
|
|
@@ -465,9 +464,10 @@ export declare class WAFV2 extends WAFV2Client {
|
|
|
465
464
|
* steps:</p>
|
|
466
465
|
* <ol>
|
|
467
466
|
* <li>
|
|
468
|
-
* <p>Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose.
|
|
469
|
-
*
|
|
470
|
-
*
|
|
467
|
+
* <p>Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose. </p>
|
|
468
|
+
* <p>The name that you give the destination must start with <code>aws-waf-logs-</code>. Depending on the type of destination, you might need to configure additional settings or permissions. </p>
|
|
469
|
+
* <p>For configuration requirements and pricing information for each destination type, see
|
|
470
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/logging.html">Logging web ACL traffic</a>
|
|
471
471
|
* in the <i>WAF Developer Guide</i>.</p>
|
|
472
472
|
* </li>
|
|
473
473
|
* <li>
|
|
@@ -555,7 +555,6 @@ export declare class WAFV2 extends WAFV2Client {
|
|
|
555
555
|
* <note>
|
|
556
556
|
* <p>This operation completely replaces the mutable specifications that you already have for the IP set with the ones that you provide to this call. To modify the IP set, retrieve it by calling <a>GetIPSet</a>, update the settings as needed, and then provide the complete IP set specification to this call.</p>
|
|
557
557
|
* </note>
|
|
558
|
-
*
|
|
559
558
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
560
559
|
*/
|
|
561
560
|
updateIPSet(args: UpdateIPSetCommandInput, options?: __HttpHandlerOptions): Promise<UpdateIPSetCommandOutput>;
|
|
@@ -578,7 +577,6 @@ export declare class WAFV2 extends WAFV2Client {
|
|
|
578
577
|
* <note>
|
|
579
578
|
* <p>This operation completely replaces the mutable specifications that you already have for the regex pattern set with the ones that you provide to this call. To modify the regex pattern set, retrieve it by calling <a>GetRegexPatternSet</a>, update the settings as needed, and then provide the complete regex pattern set specification to this call.</p>
|
|
580
579
|
* </note>
|
|
581
|
-
*
|
|
582
580
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
583
581
|
*/
|
|
584
582
|
updateRegexPatternSet(args: UpdateRegexPatternSetCommandInput, options?: __HttpHandlerOptions): Promise<UpdateRegexPatternSetCommandOutput>;
|
|
@@ -589,7 +587,6 @@ export declare class WAFV2 extends WAFV2Client {
|
|
|
589
587
|
* <note>
|
|
590
588
|
* <p>This operation completely replaces the mutable specifications that you already have for the rule group with the ones that you provide to this call. To modify the rule group, retrieve it by calling <a>GetRuleGroup</a>, update the settings as needed, and then provide the complete rule group specification to this call.</p>
|
|
591
589
|
* </note>
|
|
592
|
-
*
|
|
593
590
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
594
591
|
* <p> A rule group defines a collection of rules to inspect and control web requests that you can use in a <a>WebACL</a>. When you create a rule group, you define an immutable capacity limit. If you update a rule group, you must stay within the capacity. This allows others to reuse the rule group with confidence in its capacity requirements. </p>
|
|
595
592
|
*/
|
|
@@ -599,7 +596,6 @@ export declare class WAFV2 extends WAFV2Client {
|
|
|
599
596
|
/**
|
|
600
597
|
* <p>Updates the specified <a>WebACL</a>. While updating a web ACL, WAF provides
|
|
601
598
|
* continuous coverage to the resources that you have associated with the web ACL. </p>
|
|
602
|
-
*
|
|
603
599
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
604
600
|
* <note>
|
|
605
601
|
* <p>This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call. To modify the web ACL, retrieve it by calling <a>GetWebACL</a>, update the settings as needed, and then provide the complete web ACL specification to this call.</p>
|
|
@@ -13,7 +13,6 @@ export interface AssociateWebACLCommandOutput extends AssociateWebACLResponse, _
|
|
|
13
13
|
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
|
|
14
14
|
* associate a web ACL, in the CloudFront call <code>UpdateDistribution</code>, set the web ACL ID
|
|
15
15
|
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
|
|
16
|
-
*
|
|
17
16
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
18
17
|
* @example
|
|
19
18
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -17,9 +17,10 @@ export interface PutLoggingConfigurationCommandOutput extends PutLoggingConfigur
|
|
|
17
17
|
* steps:</p>
|
|
18
18
|
* <ol>
|
|
19
19
|
* <li>
|
|
20
|
-
* <p>Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose.
