@propulsionworks/cloudformation 0.1.11 → 0.1.12
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/out/exports/resources.generated/aws-amplify-app.d.ts +2 -2
- package/out/exports/resources.generated/aws-apigateway-method.d.ts +1 -1
- package/out/exports/resources.generated/aws-appsync-apicache.d.ts +4 -0
- package/out/exports/resources.generated/aws-athena-workgroup.d.ts +37 -0
- package/out/exports/resources.generated/aws-bedrock-flow.d.ts +48 -21
- package/out/exports/resources.generated/aws-connect-emailaddress.d.ts +1 -1
- package/out/exports/resources.generated/aws-connect-queue.d.ts +1 -1
- package/out/exports/resources.generated/aws-customerprofiles-calculatedattributedefinition.d.ts +50 -1
- package/out/exports/resources.generated/aws-customerprofiles-objecttype.d.ts +13 -1
- package/out/exports/resources.generated/aws-customerprofiles-segmentdefinition.d.ts +4 -4
- package/out/exports/resources.generated/aws-deadline-fleet.d.ts +1 -0
- package/out/exports/resources.generated/aws-dsql-cluster.d.ts +17 -9
- package/out/exports/resources.generated/aws-ec2-ec2fleet.d.ts +55 -0
- package/out/exports/resources.generated/aws-ec2-egressonlyinternetgateway.d.ts +6 -1
- package/out/exports/resources.generated/aws-efs-mounttarget.d.ts +15 -3
- package/out/exports/resources.generated/aws-eks-addon.d.ts +3 -3
- package/out/exports/resources.generated/aws-eks-cluster.d.ts +14 -12
- package/out/exports/resources.generated/aws-eks-podidentityassociation.d.ts +24 -2
- package/out/exports/resources.generated/aws-entityresolution-matchingworkflow.d.ts +15 -5
- package/out/exports/resources.generated/aws-evs-environment.d.ts +62 -7
- package/out/exports/resources.generated/aws-fis-experimenttemplate.d.ts +1 -1
- package/out/exports/resources.generated/aws-kms-key.d.ts +1 -1
- package/out/exports/resources.generated/aws-lambda-eventinvokeconfig.d.ts +4 -2
- package/out/exports/resources.generated/aws-lambda-eventsourcemapping.d.ts +2 -2
- package/out/exports/resources.generated/aws-msk-cluster.d.ts +15 -1
- package/out/exports/resources.generated/aws-mwaa-environment.d.ts +10 -0
- package/out/exports/resources.generated/aws-networkfirewall-loggingconfiguration.d.ts +4 -0
- package/out/exports/resources.generated/aws-networkfirewall-vpcendpointassociation.d.ts +38 -6
- package/out/exports/resources.generated/aws-opsworkscm-server.d.ts +5 -5
- package/out/exports/resources.generated/aws-sagemaker-domain.d.ts +65 -0
- package/out/exports/resources.generated/aws-wafv2-rulegroup.d.ts +23 -1
- package/out/exports/resources.generated/aws-wafv2-webacl.d.ts +111 -4
- package/package.json +1 -1
|
@@ -98,9 +98,10 @@ export type WAFv2WebACLProps = {
|
|
|
98
98
|
*/
|
|
99
99
|
Name?: string | undefined;
|
|
100
100
|
/**
|
|
101
|
+
* Configures the level of DDoS protection that applies to web ACLs associated with Application Load Balancers.
|
|
101
102
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-onsourceddosprotectionconfig}
|
|
102
103
|
*/
|
|
103
|
-
OnSourceDDoSProtectionConfig?:
|
|
104
|
+
OnSourceDDoSProtectionConfig?: OnSourceDDoSProtectionConfig | undefined;
|
|
104
105
|
/**
|
|
105
106
|
* The rule statements used to identify the web requests that you want to manage. Each rule includes one top-level statement that AWS WAF uses to identify matching web requests, and parameters that govern how AWS WAF handles them.
|
|
106
107
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-wafv2-webacl.html#cfn-wafv2-webacl-rules}
|
|
@@ -167,6 +168,8 @@ export type WAFv2WebACLAttribs = {
|
|
|
167
168
|
};
|
|
168
169
|
/**
|
|
169
170
|
* Details for your use of the account creation fraud prevention managed rule group, `AWSManagedRulesACFPRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
|
|
171
|
+
*
|
|
172
|
+
* For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
|
|
170
173
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesacfpruleset.html}
|
|
171
174
|
*/
|
|
172
175
|
export type AWSManagedRulesACFPRuleSet = {
|
|
@@ -208,6 +211,8 @@ export type AWSManagedRulesACFPRuleSet = {
|
|
|
208
211
|
};
|
|
209
212
|
/**
|
|
210
213
|
* Details for your use of the account takeover prevention managed rule group, `AWSManagedRulesATPRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
|
|
214
|
+
*
|
|
215
|
+
* For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
|
|
211
216
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesatpruleset.html}
|
|
212
217
|
*/
|
|
213
218
|
export type AWSManagedRulesATPRuleSet = {
|
|
@@ -238,8 +243,25 @@ export type AWSManagedRulesATPRuleSet = {
|
|
|
238
243
|
*/
|
|
239
244
|
ResponseInspection?: ResponseInspection | undefined;
|
|
240
245
|
};
|
|
246
|
+
/**
|
|
247
|
+
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
248
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html}
|
|
249
|
+
*/
|
|
250
|
+
export type AWSManagedRulesAntiDDoSRuleSet = {
|
|
251
|
+
/**
|
|
252
|
+
* Client side action config for AntiDDOS AMR.
