@aws-sdk/client-wafv2 3.524.0 → 3.529.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (73) hide show
  1. package/dist-cjs/index.js +63 -98
  2. package/dist-es/models/models_0.js +5 -0
  3. package/dist-es/protocols/Aws_json1_1.js +1 -40
  4. package/dist-types/commands/DescribeAllManagedProductsCommand.d.ts +21 -0
  5. package/dist-types/commands/GetDecryptedAPIKeyCommand.d.ts +6 -0
  6. package/dist-types/models/models_0.d.ts +127 -41
  7. package/dist-types/ts3.4/models/models_0.d.ts +5 -0
  8. package/package.json +17 -17
  9. package/dist-cjs/WAFV2.js +0 -1
  10. package/dist-cjs/WAFV2Client.js +0 -1
  11. package/dist-cjs/auth/httpAuthExtensionConfiguration.js +0 -1
  12. package/dist-cjs/commands/AssociateWebACLCommand.js +0 -1
  13. package/dist-cjs/commands/CheckCapacityCommand.js +0 -1
  14. package/dist-cjs/commands/CreateAPIKeyCommand.js +0 -1
  15. package/dist-cjs/commands/CreateIPSetCommand.js +0 -1
  16. package/dist-cjs/commands/CreateRegexPatternSetCommand.js +0 -1
  17. package/dist-cjs/commands/CreateRuleGroupCommand.js +0 -1
  18. package/dist-cjs/commands/CreateWebACLCommand.js +0 -1
  19. package/dist-cjs/commands/DeleteAPIKeyCommand.js +0 -1
  20. package/dist-cjs/commands/DeleteFirewallManagerRuleGroupsCommand.js +0 -1
  21. package/dist-cjs/commands/DeleteIPSetCommand.js +0 -1
  22. package/dist-cjs/commands/DeleteLoggingConfigurationCommand.js +0 -1
  23. package/dist-cjs/commands/DeletePermissionPolicyCommand.js +0 -1
  24. package/dist-cjs/commands/DeleteRegexPatternSetCommand.js +0 -1
  25. package/dist-cjs/commands/DeleteRuleGroupCommand.js +0 -1
  26. package/dist-cjs/commands/DeleteWebACLCommand.js +0 -1
  27. package/dist-cjs/commands/DescribeAllManagedProductsCommand.js +0 -1
  28. package/dist-cjs/commands/DescribeManagedProductsByVendorCommand.js +0 -1
  29. package/dist-cjs/commands/DescribeManagedRuleGroupCommand.js +0 -1
  30. package/dist-cjs/commands/DisassociateWebACLCommand.js +0 -1
  31. package/dist-cjs/commands/GenerateMobileSdkReleaseUrlCommand.js +0 -1
  32. package/dist-cjs/commands/GetDecryptedAPIKeyCommand.js +0 -1
  33. package/dist-cjs/commands/GetIPSetCommand.js +0 -1
  34. package/dist-cjs/commands/GetLoggingConfigurationCommand.js +0 -1
  35. package/dist-cjs/commands/GetManagedRuleSetCommand.js +0 -1
  36. package/dist-cjs/commands/GetMobileSdkReleaseCommand.js +0 -1
  37. package/dist-cjs/commands/GetPermissionPolicyCommand.js +0 -1
  38. package/dist-cjs/commands/GetRateBasedStatementManagedKeysCommand.js +0 -1
  39. package/dist-cjs/commands/GetRegexPatternSetCommand.js +0 -1
  40. package/dist-cjs/commands/GetRuleGroupCommand.js +0 -1
  41. package/dist-cjs/commands/GetSampledRequestsCommand.js +0 -1
  42. package/dist-cjs/commands/GetWebACLCommand.js +0 -1
  43. package/dist-cjs/commands/GetWebACLForResourceCommand.js +0 -1
  44. package/dist-cjs/commands/ListAPIKeysCommand.js +0 -1
  45. package/dist-cjs/commands/ListAvailableManagedRuleGroupVersionsCommand.js +0 -1
  46. package/dist-cjs/commands/ListAvailableManagedRuleGroupsCommand.js +0 -1
  47. package/dist-cjs/commands/ListIPSetsCommand.js +0 -1
  48. package/dist-cjs/commands/ListLoggingConfigurationsCommand.js +0 -1
