@aws-sdk/client-wafv2 3.405.0 → 3.408.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -3,5 +3,5 @@ Object.defineProperty(exports, "__esModule", { value: true });
3
3
  exports.ruleSet = void 0;
4
4
  const q = "required", r = "fn", s = "argv", t = "ref";
5
5
  const a = "isSet", b = "tree", c = "error", d = "endpoint", e = "PartitionResult", f = { [q]: false, "type": "String" }, g = { [q]: true, "default": false, "type": "Boolean" }, h = { [t]: "Endpoint" }, i = { [r]: "booleanEquals", [s]: [{ [t]: "UseFIPS" }, true] }, j = { [r]: "booleanEquals", [s]: [{ [t]: "UseDualStack" }, true] }, k = {}, l = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: e }, "supportsFIPS"] }] }, m = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: e }, "supportsDualStack"] }] }, n = [i], o = [j], p = [{ [t]: "Region" }];
6
- const _data = { version: "1.0", parameters: { Region: f, UseDualStack: g, UseFIPS: g, Endpoint: f }, rules: [{ conditions: [{ [r]: a, [s]: [h] }], type: b, rules: [{ conditions: n, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { type: b, rules: [{ conditions: o, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: h, properties: k, headers: k }, type: d }] }] }, { type: b, rules: [{ conditions: [{ [r]: a, [s]: p }], type: b, rules: [{ conditions: [{ [r]: "aws.partition", [s]: p, assign: e }], type: b, rules: [{ conditions: [i, j], type: b, rules: [{ conditions: [l, m], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: n, type: b, rules: [{ conditions: [l], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: o, type: b, rules: [{ conditions: [m], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { type: b, rules: [{ endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }] }, { error: "Invalid Configuration: Missing Region", type: c }] }] };
6
+ const _data = { version: "1.0", parameters: { Region: f, UseDualStack: g, UseFIPS: g, Endpoint: f }, rules: [{ conditions: [{ [r]: a, [s]: [h] }], type: b, rules: [{ conditions: n, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { conditions: o, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: h, properties: k, headers: k }, type: d }] }, { conditions: [{ [r]: a, [s]: p }], type: b, rules: [{ conditions: [{ [r]: "aws.partition", [s]: p, assign: e }], type: b, rules: [{ conditions: [i, j], type: b, rules: [{ conditions: [l, m], type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: n, type: b, rules: [{ conditions: [l], type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: o, type: b, rules: [{ conditions: [m], type: b, rules: [{ endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "Invalid Configuration: Missing Region", type: c }] };
7
7
  exports.ruleSet = _data;
@@ -1,4 +1,4 @@
1
1
  const q = "required", r = "fn", s = "argv", t = "ref";
2
2
  const a = "isSet", b = "tree", c = "error", d = "endpoint", e = "PartitionResult", f = { [q]: false, "type": "String" }, g = { [q]: true, "default": false, "type": "Boolean" }, h = { [t]: "Endpoint" }, i = { [r]: "booleanEquals", [s]: [{ [t]: "UseFIPS" }, true] }, j = { [r]: "booleanEquals", [s]: [{ [t]: "UseDualStack" }, true] }, k = {}, l = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: e }, "supportsFIPS"] }] }, m = { [r]: "booleanEquals", [s]: [true, { [r]: "getAttr", [s]: [{ [t]: e }, "supportsDualStack"] }] }, n = [i], o = [j], p = [{ [t]: "Region" }];
3
- const _data = { version: "1.0", parameters: { Region: f, UseDualStack: g, UseFIPS: g, Endpoint: f }, rules: [{ conditions: [{ [r]: a, [s]: [h] }], type: b, rules: [{ conditions: n, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { type: b, rules: [{ conditions: o, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: h, properties: k, headers: k }, type: d }] }] }, { type: b, rules: [{ conditions: [{ [r]: a, [s]: p }], type: b, rules: [{ conditions: [{ [r]: "aws.partition", [s]: p, assign: e }], type: b, rules: [{ conditions: [i, j], type: b, rules: [{ conditions: [l, m], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: n, type: b, rules: [{ conditions: [l], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: o, type: b, rules: [{ conditions: [m], type: b, rules: [{ type: b, rules: [{ endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { type: b, rules: [{ endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }] }, { error: "Invalid Configuration: Missing Region", type: c }] }] };