|
|
253
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-clientsideactionconfig}
|
|
254
|
+
*/
|
|
255
|
+
ClientSideActionConfig: ClientSideActionConfig;
|
|
256
|
+
/**
|
|
257
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesantiddosruleset.html#cfn-wafv2-webacl-awsmanagedrulesantiddosruleset-sensitivitytoblock}
|
|
258
|
+
*/
|
|
259
|
+
SensitivityToBlock?: SensitivityToAct | undefined;
|
|
260
|
+
};
|
|
241
261
|
/**
|
|
242
262
|
* Details for your use of the Bot Control managed rule group, `AWSManagedRulesBotControlRuleSet` . This configuration is used in `ManagedRuleGroupConfig` .
|
|
263
|
+
*
|
|
264
|
+
* For additional information about this and the other intelligent threat mitigation rule groups, see [Intelligent threat mitigation in AWS WAF](https://docs.aws.amazon.com/waf/latest/developerguide/waf-managed-protections) and [AWS Managed Rules rule groups list](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-list) in the *AWS WAF Developer Guide* .
|
|
243
265
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-awsmanagedrulesbotcontrolruleset.html}
|
|
244
266
|
*/
|
|
245
267
|
export type AWSManagedRulesBotControlRuleSet = {
|
|
@@ -287,6 +309,19 @@ export type AndStatement = {
|
|
|
287
309
|
*/
|
|
288
310
|
Statements: Statement[];
|
|
289
311
|
};
|
|
312
|
+
/**
|
|
313
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html}
|
|
314
|
+
*/
|
|
315
|
+
export type AsnMatchStatement = {
|
|
316
|
+
/**
|
|
317
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-asnlist}
|
|
318
|
+
*/
|
|
319
|
+
AsnList?: number[] | undefined;
|
|
320
|
+
/**
|
|
321
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-asnmatchstatement.html#cfn-wafv2-webacl-asnmatchstatement-forwardedipconfig}
|
|
322
|
+
*/
|
|
323
|
+
ForwardedIPConfig?: ForwardedIPConfiguration | undefined;
|
|
324
|
+
};
|
|
290
325
|
/**
|
|
291
326
|
* Specifies custom configurations for the associations between the web ACL and protected resources.
|
|
292
327
|
*
|
|
@@ -501,6 +536,35 @@ export type ChallengeConfig = {
|
|
|
501
536
|
*/
|
|
502
537
|
ImmunityTimeProperty?: ImmunityTimeProperty | undefined;
|
|
503
538
|
};
|
|
539
|
+
/**
|
|
540
|
+
* Client side action config for AntiDDOS AMR.
|
|
541
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html}
|
|
542
|
+
*/
|
|
543
|
+
export type ClientSideAction = {
|
|
544
|
+
/**
|
|
545
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-exempturiregularexpressions}
|
|
546
|
+
*/
|
|
547
|
+
ExemptUriRegularExpressions?: Regex[] | undefined;
|
|
548
|
+
/**
|
|
549
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-sensitivity}
|
|
550
|
+
*/
|
|
551
|
+
Sensitivity?: SensitivityToAct | undefined;
|
|
552
|
+
/**
|
|
553
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideaction.html#cfn-wafv2-webacl-clientsideaction-usageofaction}
|
|
554
|
+
*/
|
|
555
|
+
UsageOfAction: UsageOfAction;
|
|
556
|
+
};
|
|
557
|
+
/**
|
|
558
|
+
* Client side action config for AntiDDOS AMR.
|
|
559
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html}
|
|
560
|
+
*/
|
|
561
|
+
export type ClientSideActionConfig = {
|
|
562
|
+
/**
|
|
563
|
+
* Client side action config for AntiDDOS AMR.
|
|
564
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-clientsideactionconfig.html#cfn-wafv2-webacl-clientsideactionconfig-challenge}
|
|
565
|
+
*/
|
|
566
|
+
Challenge: ClientSideAction;
|
|
567
|
+
};
|
|
504
568
|
/**
|
|
505
569
|
* The filter to use to identify the subset of cookies to inspect in a web request.