  49. package/dist-cjs/commands/ListManagedRuleSetsCommand.js +0 -1
  50. package/dist-cjs/commands/ListMobileSdkReleasesCommand.js +0 -1
  51. package/dist-cjs/commands/ListRegexPatternSetsCommand.js +0 -1
  52. package/dist-cjs/commands/ListResourcesForWebACLCommand.js +0 -1
  53. package/dist-cjs/commands/ListRuleGroupsCommand.js +0 -1
  54. package/dist-cjs/commands/ListTagsForResourceCommand.js +0 -1
  55. package/dist-cjs/commands/ListWebACLsCommand.js +0 -1
  56. package/dist-cjs/commands/PutLoggingConfigurationCommand.js +0 -1
  57. package/dist-cjs/commands/PutManagedRuleSetVersionsCommand.js +0 -1
  58. package/dist-cjs/commands/PutPermissionPolicyCommand.js +0 -1
  59. package/dist-cjs/commands/TagResourceCommand.js +0 -1
  60. package/dist-cjs/commands/UntagResourceCommand.js +0 -1
  61. package/dist-cjs/commands/UpdateIPSetCommand.js +0 -1
  62. package/dist-cjs/commands/UpdateManagedRuleSetVersionExpiryDateCommand.js +0 -1
  63. package/dist-cjs/commands/UpdateRegexPatternSetCommand.js +0 -1
  64. package/dist-cjs/commands/UpdateRuleGroupCommand.js +0 -1
  65. package/dist-cjs/commands/UpdateWebACLCommand.js +0 -1
  66. package/dist-cjs/commands/index.js +0 -1
  67. package/dist-cjs/endpoint/EndpointParameters.js +0 -1
  68. package/dist-cjs/extensionConfiguration.js +0 -1
  69. package/dist-cjs/models/WAFV2ServiceException.js +0 -1
  70. package/dist-cjs/models/index.js +0 -1
  71. package/dist-cjs/models/models_0.js +0 -1
  72. package/dist-cjs/protocols/Aws_json1_1.js +0 -1
  73. package/dist-cjs/runtimeExtensions.js +0 -1
@@ -154,12 +154,19 @@ export type OversizeHandling = (typeof OversizeHandling)[keyof typeof OversizeHa
154
154
  export interface Body {
155
155
  /**
156
156
  * @public
157
- * <p>What WAF should do if the body is larger than WAF can inspect.
158
- * WAF does not support inspecting the entire contents of the web request body if the body
159
- * exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service
160
- * only forwards the contents that are below the limit to WAF for inspection. </p>
161
- * <p>The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions,
162
- * you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
157
+ * <p>What WAF should do if the body is larger than WAF can inspect. </p>
158
+ * <p>WAF does not support inspecting the entire contents of the web request body if the body
159
+ * exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service
160
+ * only forwards the contents that are within the limit to WAF for inspection. </p>
161
+ * <ul>
162
+ * <li>
163
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
164
+ * </li>
165
+ * <li>
166
+ * <p>For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and
167
+ * you can increase the limit for each resource type in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
168
+ * </li>
169
+ * </ul>
163
170
  * <p>The options for oversize handling are the following:</p>
164
171
  * <ul>
165
172
  * <li>
@@ -580,12 +587,19 @@ export interface JsonBody {
580
587
  InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
581
588
  /**
582
589
  * @public
583
- * <p>What WAF should do if the body is larger than WAF can inspect.
