aws-sdk 2.1396.0 → 2.1397.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (45) hide show
  1. package/CHANGELOG.md +14 -1
  2. package/README.md +1 -1
  3. package/apis/cloudtrail-2013-11-01.min.json +33 -33
  4. package/apis/codeguru-security-2018-05-10.examples.json +5 -0
  5. package/apis/codeguru-security-2018-05-10.min.json +703 -0
  6. package/apis/codeguru-security-2018-05-10.paginators.json +22 -0
  7. package/apis/drs-2020-02-26.min.json +392 -97
  8. package/apis/drs-2020-02-26.paginators.json +6 -0
  9. package/apis/ec2-2016-11-15.min.json +1178 -1013
  10. package/apis/ec2-2016-11-15.paginators.json +6 -0
  11. package/apis/lightsail-2016-11-28.min.json +4 -2
  12. package/apis/metadata.json +7 -0
  13. package/apis/s3-2006-03-01.examples.json +121 -121
  14. package/apis/securityhub-2018-10-26.examples.json +276 -0
  15. package/apis/securityhub-2018-10-26.min.json +957 -559
  16. package/apis/verifiedpermissions-2021-12-01.examples.json +5 -0
  17. package/apis/verifiedpermissions-2021-12-01.min.json +1215 -0
  18. package/apis/verifiedpermissions-2021-12-01.paginators.json +28 -0
  19. package/apis/verifiedpermissions-2021-12-01.waiters2.json +5 -0
  20. package/apis/wafv2-2019-07-29.min.json +241 -169
  21. package/apis/wellarchitected-2020-03-31.min.json +655 -75
  22. package/apis/wellarchitected-2020-03-31.paginators.json +15 -0
  23. package/clients/all.d.ts +2 -0
  24. package/clients/all.js +3 -1
  25. package/clients/cloudtrail.d.ts +28 -13
  26. package/clients/codegurusecurity.d.ts +761 -0
  27. package/clients/codegurusecurity.js +18 -0
  28. package/clients/drs.d.ts +354 -3
  29. package/clients/ec2.d.ts +225 -48
  30. package/clients/imagebuilder.d.ts +1 -1
  31. package/clients/lightsail.d.ts +12 -4
  32. package/clients/s3.d.ts +1 -1
  33. package/clients/securityhub.d.ts +470 -0
  34. package/clients/simspaceweaver.d.ts +2 -2
  35. package/clients/verifiedpermissions.d.ts +1392 -0
  36. package/clients/verifiedpermissions.js +19 -0
  37. package/clients/wafv2.d.ts +105 -27
  38. package/clients/wellarchitected.d.ts +533 -7
  39. package/dist/aws-sdk-core-react-native.js +2 -2
  40. package/dist/aws-sdk-react-native.js +95 -14
  41. package/dist/aws-sdk.js +1227 -1049
  42. package/dist/aws-sdk.min.js +80 -80
  43. package/lib/config_service_placeholders.d.ts +4 -0
  44. package/lib/core.js +1 -1
  45. package/package.json +1 -1
@@ -0,0 +1,19 @@
1
+ require('../lib/node_loader');
2
+ var AWS = require('../lib/core');
3
+ var Service = AWS.Service;
4
+ var apiLoader = AWS.apiLoader;
5
+
6
+ apiLoader.services['verifiedpermissions'] = {};
7
+ AWS.VerifiedPermissions = Service.defineService('verifiedpermissions', ['2021-12-01']);
8
+ Object.defineProperty(apiLoader.services['verifiedpermissions'], '2021-12-01', {
9
+ get: function get() {
10
+ var model = require('../apis/verifiedpermissions-2021-12-01.min.json');
11
+ model.paginators = require('../apis/verifiedpermissions-2021-12-01.paginators.json').pagination;
12
+ model.waiters = require('../apis/verifiedpermissions-2021-12-01.waiters2.json').waiters;
13
+ return model;
14
+ },
15
+ enumerable: true,
16
+ configurable: true
17
+ });
18
+
19
+ module.exports = AWS.VerifiedPermissions;
@@ -459,6 +459,28 @@ declare namespace WAFV2 {
459
459
  }
460
460
  export type APIKeyTokenDomains = TokenDomain[];
461
461
  export type APIKeyVersion = number;
462
+ export interface AWSManagedRulesACFPRuleSet {
463
+ /**
464
+ * The path of the account creation endpoint for your application. This is the page on your website that accepts the completed registration form for a new user. This page must accept POST requests. For example, for the URL https://example.com/web/signup, you would provide the path /web/signup.