3
+ const _data = { version: "1.0", parameters: { Region: f, UseDualStack: g, UseFIPS: g, Endpoint: f }, rules: [{ conditions: [{ [r]: a, [s]: [h] }], type: b, rules: [{ conditions: n, error: "Invalid Configuration: FIPS and custom endpoint are not supported", type: c }, { conditions: o, error: "Invalid Configuration: Dualstack and custom endpoint are not supported", type: c }, { endpoint: { url: h, properties: k, headers: k }, type: d }] }, { conditions: [{ [r]: a, [s]: p }], type: b, rules: [{ conditions: [{ [r]: "aws.partition", [s]: p, assign: e }], type: b, rules: [{ conditions: [i, j], type: b, rules: [{ conditions: [l, m], type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "FIPS and DualStack are enabled, but this partition does not support one or both", type: c }] }, { conditions: n, type: b, rules: [{ conditions: [l], type: b, rules: [{ endpoint: { url: "https://wafv2-fips.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "FIPS is enabled but this partition does not support FIPS", type: c }] }, { conditions: o, type: b, rules: [{ conditions: [m], type: b, rules: [{ endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dualStackDnsSuffix}", properties: k, headers: k }, type: d }] }, { error: "DualStack is enabled but this partition does not support DualStack", type: c }] }, { endpoint: { url: "https://wafv2.{Region}.{PartitionResult#dnsSuffix}", properties: k, headers: k }, type: d }] }] }, { error: "Invalid Configuration: Missing Region", type: c }] };
4
4
  export const ruleSet = _data;
@@ -588,6 +588,7 @@ export interface CheckCapacityCommandOutput extends CheckCapacityResponse, __Met
588
588
  * },
589
589
  * AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
590
590
  * InspectionLevel: "COMMON" || "TARGETED", // required
591
+ * EnableMachineLearning: true || false,
591
592
  * },
592
593
  * AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
593
594
  * LoginPath: "STRING_VALUE", // required
@@ -804,6 +805,7 @@ export interface CheckCapacityCommandOutput extends CheckCapacityResponse, __Met
804
805
  * PasswordField: "<PasswordField>",
805
806
  * AWSManagedRulesBotControlRuleSet: {
806
807
  * InspectionLevel: "COMMON" || "TARGETED", // required
808
+ * EnableMachineLearning: true || false,
807
809
  * },
808
810
  * AWSManagedRulesATPRuleSet: {
809
811
  * LoginPath: "STRING_VALUE", // required
@@ -581,6 +581,7 @@ export interface CreateRuleGroupCommandOutput extends CreateRuleGroupResponse, _
581
581
  * },
582
582
  * AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
583
583
  * InspectionLevel: "COMMON" || "TARGETED", // required
584
+ * EnableMachineLearning: true || false,
584
585
  * },
585
586
  * AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
586
587
  * LoginPath: "STRING_VALUE", // required
@@ -797,6 +798,7 @@ export interface CreateRuleGroupCommandOutput extends CreateRuleGroupResponse, _
797
798
  * PasswordField: "<PasswordField>",
798
799
  * AWSManagedRulesBotControlRuleSet: {
799
800
  * InspectionLevel: "COMMON" || "TARGETED", // required
801
+ * EnableMachineLearning: true || false,
800
802
  * },
801
803
  * AWSManagedRulesATPRuleSet: {
802
804
  * LoginPath: "STRING_VALUE", // required
@@ -584,6 +584,7 @@ export interface CreateWebACLCommandOutput extends CreateWebACLResponse, __Metad
584
584
  * },
585
585
  * AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
586
586
  * InspectionLevel: "COMMON" || "TARGETED", // required
587
+ * EnableMachineLearning: true || false,
587
588
  * },
588
589
  * AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
589
590
  * LoginPath: "STRING_VALUE", // required
@@ -792,6 +793,7 @@ export interface CreateWebACLCommandOutput extends CreateWebACLResponse, __Metad
792
793
  * PasswordField: "<PasswordField>",
793
794
  * AWSManagedRulesBotControlRuleSet: {
794
795
  * InspectionLevel: "COMMON" || "TARGETED", // required
796
+ * EnableMachineLearning: true || false,
795
797
  * },
796
798
  * AWSManagedRulesATPRuleSet: {
797
799
  * LoginPath: "STRING_VALUE", // required
@@ -590,6 +590,7 @@ export interface GetRuleGroupCommandOutput extends GetRuleGroupResponse, __Metad