584
- * WAF does not support inspecting the entire contents of the web request body if the body
585
- * exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service
586
- * only forwards the contents that are below the limit to WAF for inspection. </p>
587
- * <p>The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions,
588
- * you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
590
+ * <p>What WAF should do if the body is larger than WAF can inspect. </p>
591
+ * <p>WAF does not support inspecting the entire contents of the web request body if the body
592
+ * exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service
593
+ * only forwards the contents that are within the limit to WAF for inspection. </p>
594
+ * <ul>
595
+ * <li>
596
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
597
+ * </li>
598
+ * <li>
599
+ * <p>For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and
600
+ * you can increase the limit for each resource type in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
601
+ * </li>
602
+ * </ul>
589
603
  * <p>The options for oversize handling are the following:</p>
590
604
  * <ul>
591
605
  * <li>
@@ -675,20 +689,39 @@ export interface UriPath {
675
689
  }
676
690
  /**
677
691
  * @public
678
- * <p>The part of the web request that you want WAF to inspect. Include the single
679
- * <code>FieldToMatch</code> type that you want to inspect, with additional specifications
680
- * as needed, according to the type. You specify a single request component in
681
- * <code>FieldToMatch</code> for each rule statement that requires it. To inspect more than
682
- * one component of the web request, create a separate rule statement for each
683
- * component.</p>
684
- * <p>Example JSON for a <code>QueryString</code> field to match: </p>
685
- * <p>
686
- * <code> "FieldToMatch": \{ "QueryString": \{\} \}</code>
687
- * </p>
688
- * <p>Example JSON for a <code>Method</code> field to match specification:</p>
689
- * <p>
690
- * <code> "FieldToMatch": \{ "Method": \{ "Name": "DELETE" \} \}</code>
691
- * </p>
692
+ * <p>Specifies a web request component to be used in a rule match statement or in a logging configuration. </p>
693
+ * <ul>
694
+ * <li>
695
+ * <p>In a rule statement, this is the part of the web request that you want WAF to inspect. Include the single
696
+ * <code>FieldToMatch</code> type that you want to inspect, with additional specifications
697
+ * as needed, according to the type. You specify a single request component in
698
+ * <code>FieldToMatch</code> for each rule statement that requires it. To inspect more than
699
+ * one component of the web request, create a separate rule statement for each
700
+ * component.</p>
701
+ * <p>Example JSON for a <code>QueryString</code> field to match: </p>
702
+ * <p>
703
+ * <code> "FieldToMatch": \{ "QueryString": \{\} \}</code>
704
+ * </p>
705
+ * <p>Example JSON for a <code>Method</code> field to match specification:</p>
706
+ * <p>
707
+ * <code> "FieldToMatch": \{ "Method": \{ "Name": "DELETE" \} \}</code>
708
+ * </p>
709
+ * </li>
710
+ * <li>
711
+ * <p>In a logging configuration, this is used in the <code>RedactedFields</code> property to specify a field to
712
+ * redact from the logging records. For this use case, note the following: </p>
713
+ * <ul>
714
+ * <li>
715
+ * <p>Even though all <code>FieldToMatch</code> settings
716
+ * are available, the only valid settings for field redaction are <code>UriPath</code>, <code>QueryString</code>, <code>SingleHeader</code>, and <code>Method</code>.</p>
717
+ * </li>
718
+ * <li>
719
+ * <p>In this documentation, the descriptions of the individual fields talk about specifying the web request component to inspect,
720
+ * but for field redaction, you are specifying the component type to redact from the logs. </p>
721
+ * </li>
722
+ * </ul>
723
+ * </li>
724
+ * </ul>
692
725
  */
693
726
  export interface FieldToMatch {
694
727
  /**
@@ -733,9 +766,18 @@ export interface FieldToMatch {
733
766
  * <p>Inspect the request body as plain text. The request body immediately follows the request
734
767
  * headers. This is the part of a request that contains any additional data that you want to