|
|
506
570
|
*
|
|
@@ -906,7 +970,7 @@ export type FieldToProtect = {
|
|
|
906
970
|
*
|
|
907
971
|
* > If the specified header isn't present in the request, AWS WAF doesn't apply the rule to the web request at all.
|
|
908
972
|
*
|
|
909
|
-
* This configuration is used for `GeoMatchStatement` and `RateBasedStatement` . For `IPSetReferenceStatement` , use `IPSetForwardedIPConfig` instead.
|
|
973
|
+
* This configuration is used for `GeoMatchStatement` , `AsnMatchStatement` , and `RateBasedStatement` . For `IPSetReferenceStatement` , use `IPSetForwardedIPConfig` instead.
|
|
910
974
|
*
|
|
911
975
|
* AWS WAF only evaluates the first IP address found in the specified HTTP header.
|
|
912
976
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-forwardedipconfiguration.html}
|
|
@@ -1302,6 +1366,11 @@ export type ManagedRuleGroupConfig = {
|
|
|
1302
1366
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesatpruleset}
|
|
1303
1367
|
*/
|
|
1304
1368
|
AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet | undefined;
|
|
1369
|
+
/**
|
|
1370
|
+
* Configures how to use the AntiDDOS AWS managed rule group in the web ACL
|
|
1371
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesantiddosruleset}
|
|
1372
|
+
*/
|
|
1373
|
+
AWSManagedRulesAntiDDoSRuleSet?: AWSManagedRulesAntiDDoSRuleSet | undefined;
|
|
1305
1374
|
/**
|
|
1306
1375
|
* Additional configuration for using the Bot Control managed rule group. Use this to specify the inspection level that you want to use. For information about using the Bot Control managed rule group, see [AWS WAF Bot Control rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-bot.html) and [AWS WAF Bot Control](https://docs.aws.amazon.com/waf/latest/developerguide/waf-bot-control.html) in the *AWS WAF Developer Guide* .
|
|
1307
1376
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupconfig.html#cfn-wafv2-webacl-managedrulegroupconfig-awsmanagedrulesbotcontrolruleset}
|
|
@@ -1353,6 +1422,7 @@ export type ManagedRuleGroupStatement = {
|
|
|
1353
1422
|
* The rule groups used for intelligent threat mitigation require additional configuration:
|
|
1354
1423
|
*
|
|
1355
1424
|
* - Use the `AWSManagedRulesACFPRuleSet` configuration object to configure the account creation fraud prevention managed rule group. The configuration includes the registration and sign-up pages of your application and the locations in the account creation request payload of data, such as the user email and phone number fields.
|
|
1425
|
+
* - Use the `AWSManagedRulesAntiDDoSRuleSet` configuration object to configure the anti-DDoS managed rule group. The configuration includes the sensitivity levels to use in the rules that typically block and challenge requests that might be participating in DDoS attacks and the specification to use to indicate whether a request can handle a silent browser challenge.
|
|
1356
1426
|
* - Use the `AWSManagedRulesATPRuleSet` configuration object to configure the account takeover prevention managed rule group. The configuration includes the sign-in page of your application and the locations in the login request payload of data such as the username and password.
|
|
1357
1427
|
* - Use the `AWSManagedRulesBotControlRuleSet` configuration object to configure the protection level that you want the Bot Control rule group to use.
|
|
1358
1428
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupstatement.html#cfn-wafv2-webacl-managedrulegroupstatement-managedrulegroupconfigs}
|
|
@@ -1366,7 +1436,7 @@ export type ManagedRuleGroupStatement = {
|
|
|
1366
1436
|
/**
|
|
1367
1437
|
* Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change.
|
|
1368
1438
|
*
|
|
1369
|
-
* >
|
|
1439
|
+
* > Verify the rule names in your overrides carefully. With managed rule groups, AWS WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.
|
|
1370
1440
|
*
|
|
1371
1441
|
* You can use overrides for testing, for example you can override all of rule actions to `Count` and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
|
|
1372
1442
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-managedrulegroupstatement.html#cfn-wafv2-webacl-managedrulegroupstatement-ruleactionoverrides}
|
|
@@ -1407,6 +1477,16 @@ export type NotStatement = {
|
|
|
1407
1477
|
*/
|
|
1408
1478
|
Statement: Statement;
|
|
1409
1479
|
};
|
|
1480
|
+
/**
|
|
1481
|
+
* Configures the options for on-source DDoS protection provided by supported resource type.
