aws-sdk 2.1386.0 → 2.1387.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +13 -1
- package/README.md +1 -1
- package/apis/chime-sdk-voice-2022-08-03.min.json +2 -1
- package/apis/glue-2017-03-31.min.json +510 -509
- package/apis/iotfleetwise-2021-06-17.min.json +86 -43
- package/apis/location-2020-11-19.min.json +23 -16
- package/apis/personalize-2018-05-22.min.json +32 -13
- package/apis/securityhub-2018-10-26.examples.json +140 -3
- package/apis/securityhub-2018-10-26.min.json +465 -158
- package/apis/securitylake-2018-05-10.min.json +457 -447
- package/apis/securitylake-2018-05-10.paginators.json +7 -7
- package/apis/wafv2-2019-07-29.min.json +168 -159
- package/clients/chimesdkvoice.d.ts +5 -0
- package/clients/glue.d.ts +29 -24
- package/clients/groundstation.d.ts +2 -2
- package/clients/iotfleetwise.d.ts +98 -13
- package/clients/location.d.ts +24 -8
- package/clients/memorydb.d.ts +2 -2
- package/clients/personalize.d.ts +34 -17
- package/clients/polly.d.ts +2 -2
- package/clients/securityhub.d.ts +539 -1
- package/clients/securitylake.d.ts +560 -541
- package/clients/wafv2.d.ts +16 -6
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +10 -10
- package/dist/aws-sdk.js +58 -32
- package/dist/aws-sdk.min.js +30 -30
- package/lib/core.js +1 -1
- package/package.json +1 -1
package/clients/wafv2.d.ts
CHANGED
@@ -514,7 +514,7 @@ declare namespace WAFV2 {
|
|
514
514
|
}
|
515
515
|
export interface Body {
|
516
516
|
/**
|
517
|
-
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the body normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
517
|
+
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
518
518
|
*/
|
519
519
|
OversizeHandling?: OversizeHandling;
|
520
520
|
}
|
@@ -522,7 +522,7 @@ declare namespace WAFV2 {
|
|
522
522
|
export type Boolean = boolean;
|
523
523
|
export interface ByteMatchStatement {
|
524
524
|
/**
|
525
|
-
* A string value that you want WAF to search for. WAF searches only in the part of web requests that you designate for inspection in FieldToMatch. The maximum length of the value is 200 bytes. Valid values depend on the component that you specify for inspection in FieldToMatch: Method: The HTTP method that you want WAF to search for. This indicates the type of operation specified in the request. UriPath: The value that you want WAF to search for in the URI path, for example, /images/daily-ad.jpg. If SearchString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 200 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent. If you want to search the User-Agent header for the value BadBot, you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90, in the value of SearchString. If you're using the CLI or one of the Amazon Web Services SDKs The value that you want WAF to search for. The SDK automatically base64 encodes the value.
|
525
|
+
* A string value that you want WAF to search for. WAF searches only in the part of web requests that you designate for inspection in FieldToMatch. The maximum length of the value is 200 bytes. Valid values depend on the component that you specify for inspection in FieldToMatch: Method: The HTTP method that you want WAF to search for. This indicates the type of operation specified in the request. UriPath: The value that you want WAF to search for in the URI path, for example, /images/daily-ad.jpg. HeaderOrder: The comma-separated list of header names to match for. WAF creates a string that contains the ordered list of header names, from the headers in the web request, and then matches against that string. If SearchString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 200 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent. If you want to search the User-Agent header for the value BadBot, you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90, in the value of SearchString. If you're using the CLI or one of the Amazon Web Services SDKs The value that you want WAF to search for. The SDK automatically base64 encodes the value.
|
526
526
|
*/
|
527
527
|
SearchString: SearchString;
|
528
528
|
/**
|
@@ -645,7 +645,7 @@ declare namespace WAFV2 {
|
|
645
645
|
*/
|
646
646
|
MatchScope: MapMatchScope;
|
647
647
|
/**
|
648
|
-
* What WAF should do if the cookies of the request are larger than WAF can inspect. WAF does not support inspecting the entire contents of request cookies when they exceed 8 KB (8192 bytes) or 200 total cookies. The underlying host service forwards a maximum of 200 cookies and at most 8 KB of cookie contents to WAF. The options for oversize handling are the following: CONTINUE - Inspect the cookies normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement.
