@aws-sdk/client-wafv2 3.873.0 → 3.874.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/dist-cjs/index.js
CHANGED
|
@@ -2647,6 +2647,7 @@ var se_UpdateRuleGroupRequest = /* @__PURE__ */ __name((input, context) => {
|
|
|
2647
2647
|
}, "se_UpdateRuleGroupRequest");
|
|
2648
2648
|
var se_UpdateWebACLRequest = /* @__PURE__ */ __name((input, context) => {
|
|
2649
2649
|
return (0, import_smithy_client.take)(input, {
|
|
2650
|
+
ApplicationConfig: import_smithy_client._json,
|
|
2650
2651
|
AssociationConfig: import_smithy_client._json,
|
|
2651
2652
|
CaptchaConfig: import_smithy_client._json,
|
|
2652
2653
|
ChallengeConfig: import_smithy_client._json,
|
|
@@ -1440,6 +1440,7 @@ const se_UpdateRuleGroupRequest = (input, context) => {
|
|
|
1440
1440
|
};
|
|
1441
1441
|
const se_UpdateWebACLRequest = (input, context) => {
|
|
1442
1442
|
return take(input, {
|
|
1443
|
+
ApplicationConfig: _json,
|
|
1443
1444
|
AssociationConfig: _json,
|
|
1444
1445
|
CaptchaConfig: _json,
|
|
1445
1446
|
ChallengeConfig: _json,
|
|
@@ -1152,6 +1152,16 @@ declare const UpdateWebACLCommand_base: {
|
|
|
1152
1152
|
* OnSourceDDoSProtectionConfig: { // OnSourceDDoSProtectionConfig
|
|
1153
1153
|
* ALBLowReputationMode: "ACTIVE_UNDER_DDOS" || "ALWAYS_ON", // required
|
|
1154
1154
|
* },
|
|
1155
|
+
* ApplicationConfig: { // ApplicationConfig
|
|
1156
|
+
* Attributes: [ // ApplicationAttributes
|
|
1157
|
+
* { // ApplicationAttribute
|
|
1158
|
+
* Name: "STRING_VALUE",
|
|
1159
|
+
* Values: [ // AttributeValues
|
|
1160
|
+
* "STRING_VALUE",
|
|
1161
|
+
* ],
|
|
1162
|
+
* },
|
|
1163
|
+
* ],
|
|
1164
|
+
* },
|
|
1155
1165
|
* };
|
|
1156
1166
|
* const command = new UpdateWebACLCommand(input);
|
|
1157
1167
|
* const response = await client.send(command);
|
|
@@ -2735,7 +2735,7 @@ export interface RuleAction {
|
|
|
2735
2735
|
/**
|
|
2736
2736
|
* <p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>
|
|
2737
2737
|
* <note>
|
|
2738
|
-
* <p>
|
|
2738
|
+
* <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>
|
|
2739
2739
|
* </note>
|
|
2740
2740
|
* <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>
|
|
2741
2741
|
* @public
|
|
@@ -2744,7 +2744,7 @@ export interface RuleActionOverride {
|
|
|
2744
2744
|
/**
|
|
2745
2745
|
* <p>The name of the rule to override.</p>
|
|
2746
2746
|
* <note>
|
|
2747
|
-
* <p>
|
|
2747
|
+
* <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>
|
|
2748
2748
|
* </note>
|
|
2749
2749
|
* @public
|
|
2750
2750
|
*/
|
|
@@ -8639,6 +8639,21 @@ export interface UpdateWebACLRequest {
|
|
|
8639
8639
|
* @public
|
|
8640
8640
|
*/
|
|
8641
8641
|
OnSourceDDoSProtectionConfig?: OnSourceDDoSProtectionConfig | undefined;
|
|
8642
|
+
/**
|
|
8643
|
+
* <p>Configures the ability for the WAF console to store and retrieve application attributes.
|
|
8644
|
+
* Application attributes help WAF give recommendations for protection packs.</p>
|
|
8645
|
+
* <p>When using <code>UpdateWebACL</code>, <code>ApplicationConfig</code> follows these rules:</p>
|
|
8646
|
+
* <ul>
|
|
8647
|
+
* <li>
|
|
8648
|
+
* <p>If you omit <code>ApplicationConfig</code> from the request, all existing entries in the web ACL are retained.</p>
|
|
8649
|
+
* </li>
|
|
8650
|
+
* <li>
|
|
8651
|
+
* <p>If you include <code>ApplicationConfig</code>, entries must match the existing values exactly. Any attempt to modify existing entries will result in an error.</p>
|
|
8652
|
+
* </li>
|
|
8653
|
+
* </ul>
|
|
8654
|
+
* @public
|
|
8655
|
+
*/
|
|
8656
|
+
ApplicationConfig?: ApplicationConfig | undefined;
|
|
8642
8657
|
}
|
|
8643
8658
|
/**
|
|
8644
8659
|
* @public
|
|
@@ -1866,6 +1866,7 @@ export interface UpdateWebACLRequest {
|
|
|
1866
1866
|
TokenDomains?: string[] | undefined;
|
|
1867
1867
|
AssociationConfig?: AssociationConfig | undefined;
|
|
1868
1868
|
OnSourceDDoSProtectionConfig?: OnSourceDDoSProtectionConfig | undefined;
|
|
1869
|
+
ApplicationConfig?: ApplicationConfig | undefined;
|
|
1869
1870
|
}
|
|
1870
1871
|
export interface GetRuleGroupResponse {
|
|
1871
1872
|
RuleGroup?: RuleGroup | undefined;
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-wafv2",
|
|
3
3
|
"description": "AWS SDK for JavaScript Wafv2 Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.874.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "node ../../scripts/compilation/inline client-wafv2",
|