|
|
21
|
-
*
|
|
22
|
-
*
|
|
20
|
+
* <p>Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose. </p>
|
|
21
|
+
* <p>The name that you give the destination must start with <code>aws-waf-logs-</code>. Depending on the type of destination, you might need to configure additional settings or permissions. </p>
|
|
22
|
+
* <p>For configuration requirements and pricing information for each destination type, see
|
|
23
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/logging.html">Logging web ACL traffic</a>
|
|
23
24
|
* in the <i>WAF Developer Guide</i>.</p>
|
|
24
25
|
* </li>
|
|
25
26
|
* <li>
|
|
@@ -12,7 +12,6 @@ export interface UpdateIPSetCommandOutput extends UpdateIPSetResponse, __Metadat
|
|
|
12
12
|
* <note>
|
|
13
13
|
* <p>This operation completely replaces the mutable specifications that you already have for the IP set with the ones that you provide to this call. To modify the IP set, retrieve it by calling <a>GetIPSet</a>, update the settings as needed, and then provide the complete IP set specification to this call.</p>
|
|
14
14
|
* </note>
|
|
15
|
-
*
|
|
16
15
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
17
16
|
* @example
|
|
18
17
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -12,7 +12,6 @@ export interface UpdateRegexPatternSetCommandOutput extends UpdateRegexPatternSe
|
|
|
12
12
|
* <note>
|
|
13
13
|
* <p>This operation completely replaces the mutable specifications that you already have for the regex pattern set with the ones that you provide to this call. To modify the regex pattern set, retrieve it by calling <a>GetRegexPatternSet</a>, update the settings as needed, and then provide the complete regex pattern set specification to this call.</p>
|
|
14
14
|
* </note>
|
|
15
|
-
*
|
|
16
15
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
17
16
|
* @example
|
|
18
17
|
* Use a bare-bones client and the command you need to make an API call.
|
|
@@ -12,7 +12,6 @@ export interface UpdateRuleGroupCommandOutput extends UpdateRuleGroupResponse, _
|
|
|
12
12
|
* <note>
|
|
13
13
|
* <p>This operation completely replaces the mutable specifications that you already have for the rule group with the ones that you provide to this call. To modify the rule group, retrieve it by calling <a>GetRuleGroup</a>, update the settings as needed, and then provide the complete rule group specification to this call.</p>
|
|
14
14
|
* </note>
|
|
15
|
-
*
|
|
16
15
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
17
16
|
* <p> A rule group defines a collection of rules to inspect and control web requests that you can use in a <a>WebACL</a>. When you create a rule group, you define an immutable capacity limit. If you update a rule group, you must stay within the capacity. This allows others to reuse the rule group with confidence in its capacity requirements. </p>
|
|
18
17
|
* @example
|
|
@@ -10,7 +10,6 @@ export interface UpdateWebACLCommandOutput extends UpdateWebACLResponse, __Metad
|
|
|
10
10
|
/**
|
|
11
11
|
* <p>Updates the specified <a>WebACL</a>. While updating a web ACL, WAF provides
|
|
12
12
|
* continuous coverage to the resources that you have associated with the web ACL. </p>
|
|
13
|
-
*
|
|
14
13
|
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
|
|
15
14
|
* <note>
|
|
16
15
|
* <p>This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call. To modify the web ACL, retrieve it by calling <a>GetWebACL</a>, update the settings as needed, and then provide the complete web ACL specification to this call.</p>
|
|
@@ -12,7 +12,7 @@ export declare const resolveClientEndpointParameters: <T>(options: T & ClientInp
|
|
|
12
12
|
defaultSigningName: string;
|
|
13
13
|
};
|
|
14
14
|
export interface EndpointParameters extends __EndpointParameters {
|
|
15
|
-
Region
|
|
15
|
+
Region: string;
|
|
16
16
|
UseDualStack?: boolean;
|
|
17
17
|
UseFIPS?: boolean;
|
|
18
18
|
Endpoint?: string;
|
|
@@ -1115,12 +1115,9 @@ export declare enum FallbackBehavior {
|
|
|
1115
1115
|
}
|
|
1116
1116
|
/**
|
|
1117
1117
|
* <p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>
|
|
1118
|
-
*
|
|
1119
1118
|
* <note>
|
|
1120
1119
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1121
1120
|
* </note>
|
|
1122
|
-
*
|
|
1123
|
-
*
|
|
1124
1121
|
* <p>This configuration is used for <a>GeoMatchStatement</a> and <a>RateBasedStatement</a>. For <a>IPSetReferenceStatement</a>, use <a>IPSetForwardedIPConfig</a> instead. </p>
|
|
1125
1122
|
* <p>WAF only evaluates the first IP address found in the specified HTTP header.