|
|
1482
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html}
|
|
1483
|
+
*/
|
|
1484
|
+
export type OnSourceDDoSProtectionConfig = {
|
|
1485
|
+
/**
|
|
1486
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-onsourceddosprotectionconfig.html#cfn-wafv2-webacl-onsourceddosprotectionconfig-alblowreputationmode}
|
|
1487
|
+
*/
|
|
1488
|
+
ALBLowReputationMode: "ACTIVE_UNDER_DDOS" | "ALWAYS_ON";
|
|
1489
|
+
};
|
|
1410
1490
|
/**
|
|
1411
1491
|
* A logical rule statement used to combine other rule statements with OR logic. You provide more than one `Statement` within the `OrStatement` .
|
|
1412
1492
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-orstatement.html}
|
|
@@ -1566,6 +1646,11 @@ export type RateBasedStatement = {
|
|
|
1566
1646
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html}
|
|
1567
1647
|
*/
|
|
1568
1648
|
export type RateBasedStatementCustomKey = {
|
|
1649
|
+
/**
|
|
1650
|
+
* Specifies the request's ASN as an aggregate key for a rate-based rule.
|
|
1651
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-asn}
|
|
1652
|
+
*/
|
|
1653
|
+
ASN?: Record<string, unknown> | undefined;
|
|
1569
1654
|
/**
|
|
1570
1655
|
* Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
|
|
1571
1656
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-ratebasedstatementcustomkey.html#cfn-wafv2-webacl-ratebasedstatementcustomkey-cookie}
|
|
@@ -1759,6 +1844,16 @@ export type RateLimitUriPath = {
|
|
|
1759
1844
|
*/
|
|
1760
1845
|
TextTransformations: TextTransformation[];
|
|
1761
1846
|
};
|
|
1847
|
+
/**
|
|
1848
|
+
* Regex
|
|
1849
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html}
|
|
1850
|
+
*/
|
|
1851
|
+
export type Regex = {
|
|
1852
|
+
/**
|
|
1853
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regex.html#cfn-wafv2-webacl-regex-regexstring}
|
|
1854
|
+
*/
|
|
1855
|
+
RegexString?: string | undefined;
|
|
1856
|
+
};
|
|
1762
1857
|
/**
|
|
1763
1858
|
* A rule statement used to search web request components for a match against a single regular expression.
|
|
1764
1859
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-regexmatchstatement.html}
|
|
@@ -2271,7 +2366,7 @@ export type RuleGroupReferenceStatement = {
|
|
|
2271
2366
|
/**
|
|
2272
2367
|
* Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change.
|
|
2273
2368
|
*
|
|
2274
|
-
* >
|
|
2369
|
+
* > Verify the rule names in your overrides carefully. With managed rule groups, AWS WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.
|
|
2275
2370
|
*
|
|
2276
2371
|
* You can use overrides for testing, for example you can override all of rule actions to `Count` and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
|
|
2277
2372
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-rulegroupreferencestatement.html#cfn-wafv2-webacl-rulegroupreferencestatement-ruleactionoverrides}
|
|
@@ -2288,6 +2383,10 @@ export type Scope = "CLOUDFRONT" | "REGIONAL";
|
|
|
2288
2383
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-sensitivitylevel.html}
|
|
2289
2384
|
*/
|
|
2290
2385
|
export type SensitivityLevel = "LOW" | "HIGH";
|
|
2386
|
+
/**
|
|
2387
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-sensitivitytoact.html}
|
|
2388
|
+
*/
|
|
2389
|
+
export type SensitivityToAct = "LOW" | "MEDIUM" | "HIGH";
|
|
2291
2390
|
/**
|
|
2292
2391
|
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes.
|
|
2293
2392
|
*
|
|
@@ -2361,6 +2460,10 @@ export type Statement = {
|
|
|
2361
2460
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-andstatement}
|
|
2362
2461
|
*/
|
|
2363
2462
|
AndStatement?: AndStatement | undefined;
|
|
2463
|
+
/**
|
|
2464
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-asnmatchstatement}
|
|
2465
|
+
*/
|
|
2466
|
+
AsnMatchStatement?: AsnMatchStatement | undefined;
|
|
2364
2467
|
/**
|
|
2365
2468
|
* A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
|
|
2366
2469
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-statement.html#cfn-wafv2-webacl-statement-bytematchstatement}
|
|
@@ -2546,6 +2649,10 @@ export type UriFragment = {
|
|
|
2546
2649
|
*/
|
|
2547
2650
|
FallbackBehavior?: "MATCH" | "NO_MATCH" | undefined;
|
|
2548
2651
|
};
|
|
2652
|
+
/**
|
|
2653
|
+
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-usageofaction.html}
|
|
2654
|
+
*/
|
|
2655
|
+
export type UsageOfAction = "ENABLED" | "DISABLED";
|
|
2549
2656
|
/**
|
|
2550
2657
|
* Defines and enables Amazon CloudWatch metrics and web request sample collection.
|
|
2551
2658
|
* @see {@link https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-wafv2-webacl-visibilityconfig.html}
|