735
768
  * send to your web server as the HTTP request body, such as data from a form. </p>
736
- * <p>A limited amount of the request body is forwarded to WAF for
737
- * inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions,
738
- * you can increase the limit in the web ACL's <code>AssociationConfig</code>, for additional processing fees. </p>
769
+ * <p>WAF does not support inspecting the entire contents of the web request body if the body
770
+ * exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service
771
+ * only forwards the contents that are within the limit to WAF for inspection. </p>
772
+ * <ul>
773
+ * <li>
774
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
775
+ * </li>
776
+ * <li>
777
+ * <p>For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and
778
+ * you can increase the limit for each resource type in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
779
+ * </li>
780
+ * </ul>
739
781
  * <p>For information about how to handle oversized
740
782
  * request bodies, see the <code>Body</code> object configuration. </p>
741
783
  */
@@ -751,9 +793,18 @@ export interface FieldToMatch {
751
793
  * <p>Inspect the request body as JSON. The request body immediately follows the request
752
794
  * headers. This is the part of a request that contains any additional data that you want to
753
795
  * send to your web server as the HTTP request body, such as data from a form. </p>
754
- * <p>A limited amount of the request body is forwarded to WAF for
755
- * inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions,
756
- * you can increase the limit in the web ACL's <code>AssociationConfig</code>, for additional processing fees. </p>
796
+ * <p>WAF does not support inspecting the entire contents of the web request body if the body
797
+ * exceeds the limit for the resource type. When a web request body is larger than the limit, the underlying host service
798
+ * only forwards the contents that are within the limit to WAF for inspection. </p>
799
+ * <ul>
800
+ * <li>
801
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
802
+ * </li>
803
+ * <li>
804
+ * <p>For CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access, the default limit is 16 KB (16,384 bytes), and
805
+ * you can increase the limit for each resource type in the web ACL <code>AssociationConfig</code>, for additional processing fees. </p>
806
+ * </li>
807
+ * </ul>
757
808
  * <p>For information about how to handle oversized
758
809
  * request bodies, see the <code>JsonBody</code> object configuration. </p>
759
810
  */
@@ -2652,7 +2703,7 @@ export type ComparisonOperator = (typeof ComparisonOperator)[keyof typeof Compar
2652
2703
  /**
2653
2704
  * @public
2654
2705
  * <p>A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. </p>
2655
- * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.</p>
2706
+ * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes in the body up to the limit for the web ACL and protected resource type. If you know that the request body for your web requests should never exceed the inspection limit, you can use a size constraint statement to block requests that have a larger request body size. For more information about the inspection limits, see <code>Body</code> and <code>JsonBody</code> settings for the <code>FieldToMatch</code> data type. </p>
2656
2707
  * <p>If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI <code>/logo.jpg</code> is nine characters long.</p>
2657
2708
  */
2658
2709
  export interface SizeConstraintStatement {
@@ -2772,7 +2823,11 @@ export interface APIKeySummary {
2772
2823
  * @enum
2773
2824
  */
2774
2825
  export declare const AssociatedResourceType: {
2826
+ readonly API_GATEWAY: "API_GATEWAY";
2827
+ readonly APP_RUNNER_SERVICE: "APP_RUNNER_SERVICE";
2775
2828
  readonly CLOUDFRONT: "CLOUDFRONT";
2829
+ readonly COGNITO_USER_POOL: "COGNITO_USER_POOL";
2830
+ readonly VERIFIED_ACCESS_INSTANCE: "VERIFIED_ACCESS_INSTANCE";
2776
2831
  };
2777
2832
  /**
2778
2833
  * @public
@@ -3033,16 +3088,22 @@ export declare const SizeInspectionLimit: {
3033
3088
  export type SizeInspectionLimit = (typeof SizeInspectionLimit)[keyof typeof SizeInspectionLimit];