|
|
1126
1123
|
* </p>
|
|
@@ -1128,7 +1125,6 @@ export declare enum FallbackBehavior {
|
|
|
1128
1125
|
export interface ForwardedIPConfig {
|
|
1129
1126
|
/**
|
|
1130
1127
|
* <p>The name of the HTTP header to use for the IP address. For example, to use the X-Forwarded-For (XFF) header, set this to <code>X-Forwarded-For</code>.</p>
|
|
1131
|
-
*
|
|
1132
1128
|
* <note>
|
|
1133
1129
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1134
1130
|
* </note>
|
|
@@ -1136,11 +1132,9 @@ export interface ForwardedIPConfig {
|
|
|
1136
1132
|
HeaderName: string | undefined;
|
|
1137
1133
|
/**
|
|
1138
1134
|
* <p>The match status to assign to the web request if the request doesn't have a valid IP address in the specified position.</p>
|
|
1139
|
-
*
|
|
1140
1135
|
* <note>
|
|
1141
1136
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1142
1137
|
* </note>
|
|
1143
|
-
*
|
|
1144
1138
|
* <p>You can specify the following fallback behaviors:</p>
|
|
1145
1139
|
* <ul>
|
|
1146
1140
|
* <li>
|
|
@@ -1179,7 +1173,6 @@ export interface GeoMatchStatement {
|
|
|
1179
1173
|
CountryCodes?: (CountryCode | string)[];
|
|
1180
1174
|
/**
|
|
1181
1175
|
* <p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>
|
|
1182
|
-
*
|
|
1183
1176
|
* <note>
|
|
1184
1177
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1185
1178
|
* </note>
|
|
@@ -1193,18 +1186,14 @@ export declare enum ForwardedIPPosition {
|
|
|
1193
1186
|
}
|
|
1194
1187
|
/**
|
|
1195
1188
|
* <p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>
|
|
1196
|
-
*
|
|
1197
1189
|
* <note>
|
|
1198
1190
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1199
1191
|
* </note>
|
|
1200
|
-
*
|
|
1201
|
-
*
|
|
1202
1192
|
* <p>This configuration is used only for <a>IPSetReferenceStatement</a>. For <a>GeoMatchStatement</a> and <a>RateBasedStatement</a>, use <a>ForwardedIPConfig</a> instead. </p>
|
|
1203
1193
|
*/
|
|
1204
1194
|
export interface IPSetForwardedIPConfig {
|
|
1205
1195
|
/**
|
|
1206
1196
|
* <p>The name of the HTTP header to use for the IP address. For example, to use the X-Forwarded-For (XFF) header, set this to <code>X-Forwarded-For</code>.</p>
|
|
1207
|
-
*
|
|
1208
1197
|
* <note>
|
|
1209
1198
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1210
1199
|
* </note>
|
|
@@ -1212,11 +1201,9 @@ export interface IPSetForwardedIPConfig {
|
|
|
1212
1201
|
HeaderName: string | undefined;
|
|
1213
1202
|
/**
|
|
1214
1203
|
* <p>The match status to assign to the web request if the request doesn't have a valid IP address in the specified position.</p>
|
|
1215
|
-
*
|
|
1216
1204
|
* <note>
|
|
1217
1205
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1218
1206
|
* </note>
|
|
1219
|
-
*
|
|
1220
1207
|
* <p>You can specify the following fallback behaviors:</p>
|
|
1221
1208
|
* <ul>
|
|
1222
1209
|
* <li>
|
|
@@ -1265,7 +1252,6 @@ export interface IPSetReferenceStatement {
|
|
|
1265
1252
|
ARN: string | undefined;
|
|
1266
1253
|
/**
|
|
1267
1254
|
* <p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>
|
|
1268
|
-
*
|
|
1269
1255
|
* <note>
|
|
1270
1256
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
1271
1257
|
* </note>
|
|
@@ -1440,23 +1426,23 @@ export interface BlockAction {
|
|
|
1440
1426
|
* <p>If the request includes a valid, unexpired <code>CAPTCHA</code> token,
|
|
1441
1427
|
* WAF applies any custom request handling and labels that you've configured and then allows the web request inspection to
|
|
1442
1428
|
* proceed to the next rule, similar to a <code>CountAction</code>. </p>
|
|
1443
|
-
*
|
|
1429
|
+
* </li>
|
|
1444
1430
|
* <li>
|
|
1445
1431