|
648
|
+
* What WAF should do if the cookies of the request are more numerous or larger than WAF can inspect. WAF does not support inspecting the entire contents of request cookies when they exceed 8 KB (8192 bytes) or 200 total cookies. The underlying host service forwards a maximum of 200 cookies and at most 8 KB of cookie contents to WAF. The options for oversize handling are the following: CONTINUE - Inspect the available cookies normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement.
|
649
649
|
*/
|
650
650
|
OversizeHandling: OversizeHandling;
|
651
651
|
}
|
@@ -1109,6 +1109,10 @@ declare namespace WAFV2 {
|
|
1109
1109
|
* Inspect the request cookies. You must configure scope and pattern matching filters in the Cookies object, to define the set of cookies and the parts of the cookies that WAF inspects. Only the first 8 KB (8192 bytes) of a request's cookies and only the first 200 cookies are forwarded to WAF for inspection by the underlying host service. You must configure how to handle any oversize cookie content in the Cookies object. WAF applies the pattern matching filters to the cookies that it receives from the underlying host service.
|
1110
1110
|
*/
|
1111
1111
|
Cookies?: Cookies;
|
1112
|
+
/**
|
1113
|
+
* Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection. WAF generates the string and then uses that as the field to match component in its inspection. WAF separates the header names in the string using commas and no added spaces. Matches against the header order string are case insensitive.
|
1114
|
+
*/
|
1115
|
+
HeaderOrder?: HeaderOrder;
|
1112
1116
|
}
|
1113
1117
|
export type FieldToMatchData = string;
|
1114
1118
|
export interface Filter {
|
@@ -1522,6 +1526,12 @@ declare namespace WAFV2 {
|
|
1522
1526
|
}
|
1523
1527
|
export type HeaderName = string;
|
1524
1528
|
export type HeaderNames = FieldToMatchData[];
|
1529
|
+
export interface HeaderOrder {
|
1530
|
+
/**
|
1531
|
+
* What WAF should do if the headers of the request are more numerous or larger than WAF can inspect. WAF does not support inspecting the entire contents of request headers when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers and at most 8 KB of header contents to WAF. The options for oversize handling are the following: CONTINUE - Inspect the available headers normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement.
|
1532
|
+
*/
|
1533
|
+
OversizeHandling: OversizeHandling;
|
1534
|
+
}
|
1525
1535
|
export type HeaderValue = string;
|
1526
1536
|
export interface Headers {
|
1527
1537
|
/**
|
@@ -1533,7 +1543,7 @@ declare namespace WAFV2 {
|
|
1533
1543
|
*/
|
1534
1544
|
MatchScope: MapMatchScope;
|
1535
1545
|
/**
|
1536
|
-
* What WAF should do if the headers of the request are larger than WAF can inspect. WAF does not support inspecting the entire contents of request headers when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers and at most 8 KB of header contents to WAF. The options for oversize handling are the following: CONTINUE - Inspect the headers normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement.
|
1546
|
+
* What WAF should do if the headers of the request are more numerous or larger than WAF can inspect. WAF does not support inspecting the entire contents of request headers when they exceed 8 KB (8192 bytes) or 200 total headers. The underlying host service forwards a maximum of 200 headers and at most 8 KB of header contents to WAF. The options for oversize handling are the following: CONTINUE - Inspect the available headers normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement.
|
1537
1547
|
*/
|
1538
1548
|
OversizeHandling: OversizeHandling;
|
1539
1549
|
}
|
@@ -1635,7 +1645,7 @@ declare namespace WAFV2 {
|
|
1635
1645
|
*/
|
1636
1646
|
InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
|
1637
1647
|
/**
|
1638
|
-
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the body normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
1648
|
+
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
1639
1649
|
*/
|
1640
1650
|
OversizeHandling?: OversizeHandling;
|
1641
1651
|
}
|
@@ -3263,7 +3273,7 @@ declare namespace WAFV2 {
|
|
3263
3273
|
*/
|
3264
3274
|
SampledRequestsEnabled: Boolean;
|
3265
3275
|
/**
|
3266
|
-
* A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF Metrics in the WAF Developer Guide.
|
3276
|
+
* A boolean indicating whether the associated resource sends metrics to Amazon CloudWatch. For the list of available metrics, see WAF Metrics in the WAF Developer Guide. For web ACLs, the metrics are for web requests that have the web ACL default action applied. WAF applies the default action to web requests that pass the inspection of all rules in the web ACL without being either allowed or blocked. For more information, see The web ACL default action in the WAF Developer Guide.
|
3267
3277
|
*/
|
3268
3278
|
CloudWatchMetricsEnabled: Boolean;
|
3269
3279
|
/**
|