3034
3089
  /**
3035
3090
  * @public
3036
- * <p>Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). </p>
3091
+ * <p>Customizes the maximum size of the request body that your protected CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access resources forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You can change the setting for any of the available resource types. </p>
3037
3092
  * <note>
3038
3093
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
3039
3094
  * </note>
3095
+ * <p>Example JSON: <code> \{
3096
+ * "API_GATEWAY": "KB_48",
3097
+ * "APP_RUNNER_SERVICE": "KB_32"
3098
+ * \}</code>
3099
+ * </p>
3100
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
3040
3101
  * <p>This is used in the <code>AssociationConfig</code> of the web ACL. </p>
3041
3102
  */
3042
3103
  export interface RequestBodyAssociatedResourceTypeConfig {
3043
3104
  /**
3044
3105
  * @public
3045
- * <p>Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. </p>
3106
+ * <p>Specifies the maximum size of the web request body component that an associated CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resource should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. </p>
3046
3107
  * <p>Default: <code>16 KB (16,384 bytes)</code>
3047
3108
  * </p>
3048
3109
  */
@@ -3051,18 +3112,26 @@ export interface RequestBodyAssociatedResourceTypeConfig {
3051
3112
  /**
3052
3113
  * @public
3053
3114
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
3054
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
3115
+ * <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can
3116
+ * customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). </p>
3055
3117
  * <note>
3056
3118
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
3057
3119
  * </note>
3120
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
3058
3121
  */
3059
3122
  export interface AssociationConfig {
3060
3123
  /**
3061
3124
  * @public
3062
- * <p>Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). </p>
3125
+ * <p>Customizes the maximum size of the request body that your protected CloudFront, API Gateway, Amazon Cognito, App Runner, and Verified Access resources forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You can change the setting for any of the available resource types. </p>
3063
3126
  * <note>
3064
3127
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
3065
3128
  * </note>
3129
+ * <p>Example JSON: <code> \{
3130
+ * "API_GATEWAY": "KB_48",
3131
+ * "APP_RUNNER_SERVICE": "KB_32"
3132
+ * \}</code>
3133
+ * </p>
3134
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
3066
3135
  */
3067
3136
  RequestBody?: Partial<Record<AssociatedResourceType, RequestBodyAssociatedResourceTypeConfig>>;
3068
3137
  }
@@ -3248,6 +3317,11 @@ export declare class WAFLimitsExceededException extends __BaseException {
3248
3317
  readonly name: "WAFLimitsExceededException";
3249
3318
  readonly $fault: "client";
3250
3319
  Message?: string;
3320
+ /**
3321
+ * @public
3322
+ * <p>Source type for the exception. </p>
3323
+ */
3324
+ SourceType?: string;
3251
3325
  /**
3252
3326
  * @internal
3253
3327
  */
@@ -6806,7 +6880,7 @@ export interface Statement {
6806
6880
  /**
6807
6881
  * @public
6808
6882
  * <p>A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. </p>
6809
- * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL <code>AssociationConfig</code>, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size.</p>
6883
+ * <p>If you configure WAF to inspect the request body, WAF inspects only the number of bytes in the body up to the limit for the web ACL and protected resource type. If you know that the request body for your web requests should never exceed the inspection limit, you can use a size constraint statement to block requests that have a larger request body size. For more information about the inspection limits, see <code>Body</code> and <code>JsonBody</code> settings for the <code>FieldToMatch</code> data type. </p>
6810
6884
  * <p>If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI <code>/logo.jpg</code> is nine characters long.</p>
6811
6885
  */
6812
6886