465
+ */
466
+ CreationPath: CreationPathString;
467
+ /**
468
+ * The path of the account registration endpoint for your application. This is the page on your website that presents the registration form to new users. This page must accept GET text/html requests. For example, for the URL https://example.com/web/register, you would provide the path /web/register.
469
+ */
470
+ RegistrationPagePath: RegistrationPagePathString;
471
+ /**
472
+ * The criteria for inspecting account creation requests, used by the ACFP rule group to validate and track account creation attempts.
473
+ */
474
+ RequestInspection: RequestInspectionACFP;
475
+ /**
476
+ * The criteria for inspecting responses to account creation requests, used by the ACFP rule group to track account creation success rates. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions. The ACFP rule group evaluates the responses that your protected resources send back to client account creation attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that have had too many successful account creation attempts in a short amount of time.
477
+ */
478
+ ResponseInspection?: ResponseInspection;
479
+ /**
480
+ * Allow the use of regular expressions in the registration page path and the account creation path.
481
+ */
482
+ EnableRegexInPath?: Boolean;
483
+ }
462
484
  export interface AWSManagedRulesATPRuleSet {
463
485
  /**
464
486
  * The path of the login endpoint for your application. For example, for the URL https://example.com/web/login, you would provide the path /web/login. The rule group inspects only HTTP POST requests to your specified login endpoint.
@@ -469,9 +491,13 @@ declare namespace WAFV2 {
469
491
  */
470
492
  RequestInspection?: RequestInspection;
471
493
  /**
472
- * The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that submit too many failed login attempts in a short amount of time. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions.
494
+ * The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts for each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that have had too many failed login attempts in a short amount of time.
473
495
  */
474
496
  ResponseInspection?: ResponseInspection;
497
+ /**
498
+ * Allow the use of regular expressions in the login page path.
499
+ */
500
+ EnableRegexInPath?: Boolean;
475
501
  }
476
502
  export interface AWSManagedRulesBotControlRuleSet {
477
503
  /**
@@ -487,6 +513,13 @@ declare namespace WAFV2 {
487
513
  Action: ActionValue;
488
514
  }
489
515
  export type ActionValue = "ALLOW"|"BLOCK"|"COUNT"|"CAPTCHA"|"CHALLENGE"|"EXCLUDED_AS_COUNT"|string;
516
+ export interface AddressField {
517
+ /**
518
+ * The name of a single primary address field. How you specify the address fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryaddressline1": "THE_ADDRESS1", "primaryaddressline2": "THE_ADDRESS2", "primaryaddressline3": "THE_ADDRESS3" } }, the address field idenfiers are /form/primaryaddressline1, /form/primaryaddressline2, and /form/primaryaddressline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryaddressline1, primaryaddressline2, and primaryaddressline3, the address fields identifiers are primaryaddressline1, primaryaddressline2, and primaryaddressline3.
519
+ */
520
+ Identifier: FieldIdentifier;
521
+ }
522
+ export type AddressFields = AddressField[];
490
523
  export interface All {
491
524
  }
492
525
  export interface AllQueryArguments {
@@ -846,6 +879,7 @@ declare namespace WAFV2 {
846
879
  */
847
880
  Summary?: WebACLSummary;
848
881
  }
882
+ export type CreationPathString = string;
849
883
  export interface CustomHTTPHeader {
850
884
  /**
851
885
  * The name of the custom header. For custom request header insertion, when WAF inserts the header into the request, it prefixes this name x-amzn-waf-, to avoid confusion with the headers that are already in the request. For example, for the header name sample, WAF inserts the header x-amzn-waf-sample.
@@ -1097,6 +1131,12 @@ declare namespace WAFV2 {
1097
1131
  export interface DisassociateWebACLResponse {
1098
1132
  }
1099
1133
  export type DownloadUrl = string;
1134
+ export interface EmailField {
1135
+ /**
1136
+ * The name of the email field. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "email": "THE_EMAIL" } }, the email field specification is /form/email. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named email1, the email field specification is email1.