590
590
  * // },
591
591
  * // AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
592
592
  * // InspectionLevel: "COMMON" || "TARGETED", // required
593
+ * // EnableMachineLearning: true || false,
593
594
  * // },
594
595
  * // AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
595
596
  * // LoginPath: "STRING_VALUE", // required
@@ -806,6 +807,7 @@ export interface GetRuleGroupCommandOutput extends GetRuleGroupResponse, __Metad
806
807
  * // PasswordField: "<PasswordField>",
807
808
  * // AWSManagedRulesBotControlRuleSet: {
808
809
  * // InspectionLevel: "COMMON" || "TARGETED", // required
810
+ * // EnableMachineLearning: true || false,
809
811
  * // },
810
812
  * // AWSManagedRulesATPRuleSet: {
811
813
  * // LoginPath: "STRING_VALUE", // required
@@ -592,6 +592,7 @@ export interface GetWebACLCommandOutput extends GetWebACLResponse, __MetadataBea
592
592
  * // },
593
593
  * // AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
594
594
  * // InspectionLevel: "COMMON" || "TARGETED", // required
595
+ * // EnableMachineLearning: true || false,
595
596
  * // },
596
597
  * // AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
597
598
  * // LoginPath: "STRING_VALUE", // required
@@ -800,6 +801,7 @@ export interface GetWebACLCommandOutput extends GetWebACLResponse, __MetadataBea
800
801
  * // PasswordField: "<PasswordField>",
801
802
  * // AWSManagedRulesBotControlRuleSet: {
802
803
  * // InspectionLevel: "COMMON" || "TARGETED", // required
804
+ * // EnableMachineLearning: true || false,
803
805
  * // },
804
806
  * // AWSManagedRulesATPRuleSet: {
805
807
  * // LoginPath: "STRING_VALUE", // required
@@ -992,6 +994,7 @@ export interface GetWebACLCommandOutput extends GetWebACLResponse, __MetadataBea
992
994
  * // PasswordField: "<PasswordField>",
993
995
  * // AWSManagedRulesBotControlRuleSet: {
994
996
  * // InspectionLevel: "COMMON" || "TARGETED", // required
997
+ * // EnableMachineLearning: true || false,
995
998
  * // },
996
999
  * // AWSManagedRulesATPRuleSet: {
997
1000
  * // LoginPath: "STRING_VALUE", // required
@@ -1107,6 +1110,7 @@ export interface GetWebACLCommandOutput extends GetWebACLResponse, __MetadataBea
1107
1110
  * // PasswordField: "<PasswordField>",
1108
1111
  * // AWSManagedRulesBotControlRuleSet: {
1109
1112
  * // InspectionLevel: "COMMON" || "TARGETED", // required
1113
+ * // EnableMachineLearning: true || false,
1110
1114
  * // },
1111
1115
  * // AWSManagedRulesATPRuleSet: {
1112
1116
  * // LoginPath: "STRING_VALUE", // required
@@ -590,6 +590,7 @@ export interface GetWebACLForResourceCommandOutput extends GetWebACLForResourceR
590
590
  * // },
591
591
  * // AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
592
592
  * // InspectionLevel: "COMMON" || "TARGETED", // required
593
+ * // EnableMachineLearning: true || false,
593
594
  * // },
594
595
  * // AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
595
596
  * // LoginPath: "STRING_VALUE", // required
@@ -798,6 +799,7 @@ export interface GetWebACLForResourceCommandOutput extends GetWebACLForResourceR
798
799
  * // PasswordField: "<PasswordField>",
799
800
  * // AWSManagedRulesBotControlRuleSet: {
800
801
  * // InspectionLevel: "COMMON" || "TARGETED", // required
802
+ * // EnableMachineLearning: true || false,
801
803
  * // },
802
804
  * // AWSManagedRulesATPRuleSet: {
803
805
  * // LoginPath: "STRING_VALUE", // required
@@ -990,6 +992,7 @@ export interface GetWebACLForResourceCommandOutput extends GetWebACLForResourceR
990
992
  * // PasswordField: "<PasswordField>",
991
993
  * // AWSManagedRulesBotControlRuleSet: {
992
994
  * // InspectionLevel: "COMMON" || "TARGETED", // required
995
+ * // EnableMachineLearning: true || false,
993
996
  * // },
994
997
  * // AWSManagedRulesATPRuleSet: {
995
998
  * // LoginPath: "STRING_VALUE", // required
@@ -1105,6 +1108,7 @@ export interface GetWebACLForResourceCommandOutput extends GetWebACLForResourceR
1105
1108
  * // PasswordField: "<PasswordField>",
1106
1109
  * // AWSManagedRulesBotControlRuleSet: {
1107
1110
  * // InspectionLevel: "COMMON" || "TARGETED", // required
1111
+ * // EnableMachineLearning: true || false,
1108
1112
  * // },
1109