  SizeConstraintStatement?: SizeConstraintStatement;
@@ -6849,6 +6923,9 @@ export interface Statement {
6849
6923
  /**
6850
6924
  * @public
6851
6925
  * <p>A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance. </p>
6926
+ * <note>
6927
+ * <p>If you change any of these settings in a rule that's currently in use, the change resets the rule's rate limiting counts. This can pause the rule's rate limiting activities for up to a minute. </p>
6928
+ * </note>
6852
6929
  * <p>You can specify individual aggregation keys, like IP address or HTTP method. You can also specify aggregation key combinations, like IP address and HTTP method, or HTTP method, query argument, and cookie. </p>
6853
6930
  * <p>Each unique set of values for the aggregation keys that you specify is a separate aggregation instance, with the value from each key contributing to the aggregation instance definition. </p>
6854
6931
  * <p>For example, assume the rule evaluates web requests with the following IP address and HTTP method values: </p>
@@ -7037,6 +7114,9 @@ export interface NotStatement {
7037
7114
  /**
7038
7115
  * @public
7039
7116
  * <p>A rate-based rule counts incoming requests and rate limits requests when they are coming at too fast a rate. The rule categorizes requests according to your aggregation criteria, collects them into aggregation instances, and counts and rate limits the requests for each instance. </p>
7117
+ * <note>
7118
+ * <p>If you change any of these settings in a rule that's currently in use, the change resets the rule's rate limiting counts. This can pause the rule's rate limiting activities for up to a minute. </p>
7119
+ * </note>
7040
7120
  * <p>You can specify individual aggregation keys, like IP address or HTTP method. You can also specify aggregation key combinations, like IP address and HTTP method, or HTTP method, query argument, and cookie. </p>
7041
7121
  * <p>Each unique set of values for the aggregation keys that you specify is a separate aggregation instance, with the value from each key contributing to the aggregation instance definition. </p>
7042
7122
  * <p>For example, assume the rule evaluates web requests with the following IP address and HTTP method values: </p>
@@ -7556,10 +7636,12 @@ export interface CreateWebACLRequest {
7556
7636
  /**
7557
7637
  * @public
7558
7638
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
7559
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
7639
+ * <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can
7640
+ * customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). </p>
7560
7641
  * <note>
7561
7642
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
7562
7643
  * </note>
7644
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
7563
7645
  */
7564
7646
  AssociationConfig?: AssociationConfig;
7565
7647
  }
@@ -7807,10 +7889,12 @@ export interface UpdateWebACLRequest {
7807
7889
  /**
7808
7890
  * @public
7809
7891
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
7810
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
7892
+ * <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can
7893
+ * customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). </p>
7811
7894
  * <note>
7812
7895
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
7813
7896
  * </note>
7897
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
7814
7898
  */
7815
7899
  AssociationConfig?: AssociationConfig;
7816
7900
  }
@@ -7964,10 +8048,12 @@ export interface WebACL {
7964
8048
  /**
7965
8049
  * @public
7966
8050
  * <p>Specifies custom configurations for the associations between the web ACL and protected resources. </p>
7967
- * <p>Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). </p>
8051
+ * <p>Use this to customize the maximum size of the request body that your protected resources forward to WAF for inspection. You can
8052
+ * customize this setting for CloudFront, API Gateway, Amazon Cognito, App Runner, or Verified Access resources. The default setting is 16 KB (16,384 bytes). </p>
7968
8053
  * <note>
7969
8054
  * <p>You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see <a href="http://aws.amazon.com/waf/pricing/">WAF Pricing</a>.</p>
7970
8055