|
* <p>If the request doesn't include a valid, unexpired token, WAF
|
|
1446
1432
|
* discontinues the web ACL evaluation of the request and blocks it from going to its intended destination.</p>
|
|
1447
1433
|
* <p>WAF generates a response that it sends back to the client, which includes the following: </p>
|
|
1448
1434
|
* <ul>
|
|
1449
1435
|
* <li>
|
|
1450
|
-
*
|
|
1451
|
-
*
|
|
1436
|
+
* <p>The header <code>x-amzn-waf-action</code> with a value of <code>captcha</code>. </p>
|
|
1437
|
+
* </li>
|
|
1452
1438
|
* <li>
|
|
1453
|
-
*
|
|
1454
|
-
*
|
|
1439
|
+
* <p>The HTTP status code <code>405 Method Not Allowed</code>. </p>
|
|
1440
|
+
* </li>
|
|
1455
1441
|
* <li>
|
|
1456
|
-
*
|
|
1457
|
-
*
|
|
1442
|
+
* <p>If the request contains an <code>Accept</code> header with a value of <code>text/html</code>, the response includes a <code>CAPTCHA</code> JavaScript page interstitial. </p>
|
|
1443
|
+
* </li>
|
|
1458
1444
|
* </ul>
|
|
1459
|
-
*
|
|
1445
|
+
* </li>
|
|
1460
1446
|
* </ul>
|
|
1461
1447
|
* <p>You can configure the expiration time
|
|
1462
1448
|
* in the <code>CaptchaConfig</code>
|
|
@@ -1485,14 +1471,14 @@ export interface CaptchaAction {
|
|
|
1485
1471
|
* <p>WAF then generates a challenge response that it sends back to the client, which includes the following: </p>
|
|
1486
1472
|
* <ul>
|
|
1487
1473
|
* <li>
|
|
1488
|
-
*
|
|
1489
|
-
*
|
|
1474
|
+
* <p>The header <code>x-amzn-waf-action</code> with a value of <code>challenge</code>. </p>
|
|
1475
|
+
* </li>
|
|
1490
1476
|
* <li>
|
|
1491
|
-
*
|
|
1492
|
-
*
|
|
1477
|
+
* <p>The HTTP status code <code>202 Request Accepted</code>. </p>
|
|
1478
|
+
* </li>
|
|
1493
1479
|
* <li>
|
|
1494
|
-
*
|
|
1495
|
-
*
|
|
1480
|
+
* <p>If the request contains an <code>Accept</code> header with a value of <code>text/html</code>, the response includes a JavaScript page interstitial with a challenge script. </p>
|
|
1481
|
+
* </li>
|
|
1496
1482
|
* </ul>
|
|
1497
1483
|
* <p>Challenges run silent browser interrogations in the background, and don't generally affect the end user experience. </p>
|
|
1498
1484
|
* <p>A challenge enforces token acquisition using an interstitial JavaScript challenge that inspects the client session for legitimate behavior. The challenge blocks bots or at least increases the cost of operating sophisticated bots. </p>
|
|
@@ -1724,7 +1710,6 @@ export interface AssociateWebACLRequest {
|
|
|
1724
1710
|
WebACLArn: string | undefined;
|
|
1725
1711
|
/**
|
|
1726
1712
|
* <p>The Amazon Resource Name (ARN) of the resource to associate with the web ACL. </p>
|
|
1727
|
-
*
|
|
1728
1713
|
* <p>The ARN must be in one of the following formats:</p>
|
|
1729
1714
|
* <ul>
|
|
1730
1715
|
* <li>
|
|
@@ -2724,7 +2709,6 @@ export interface DescribeManagedRuleGroupResponse {
|
|
|
2724
2709
|
* <p>
|
|
2725
2710
|
* <code><label namespace>:<label from rule></code>
|
|
2726
2711
|
* </p>
|
|
2727
|
-
*
|
|
2728
2712
|
* </li>
|
|
2729
2713
|
* </ul>
|
|
2730
2714
|
*/
|
|
@@ -2741,7 +2725,6 @@ export interface DescribeManagedRuleGroupResponse {
|
|
|
2741
2725
|
export interface DisassociateWebACLRequest {
|
|
2742
2726
|
/**
|
|
2743
2727
|
* <p>The Amazon Resource Name (ARN) of the resource to disassociate from the web ACL. </p>
|
|
2744
|
-
*
|
|
2745
2728
|
* <p>The ARN must be in one of the following formats:</p>
|
|
2746
2729
|
* <ul>
|
|
2747
2730
|
* <li>
|
|
@@ -2979,9 +2962,10 @@ export interface LoggingFilter {
|
|
|
2979
2962
|
* steps:</p>
|
|
2980
2963
|
* <ol>
|
|
2981
2964
|
* <li>
|
|
2982
|
-
* <p>Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose.