1113
  * // AWSManagedRulesATPRuleSet: {
1110
1114
  * // LoginPath: "STRING_VALUE", // required
@@ -598,6 +598,7 @@ export interface UpdateRuleGroupCommandOutput extends UpdateRuleGroupResponse, _
598
598
  * },
599
599
  * AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
600
600
  * InspectionLevel: "COMMON" || "TARGETED", // required
601
+ * EnableMachineLearning: true || false,
601
602
  * },
602
603
  * AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
603
604
  * LoginPath: "STRING_VALUE", // required
@@ -814,6 +815,7 @@ export interface UpdateRuleGroupCommandOutput extends UpdateRuleGroupResponse, _
814
815
  * PasswordField: "<PasswordField>",
815
816
  * AWSManagedRulesBotControlRuleSet: {
816
817
  * InspectionLevel: "COMMON" || "TARGETED", // required
818
+ * EnableMachineLearning: true || false,
817
819
  * },
818
820
  * AWSManagedRulesATPRuleSet: {
819
821
  * LoginPath: "STRING_VALUE", // required
@@ -603,6 +603,7 @@ export interface UpdateWebACLCommandOutput extends UpdateWebACLResponse, __Metad
603
603
  * },
604
604
  * AWSManagedRulesBotControlRuleSet: { // AWSManagedRulesBotControlRuleSet
605
605
  * InspectionLevel: "COMMON" || "TARGETED", // required
606
+ * EnableMachineLearning: true || false,
606
607
  * },
607
608
  * AWSManagedRulesATPRuleSet: { // AWSManagedRulesATPRuleSet
608
609
  * LoginPath: "STRING_VALUE", // required
@@ -811,6 +812,7 @@ export interface UpdateWebACLCommandOutput extends UpdateWebACLResponse, __Metad
811
812
  * PasswordField: "<PasswordField>",
812
813
  * AWSManagedRulesBotControlRuleSet: {
813
814
  * InspectionLevel: "COMMON" || "TARGETED", // required
815
+ * EnableMachineLearning: true || false,
814
816
  * },
815
817
  * AWSManagedRulesATPRuleSet: {
816
818
  * LoginPath: "STRING_VALUE", // required
@@ -158,7 +158,7 @@ export interface Body {
158
158
  * WAF does not support inspecting the entire contents of the web request body if the body
159
159
  * exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service
160
160
  * only forwards the contents that are below the limit to WAF for inspection. </p>
161
- * <p>The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions,
161
+ * <p>The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions,
162
162
  * you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
163
163
  * <p>The options for oversize handling are the following:</p>
164
164
  * <ul>
@@ -523,7 +523,7 @@ export interface JsonBody {
523
523
  * WAF does not support inspecting the entire contents of the web request body if the body
524
524
  * exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service
525
525
  * only forwards the contents that are below the limit to WAF for inspection. </p>
526
- * <p>The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions,
526
+ * <p>The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions,
527
527
  * you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
528
528
  * <p>The options for oversize handling are the following:</p>
529
529
  * <ul>
@@ -673,7 +673,7 @@ export interface FieldToMatch {
673
673
  * headers. This is the part of a request that contains any additional data that you want to
674
674
  * send to your web server as the HTTP request body, such as data from a form. </p>
675
675
  * <p>A limited amount of the request body is forwarded to WAF for
676
- * inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions,
676
+ * inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions,
677
677
  * you can increase the limit in the web ACL's <code>AssociationConfig</code>, for additional processing fees. </p>
678
678
  * <p>For information about how to handle oversized
679
679
  * request bodies, see the <code>Body</code> object configuration. </p>
@@ -691,7 +691,7 @@ export interface FieldToMatch {
691
691
  * headers. This is the part of a request that contains any additional data that you want to
692
692
  * send to your web server as the HTTP request body, such as data from a form. </p>
693
693
  * <p>A limited amount of the request body is forwarded to WAF for
694
- * inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions,
694
+ * inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions,
695
695