  * </note>
8056
+ * <p>For Application Load Balancer and AppSync, the limit is fixed at 8 KB (8,192 bytes).</p>
7971
8057
  */
7972
8058
  AssociationConfig?: AssociationConfig;
7973
8059
  }
@@ -666,7 +666,11 @@ export interface APIKeySummary {
666
666
  Version?: number;
667
667
  }
668
668
  export declare const AssociatedResourceType: {
669
+ readonly API_GATEWAY: "API_GATEWAY";
670
+ readonly APP_RUNNER_SERVICE: "APP_RUNNER_SERVICE";
669
671
  readonly CLOUDFRONT: "CLOUDFRONT";
672
+ readonly COGNITO_USER_POOL: "COGNITO_USER_POOL";
673
+ readonly VERIFIED_ACCESS_INSTANCE: "VERIFIED_ACCESS_INSTANCE";
670
674
  };
671
675
  export type AssociatedResourceType =
672
676
  (typeof AssociatedResourceType)[keyof typeof AssociatedResourceType];
@@ -860,6 +864,7 @@ export declare class WAFLimitsExceededException extends __BaseException {
860
864
  readonly name: "WAFLimitsExceededException";
861
865
  readonly $fault: "client";
862
866
  Message?: string;
867
+ SourceType?: string;
863
868
  constructor(
864
869
  opts: __ExceptionOptionType<WAFLimitsExceededException, __BaseException>
865
870
  );
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-wafv2",
3
3
  "description": "AWS SDK for JavaScript Wafv2 Client for Node.js, Browser and React Native",
4
- "version": "3.524.0",
4
+ "version": "3.529.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "node ../../scripts/compilation/inline client-wafv2",
@@ -20,40 +20,40 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "3.0.0",
22
22
  "@aws-crypto/sha256-js": "3.0.0",
23
- "@aws-sdk/client-sts": "3.523.0",
24
- "@aws-sdk/core": "3.523.0",
25
- "@aws-sdk/credential-provider-node": "3.523.0",
23
+ "@aws-sdk/client-sts": "3.529.0",
24
+ "@aws-sdk/core": "3.529.0",
25
+ "@aws-sdk/credential-provider-node": "3.529.0",
26
26
  "@aws-sdk/middleware-host-header": "3.523.0",
27
27
  "@aws-sdk/middleware-logger": "3.523.0",
28
28
  "@aws-sdk/middleware-recursion-detection": "3.523.0",
29
- "@aws-sdk/middleware-user-agent": "3.523.0",
30
- "@aws-sdk/region-config-resolver": "3.523.0",
29
+ "@aws-sdk/middleware-user-agent": "3.525.0",
30
+ "@aws-sdk/region-config-resolver": "3.525.0",
31
31
  "@aws-sdk/types": "3.523.0",
32
- "@aws-sdk/util-endpoints": "3.523.0",
32
+ "@aws-sdk/util-endpoints": "3.525.0",
33
33
  "@aws-sdk/util-user-agent-browser": "3.523.0",
34
- "@aws-sdk/util-user-agent-node": "3.523.0",
35
- "@smithy/config-resolver": "^2.1.3",
36
- "@smithy/core": "^1.3.4",
34
+ "@aws-sdk/util-user-agent-node": "3.525.0",
35
+ "@smithy/config-resolver": "^2.1.4",
36
+ "@smithy/core": "^1.3.5",
37
37
  "@smithy/fetch-http-handler": "^2.4.3",
38
38
  "@smithy/hash-node": "^2.1.3",
39
39
  "@smithy/invalid-dependency": "^2.1.3",
40
40
  "@smithy/middleware-content-length": "^2.1.3",
41
- "@smithy/middleware-endpoint": "^2.4.3",
42
- "@smithy/middleware-retry": "^2.1.3",
41
+ "@smithy/middleware-endpoint": "^2.4.4",
42
+ "@smithy/middleware-retry": "^2.1.4",
43
43
  "@smithy/middleware-serde": "^2.1.3",
44
44
  "@smithy/middleware-stack": "^2.1.3",
45
- "@smithy/node-config-provider": "^2.2.3",
45
+ "@smithy/node-config-provider": "^2.2.4",
46
46
  "@smithy/node-http-handler": "^2.4.1",
47
47
  "@smithy/protocol-http": "^3.2.1",
48
- "@smithy/smithy-client": "^2.4.1",
48
+ "@smithy/smithy-client": "^2.4.2",
49
49
  "@smithy/types": "^2.10.1",
50
50
  "@smithy/url-parser": "^2.1.3",
51
51
  "@smithy/util-base64": "^2.1.1",
52
52
  "@smithy/util-body-length-browser": "^2.1.1",
53
53
  "@smithy/util-body-length-node": "^2.2.1",
54
- "@smithy/util-defaults-mode-browser": "^2.1.3",
55
- "@smithy/util-defaults-mode-node": "^2.2.2",
56
- "@smithy/util-endpoints": "^1.1.3",
54
+ "@smithy/util-defaults-mode-browser": "^2.1.4",
55
+ "@smithy/util-defaults-mode-node": "^2.2.3",
56
+ "@smithy/util-endpoints": "^1.1.4",
57
57
  "@smithy/util-middleware": "^2.1.3",
58
58
  "@smithy/util-retry": "^2.1.3",
59
59
  "@smithy/util-utf8": "^2.1.1",
package/dist-cjs/WAFV2.js DELETED
@@ -1 +0,0 @@
1
- module.exports = require("./index.js");
@@ -1 +0,0 @@
1
- module.exports = require("./index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");
@@ -1 +0,0 @@
1
- module.exports = require("../index.js");