|
|
2983
|
-
*
|
|
2984
|
-
*
|
|
2965
|
+
* <p>Create your logging destination. You can use an Amazon CloudWatch Logs log group, an Amazon Simple Storage Service (Amazon S3) bucket, or an Amazon Kinesis Data Firehose. </p>
|
|
2966
|
+
* <p>The name that you give the destination must start with <code>aws-waf-logs-</code>. Depending on the type of destination, you might need to configure additional settings or permissions. </p>
|
|
2967
|
+
* <p>For configuration requirements and pricing information for each destination type, see
|
|
2968
|
+
* <a href="https://docs.aws.amazon.com/waf/latest/developerguide/logging.html">Logging web ACL traffic</a>
|
|
2985
2969
|
* in the <i>WAF Developer Guide</i>.</p>
|
|
2986
2970
|
* </li>
|
|
2987
2971
|
* <li>
|
|
@@ -3080,7 +3064,7 @@ export interface ManagedRuleSetVersion {
|
|
|
3080
3064
|
AssociatedRuleGroupArn?: string;
|
|
3081
3065
|
/**
|
|
3082
3066
|
* <p>The web ACL capacity units (WCUs) required for this rule group.</p>
|
|
3083
|
-
*
|
|
3067
|
+
* <p>WAF uses WCUs to calculate and control the operating
|
|
3084
3068
|
* resources that are used to run your rules, rule groups, and web ACLs. WAF
|
|
3085
3069
|
* calculates capacity differently for each rule type, to reflect the relative cost of each rule.
|
|
3086
3070
|
* Simple rules that cost little to run use fewer WCUs than more complex rules
|
|
@@ -3158,7 +3142,6 @@ export interface ManagedRuleSet {
|
|
|
3158
3142
|
* <p>
|
|
3159
3143
|
* <code><label namespace>:<label from rule></code>
|
|
3160
3144
|
* </p>
|
|
3161
|
-
*
|
|
3162
3145
|
* </li>
|
|
3163
3146
|
* </ul>
|
|
3164
3147
|
*/
|
|
@@ -3669,7 +3652,6 @@ export interface GetWebACLRequest {
|
|
|
3669
3652
|
export interface GetWebACLForResourceRequest {
|
|
3670
3653
|
/**
|
|
3671
3654
|
* <p>The Amazon Resource Name (ARN) of the resource whose web ACL you want to retrieve. </p>
|
|
3672
|
-
*
|
|
3673
3655
|
* <p>The ARN must be in one of the following formats:</p>
|
|
3674
3656
|
* <ul>
|
|
3675
3657
|
* <li>
|
|
@@ -3970,7 +3952,6 @@ export interface ManagedRuleSetSummary {
|
|
|
3970
3952
|
* <p>
|
|
3971
3953
|
* <code><label namespace>:<label from rule></code>
|
|
3972
3954
|
* </p>
|
|
3973
|
-
*
|
|
3974
3955
|
* </li>
|
|
3975
3956
|
* </ul>
|
|
3976
3957
|
*/
|
|
@@ -4344,7 +4325,6 @@ export interface PutPermissionPolicyRequest {
|
|
|
4344
4325
|
ResourceArn: string | undefined;
|
|
4345
4326
|
/**
|
|
4346
4327
|
* <p>The policy to attach to the specified rule group. </p>
|
|
4347
|
-
*
|
|
4348
4328
|
* <p>The policy specifications must conform to the following:</p>
|
|
4349
4329
|
* <ul>
|
|
4350
4330
|
* <li>
|
|
@@ -4375,7 +4355,6 @@ export interface PutPermissionPolicyResponse {
|
|
|
4375
4355
|
}
|
|
4376
4356
|
/**
|
|
4377
4357
|
* <p>The operation failed because the specified policy isn't in the proper format. </p>
|
|
4378
|
-
*
|
|
4379
4358
|
* <p>The policy specifications must conform to the following:</p>
|
|
4380
4359
|
* <ul>
|
|
4381
4360
|
* <li>
|
|
@@ -4826,12 +4805,9 @@ export interface RateBasedStatement {
|
|
|
4826
4805
|
ScopeDownStatement?: Statement;
|
|
4827
4806
|
/**
|
|
4828
4807
|
* <p>The configuration for inspecting IP addresses in an HTTP header that you specify, instead of using the IP address that's reported by the web request origin. Commonly, this is the X-Forwarded-For (XFF) header, but you can specify any header name. </p>
|
|
4829
|
-
*
|
|
4830
4808
|
* <note>
|
|
4831
4809
|
* <p>If the specified header isn't present in the request, WAF doesn't apply the rule to the web request at all.</p>
|
|
4832
4810
|
* </note>
|
|
4833
|
-
*
|
|
4834
|
-
*
|
|
4835
4811
|
* <p>This is required if <code>AggregateKeyType</code> is set to
|
|
4836
4812
|
* <code>FORWARDED_IP</code>.</p>
|
|
4837
4813
|
*/
|
|
@@ -4861,7 +4837,7 @@ export interface Rule {
|
|
|
4861
4837
|
Statement: Statement | undefined;
|
|
4862
4838
|
/**
|
|
4863
4839
|
* <p>The action that WAF should take on a web request when it matches the rule statement. Settings at the web ACL level can override the rule action setting. </p>
|
|
4864
|
-
*
|
|
4840
|
+
* <p>This is used only for rules whose statements do not reference a rule group. Rule statements that reference a rule group include <code>RuleGroupReferenceStatement</code> and <code>ManagedRuleGroupStatement</code>. </p>
|
|
4865
4841
|
* <p>You must specify either this <code>Action</code> setting or the rule <code>OverrideAction</code> setting, but not both:</p>
|
|
4866
4842
|
* <ul>
|
|
4867
4843
|
* <li>
|
|
@@ -5036,10 +5012,10 @@ export interface CreateRuleGroupRequest {
|
|
|
5036
5012
|
Scope: Scope | string | undefined;
|
|
5037
5013
|
/**
|
|
5038
5014
|
* <p>The web ACL capacity units (WCUs) required for this rule group.</p>
|
|
5039
|
-
*
|
|
5015
|
+
* <p>When you create your own rule group, you define this, and you cannot change it after creation.