  * you can increase the limit in the web ACL's <code>AssociationConfig</code>, for additional processing fees. </p>
696
696
  * <p>For information about how to handle oversized
697
697
  * request bodies, see the <code>JsonBody</code> object configuration. </p>
@@ -2120,6 +2120,18 @@ export interface AWSManagedRulesBotControlRuleSet {
2120
2120
  * in the <i>WAF Developer Guide</i>.</p>
2121
2121
  */
2122
2122
  InspectionLevel: InspectionLevel | string | undefined;
2123
+ /**
2124
+ * @public
2125
+ * <p>Applies only to the targeted inspection level. </p>
2126
+ * <p>Determines whether to use machine learning (ML) to
2127
+ * analyze your web traffic for bot-related activity. Machine learning is required for the Bot Control rules <code>TGT_ML_CoordinatedActivityLow</code> and <code>TGT_ML_CoordinatedActivityMedium</code>, which
2128
+ * inspect for anomalous behavior that might indicate distributed, coordinated bot activity.</p>
2129
+ * <p>For more information about this choice, see the listing for these rules in the table at <a href="https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-bot.html#aws-managed-rule-groups-bot-rules">Bot Control rules listing</a> in the
2130
+ * <i>WAF Developer Guide</i>.</p>
2131
+ * <p>Default: <code>TRUE</code>
2132
+ * </p>
2133
+ */
2134
+ EnableMachineLearning?: boolean;
2123
2135
  }
2124
2136
  /**
2125
2137
  * @public
@@ -2705,7 +2717,7 @@ export type ComparisonOperator = (typeof ComparisonOperator)[keyof typeof Compar
2705
2717
  /**
2706
2718
  * @public
2707
2719
  * <p>A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. </p>
2708
- * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.</p>
2720
+ * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.</p>
2709
2721
  * <p>If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI <code>/logo.jpg</code> is nine characters long.</p>
2710
2722
  */
2711
2723
  export interface SizeConstraintStatement {
@@ -3086,7 +3098,7 @@ export declare const SizeInspectionLimit: {
3086
3098
  export type SizeInspectionLimit = (typeof SizeInspectionLimit)[keyof typeof SizeInspectionLimit];
3087
3099
  /**
3088
3100
  * @public
3089
- * <p>Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 kilobytes). </p>
3101
+ * <p>Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). </p>
3090
3102
  * <note>
3091
3103
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
3092
3104
  * </note>
@@ -3096,7 +3108,7 @@ export interface RequestBodyAssociatedResourceTypeConfig {
3096
3108
  /**
3097
3109
  * @public
3098
3110
  * <p>Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. </p>
3099
- * <p>Default: <code>16 KB (16,384 kilobytes)</code>
3111
+ * <p>Default: <code>16 KB (16,384 bytes)</code>
3100
3112
  * </p>
3101
3113
  */
3102
3114
  DefaultSizeInspectionLimit: SizeInspectionLimit | string | undefined;
@@ -3104,7 +3116,7 @@ export interface RequestBodyAssociatedResourceTypeConfig {
3104
3116
  /**
3105
3117
  * @public
3106
3118
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
3107
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). </p>
3119
+ * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
3108
3120
  * <note>
3109
3121
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
3110
3122
  * </note>
@@ -3112,7 +3124,7 @@ export interface RequestBodyAssociatedResourceTypeConfig {
3112
3124
  export interface AssociationConfig {
3113
3125
  /**
3114
3126
  * @public
3115
- * <p>Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 kilobytes). </p>
3127
+ * <p>Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). </p>
3116
3128
  * <note>
3117
3129
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
3118
3130
  * </note>
@@ -6830,7 +6842,7 @@ export interface Statement {
6830
6842
  /**
6831
6843
  * @public
6832
6844
  * <p>A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. </p>
6833
- * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.</p>
6845
+ * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.</p>
6834
6846
  * <p>If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI <code>/logo.jpg</code> is nine characters long.</p>
6835
6847
  */
6836
6848
  SizeConstraintStatement?: SizeConstraintStatement;
@@ -7214,8 +7226,10 @@ export interface RateBasedStatement {
7214
7226