|
|
5040
5016
|
* When you add or modify the rules in a rule group, WAF enforces this limit. You can check the capacity
|
|
5041
5017
|
* for a set of rules using <a>CheckCapacity</a>.</p>
|
|
5042
|
-
*
|
|
5018
|
+
* <p>WAF uses WCUs to calculate and control the operating
|
|
5043
5019
|
* resources that are used to run your rules, rule groups, and web ACLs. WAF
|
|
5044
5020
|
* calculates capacity differently for each rule type, to reflect the relative cost of each rule.
|
|
5045
5021
|
* Simple rules that cost little to run use fewer WCUs than more complex rules
|
|
@@ -5139,6 +5115,7 @@ export interface CreateWebACLRequest {
|
|
|
5139
5115
|
* <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
|
|
5140
5116
|
* <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code>
|
|
5141
5117
|
* </p>
|
|
5118
|
+
* <p>Public suffixes aren't allowed. For example, you can't use <code>usa.gov</code> or <code>co.uk</code> as token domains.</p>
|
|
5142
5119
|
*/
|
|
5143
5120
|
TokenDomains?: string[];
|
|
5144
5121
|
}
|
|
@@ -5156,10 +5133,10 @@ export interface RuleGroup {
|
|
|
5156
5133
|
Id: string | undefined;
|
|
5157
5134
|
/**
|
|
5158
5135
|
* <p>The web ACL capacity units (WCUs) required for this rule group.</p>
|
|
5159
|
-
*
|
|
5136
|
+
* <p>When you create your own rule group, you define this, and you cannot change it after creation.
|
|
5160
5137
|
* When you add or modify the rules in a rule group, WAF enforces this limit. You can check the capacity
|
|
5161
5138
|
* for a set of rules using <a>CheckCapacity</a>.</p>
|
|
5162
|
-
*
|
|
5139
|
+
* <p>WAF uses WCUs to calculate and control the operating
|
|
5163
5140
|
* resources that are used to run your rules, rule groups, and web ACLs. WAF
|
|
5164
5141
|
* calculates capacity differently for each rule type, to reflect the relative cost of each rule.
|
|
5165
5142
|
* Simple rules that cost little to run use fewer WCUs than more complex rules
|
|
@@ -5202,7 +5179,6 @@ export interface RuleGroup {
|
|
|
5202
5179
|
* <p>
|
|
5203
5180
|
* <code><label namespace>:<label from rule></code>
|
|
5204
5181
|
* </p>
|
|
5205
|
-
*
|
|
5206
5182
|
* </li>
|
|
5207
5183
|
* </ul>
|
|
5208
5184
|
*/
|
|
@@ -5340,6 +5316,7 @@ export interface UpdateWebACLRequest {
|
|
|
5340
5316
|
* <p>Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.</p>
|
|
5341
5317
|
* <p>Example JSON: <code>"TokenDomains": { "mywebsite.com", "myotherwebsite.com" }</code>
|
|
5342
5318
|
* </p>
|
|
5319
|
+
* <p>Public suffixes aren't allowed. For example, you can't use <code>usa.gov</code> or <code>co.uk</code> as token domains.</p>
|
|
5343
5320
|
*/
|
|
5344
5321
|
TokenDomains?: string[];
|
|
5345
5322
|
}
|
|
@@ -5442,7 +5419,6 @@ export interface WebACL {
|
|
|
5442
5419
|
* <p>
|
|
5443
5420
|
* <code><label namespace>:<label from rule></code>
|
|
5444
5421
|
* </p>
|
|
5445
|
-
*
|
|
5446
5422
|
* </li>
|
|
5447
5423
|
* </ul>
|
|
5448
5424
|
*/
|
|
@@ -31,7 +31,7 @@ export declare const getRuntimeConfig: (config: WAFV2ClientConfig) => {
|
|
|
31
31
|
logger?: import("@aws-sdk/types").Logger | undefined;
|
|
32
32
|
}) => import("@aws-sdk/types").EndpointV2;
|
|
33
33
|
tls?: boolean | undefined;
|
|
34
|
-
retryStrategy?: import("@aws-sdk/types").RetryStrategy | undefined;
|
|
34
|
+
retryStrategy?: import("@aws-sdk/types").RetryStrategy | import("@aws-sdk/types").RetryStrategyV2 | undefined;
|
|
35
35
|
credentials?: import("@aws-sdk/types").AwsCredentialIdentity | import("@aws-sdk/types").Provider<import("@aws-sdk/types").AwsCredentialIdentity> | undefined;
|
|
36
36
|
signer?: import("@aws-sdk/types").RequestSigner | ((authScheme?: import("@aws-sdk/types").AuthScheme | undefined) => Promise<import("@aws-sdk/types").RequestSigner>) | undefined;
|
|
37
37
|
signingEscapePath?: boolean | undefined;
|
|
@@ -31,7 +31,7 @@ export declare const getRuntimeConfig: (config: WAFV2ClientConfig) => {
|
|
|
31
31
|
logger?: import("@aws-sdk/types").Logger | undefined;
|
|
32
32
|
}) => import("@aws-sdk/types").EndpointV2;
|
|
33
33
|
tls?: boolean | undefined;
|
|
34
|
-
retryStrategy?: import("@aws-sdk/types").RetryStrategy | undefined;
|
|
34
|
+
retryStrategy?: import("@aws-sdk/types").RetryStrategy | import("@aws-sdk/types").RetryStrategyV2 | undefined;
|
|
35
35
|
credentials?: import("@aws-sdk/types").AwsCredentialIdentity | import("@aws-sdk/types").Provider<import("@aws-sdk/types").AwsCredentialIdentity> | undefined;
|
|
36
36
|
signer?: import("@aws-sdk/types").RequestSigner | ((authScheme?: import("@aws-sdk/types").AuthScheme | undefined) => Promise<import("@aws-sdk/types").RequestSigner>) | undefined;
|
|
37
37
|
signingEscapePath?: boolean | undefined;
|
|
@@ -30,7 +30,7 @@ export declare const getRuntimeConfig: (config: WAFV2ClientConfig) => {
|
|
|
30
30
|
logger?: import("@aws-sdk/types").Logger | undefined;
|
|
31
31
|
}) => import("@aws-sdk/types").EndpointV2;
|
|
32
32
|
tls?: boolean | undefined;
|
|
33
|
-
retryStrategy?: import("@aws-sdk/types").RetryStrategy | undefined;
|
|
33
|
+
retryStrategy?: import("@aws-sdk/types").RetryStrategy | import("@aws-sdk/types").RetryStrategyV2 | undefined;
|
|
34
34
|
credentials?: import("@aws-sdk/types").AwsCredentialIdentity | import("@aws-sdk/types").Provider<import("@aws-sdk/types").AwsCredentialIdentity> | undefined;
|
|
35
35
|
signer?: import("@aws-sdk/types").RequestSigner | ((authScheme?: import("@aws-sdk/types").AuthScheme | undefined) => Promise<import("@aws-sdk/types").RequestSigner>) | undefined;
|
|
36
36
|
signingEscapePath?: boolean | undefined;
|
|