  export interface Rule {
7215
7227
  /**
7216
7228
  * @public
7217
- * <p>The name of the rule. You can't change the name of a <code>Rule</code> after you create
7218
- * it. </p>
7229
+ * <p>The name of the rule. </p>
7230
+ * <p>If you change the name of a <code>Rule</code> after you create
7231
+ * it and you want the rule's metric name to reflect the change, update the metric name in the rule's <code>VisibilityConfig</code> settings. WAF
7232
+ * doesn't automatically update the metric name when you update the rule name. </p>
7219
7233
  */
7220
7234
  Name: string | undefined;
7221
7235
  /**
@@ -7289,6 +7303,9 @@ export interface Rule {
7289
7303
  /**
7290
7304
  * @public
7291
7305
  * <p>Defines and enables Amazon CloudWatch metrics and web request sample collection. </p>
7306
+ * <p>If you change the name of a <code>Rule</code> after you create
7307
+ * it and you want the rule's metric name to reflect the change, update the metric name as well. WAF
7308
+ * doesn't automatically update the metric name. </p>
7292
7309
  */
7293
7310
  VisibilityConfig: VisibilityConfig | undefined;
7294
7311
  /**
@@ -7562,7 +7579,7 @@ export interface CreateWebACLRequest {
7562
7579
  /**
7563
7580
  * @public
7564
7581
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
7565
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). </p>
7582
+ * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
7566
7583
  * <note>
7567
7584
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
7568
7585
  * </note>
@@ -7813,7 +7830,7 @@ export interface UpdateWebACLRequest {
7813
7830
  /**
7814
7831
  * @public
7815
7832
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
7816
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). </p>
7833
+ * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
7817
7834
  * <note>
7818
7835
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
7819
7836
  * </note>
@@ -7970,7 +7987,7 @@ export interface WebACL {
7970
7987
  /**
7971
7988
  * @public
7972
7989
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
7973
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). </p>
7990
+ * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
7974
7991
  * <note>
7975
7992
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
7976
7993
  * </note>
@@ -527,6 +527,7 @@ export type InspectionLevel =
527
527
  (typeof InspectionLevel)[keyof typeof InspectionLevel];
528
528
  export interface AWSManagedRulesBotControlRuleSet {
529
529
  InspectionLevel: InspectionLevel | string | undefined;
530
+ EnableMachineLearning?: boolean;
530
531
  }
531
532
  export interface ManagedRuleGroupConfig {
532
533
  LoginPath?: string;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-wafv2",
3
3
  "description": "AWS SDK for JavaScript Wafv2 Client for Node.js, Browser and React Native",
4
- "version": "3.405.0",
4
+ "version": "3.408.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -21,17 +21,17 @@
21
21
  "dependencies": {
22
22
  "@aws-crypto/sha256-browser": "3.0.0",
23
23
  "@aws-crypto/sha256-js": "3.0.0",
24
- "@aws-sdk/client-sts": "3.405.0",
25
- "@aws-sdk/credential-provider-node": "3.405.0",
26
- "@aws-sdk/middleware-host-header": "3.398.0",
27
- "@aws-sdk/middleware-logger": "3.398.0",
28
- "@aws-sdk/middleware-recursion-detection": "3.398.0",
29
- "@aws-sdk/middleware-signing": "3.398.0",
30
- "@aws-sdk/middleware-user-agent": "3.398.0",
31
- "@aws-sdk/types": "3.398.0",
32
- "@aws-sdk/util-endpoints": "3.398.0",
33
- "@aws-sdk/util-user-agent-browser": "3.398.0",
34
- "@aws-sdk/util-user-agent-node": "3.405.0",
24
+ "@aws-sdk/client-sts": "3.408.0",
25
+ "@aws-sdk/credential-provider-node": "3.408.0",
26
+ "@aws-sdk/middleware-host-header": "3.408.0",
27
+ "@aws-sdk/middleware-logger": "3.408.0",
28
+ "@aws-sdk/middleware-recursion-detection": "3.408.0",
29
+ "@aws-sdk/middleware-signing": "3.408.0",
30
+ "@aws-sdk/middleware-user-agent": "3.408.0",
31
+ "@aws-sdk/types": "3.408.0",
32
+ "@aws-sdk/util-endpoints": "3.408.0",
33
+ "@aws-sdk/util-user-agent-browser": "3.408.0",
34
+ "@aws-sdk/util-user-agent-node": "3.408.0",
35
35
  "@smithy/config-resolver": "^2.0.5",
36
36
  "@smithy/fetch-http-handler": "^2.0.5",
37
37
  "@smithy/hash-node": "^2.0.5",