@@ -27,7 +27,7 @@ export declare const resolveClientEndpointParameters: <T>(
|
|
|
27
27
|
defaultSigningName: string;
|
|
28
28
|
};
|
|
29
29
|
export interface EndpointParameters extends __EndpointParameters {
|
|
30
|
-
Region
|
|
30
|
+
Region: string;
|
|
31
31
|
UseDualStack?: boolean;
|
|
32
32
|
UseFIPS?: boolean;
|
|
33
33
|
Endpoint?: string;
|
|
@@ -62,7 +62,10 @@ export declare const getRuntimeConfig: (config: WAFV2ClientConfig) => {
|
|
|
62
62
|
}
|
|
63
63
|
) => import("@aws-sdk/types").EndpointV2;
|
|
64
64
|
tls?: boolean | undefined;
|
|
65
|
-
retryStrategy?:
|
|
65
|
+
retryStrategy?:
|
|
66
|
+
| import("@aws-sdk/types").RetryStrategy
|
|
67
|
+
| import("@aws-sdk/types").RetryStrategyV2
|
|
68
|
+
| undefined;
|
|
66
69
|
credentials?:
|
|
67
70
|
| import("@aws-sdk/types").AwsCredentialIdentity
|
|
68
71
|
| import("@aws-sdk/types").Provider<
|
|
@@ -62,7 +62,10 @@ export declare const getRuntimeConfig: (config: WAFV2ClientConfig) => {
|
|
|
62
62
|
}
|
|
63
63
|
) => import("@aws-sdk/types").EndpointV2;
|
|
64
64
|
tls?: boolean | undefined;
|
|
65
|
-
retryStrategy?:
|
|
65
|
+
retryStrategy?:
|
|
66
|
+
| import("@aws-sdk/types").RetryStrategy
|
|
67
|
+
| import("@aws-sdk/types").RetryStrategyV2
|
|
68
|
+
| undefined;
|
|
66
69
|
credentials?:
|
|
67
70
|
| import("@aws-sdk/types").AwsCredentialIdentity
|
|
68
71
|
| import("@aws-sdk/types").Provider<
|
|
@@ -51,7 +51,10 @@ export declare const getRuntimeConfig: (config: WAFV2ClientConfig) => {
|
|
|
51
51
|
}
|
|
52
52
|
) => import("@aws-sdk/types").EndpointV2;
|
|
53
53
|
tls?: boolean | undefined;
|
|
54
|
-
retryStrategy?:
|
|
54
|
+
retryStrategy?:
|
|
55
|
+
| import("@aws-sdk/types").RetryStrategy
|
|
56
|
+
| import("@aws-sdk/types").RetryStrategyV2
|
|
57
|
+
| undefined;
|
|
55
58
|
credentials?:
|
|
56
59
|
| import("@aws-sdk/types").AwsCredentialIdentity
|
|
57
60
|
| import("@aws-sdk/types").Provider<
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-wafv2",
|
|
3
3
|
"description": "AWS SDK for JavaScript Wafv2 Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.231.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -19,9 +19,9 @@
|
|
|
19
19
|
"dependencies": {
|
|
20
20
|
"@aws-crypto/sha256-browser": "2.0.0",
|
|
21
21
|
"@aws-crypto/sha256-js": "2.0.0",
|
|
22
|
-
"@aws-sdk/client-sts": "3.
|
|
23
|
-
"@aws-sdk/config-resolver": "3.
|
|
24
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
22
|
+
"@aws-sdk/client-sts": "3.231.0",
|
|
23
|
+
"@aws-sdk/config-resolver": "3.231.0",
|
|
24
|
+
"@aws-sdk/credential-provider-node": "3.231.0",
|
|
25
25
|
"@aws-sdk/fetch-http-handler": "3.226.0",
|
|
26
26
|
"@aws-sdk/hash-node": "3.226.0",
|
|
27
27
|
"@aws-sdk/invalid-dependency": "3.226.0",
|
|
@@ -30,7 +30,7 @@
|
|
|
30
30
|
"@aws-sdk/middleware-host-header": "3.226.0",
|
|
31
31
|
"@aws-sdk/middleware-logger": "3.226.0",
|
|
32
32
|
"@aws-sdk/middleware-recursion-detection": "3.226.0",
|
|
33
|
-
"@aws-sdk/middleware-retry": "3.
|
|
33
|
+
"@aws-sdk/middleware-retry": "3.229.0",
|
|
34
34
|
"@aws-sdk/middleware-serde": "3.226.0",
|
|
35
35
|
"@aws-sdk/middleware-signing": "3.226.0",
|
|
36
36
|
"@aws-sdk/middleware-stack": "3.226.0",
|
|
@@ -45,8 +45,9 @@
|
|
|
45
45
|
"@aws-sdk/util-body-length-browser": "3.188.0",
|
|
46
46
|
"@aws-sdk/util-body-length-node": "3.208.0",
|
|
47
47
|
"@aws-sdk/util-defaults-mode-browser": "3.226.0",
|
|
48
|
-
"@aws-sdk/util-defaults-mode-node": "3.
|
|
48
|
+
"@aws-sdk/util-defaults-mode-node": "3.231.0",
|
|
49
49
|
"@aws-sdk/util-endpoints": "3.226.0",
|
|
50
|
+
"@aws-sdk/util-retry": "3.229.0",
|
|
50
51
|
"@aws-sdk/util-user-agent-browser": "3.226.0",
|
|
51
52
|
"@aws-sdk/util-user-agent-node": "3.226.0",
|
|
52
53
|
"@aws-sdk/util-utf8-browser": "3.188.0",
|