1137
+ */
1138
+ Identifier: FieldIdentifier;
1139
+ }
1100
1140
  export type EntityDescription = string;
1101
1141
  export type EntityId = string;
1102
1142
  export type EntityName = string;
@@ -1154,7 +1194,7 @@ declare namespace WAFV2 {
1154
1194
  */
1155
1195
  Cookies?: Cookies;
1156
1196
  /**
1157
- * Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection. WAF generates the string and then uses that as the field to match component in its inspection. WAF separates the header names in the string using commas and no added spaces. Matches against the header order string are case insensitive.
1197
+ * Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection. WAF generates the string and then uses that as the field to match component in its inspection. WAF separates the header names in the string using colons and no added spaces, for example host:user-agent:accept:authorization:referer.
1158
1198
  */
1159
1199
  HeaderOrder?: HeaderOrder;
1160
1200
  }
@@ -1511,7 +1551,7 @@ declare namespace WAFV2 {
1511
1551
  */
1512
1552
  LockToken?: LockToken;
1513
1553
  /**
1514
- * The URL to use in SDK integrations with Amazon Web Services managed rule groups. For example, you can use the integration SDKs with the account takeover prevention managed rule group AWSManagedRulesATPRuleSet. This is only populated if you are using a rule group in your web ACL that integrates with your applications in this way. For more information, see WAF client application integration in the WAF Developer Guide.
1554
+ * The URL to use in SDK integrations with Amazon Web Services managed rule groups. For example, you can use the integration SDKs with the account takeover prevention managed rule group AWSManagedRulesATPRuleSet and the account creation fraud prevention managed rule group AWSManagedRulesACFPRuleSet. This is only populated if you are using a rule group in your web ACL that integrates with your applications in this way. For more information, see WAF client application integration in the WAF Developer Guide.
1515
1555
  */
1516
1556
  ApplicationIntegrationURL?: OutputUrl;
1517
1557
  }
@@ -2049,7 +2089,7 @@ declare namespace WAFV2 {
2049
2089
  */
2050
2090
  LogDestinationConfigs: LogDestinationConfigs;
2051
2091
  /**
2052
- * The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED. You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, Method, and JsonBody.
2092
+ * The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting. Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch. You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method.
2053
2093
  */
2054
2094
  RedactedFields?: RedactedFields;
2055
2095
  /**
@@ -2118,15 +2158,15 @@ declare namespace WAFV2 {
2118
2158
  */
2119
2159
  LoginPath?: LoginPathString;
2120
2160
  /**
2121
- * Instead of this setting, provide your configuration under AWSManagedRulesATPRuleSet RequestInspection.
2161
+ * Instead of this setting, provide your configuration under the request inspection configuration for AWSManagedRulesATPRuleSet or AWSManagedRulesACFPRuleSet.
2122
2162
  */
2123
2163
  PayloadType?: PayloadType;
2124
2164
  /**
2125
- * Instead of this setting, provide your configuration under AWSManagedRulesATPRuleSet RequestInspection.
2165
+ * Instead of this setting, provide your configuration under the request inspection configuration for AWSManagedRulesATPRuleSet or AWSManagedRulesACFPRuleSet.
2126
2166
  */
2127
2167
  UsernameField?: UsernameField;
2128
2168
  /**
2129
- * Instead of this setting, provide your configuration under AWSManagedRulesATPRuleSet RequestInspection.
2169
+ * Instead of this setting, provide your configuration under the request inspection configuration for AWSManagedRulesATPRuleSet or AWSManagedRulesACFPRuleSet.
2130
2170
  */
2131
2171
  PasswordField?: PasswordField;
2132
2172
  /**
@@ -2137,6 +2177,10 @@ declare namespace WAFV2 {
2137
2177
  * Additional configuration for using the account takeover prevention (ATP) managed rule group, AWSManagedRulesATPRuleSet. Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests. This configuration replaces the individual configuration fields in ManagedRuleGroupConfig and provides additional feature configuration. For information about using the ATP managed rule group, see WAF Fraud Control account takeover prevention (ATP) rule group and WAF Fraud Control account takeover prevention (ATP) in the WAF Developer Guide.
2138
2178
  */
2139
2179
  AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet;
2180
+ /**
2181
+ * Additional configuration for using the account creation fraud prevention (ACFP) managed rule group, AWSManagedRulesACFPRuleSet. Use this to provide account creation request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to account creation requests. For information about using the ACFP managed rule group, see WAF Fraud Control account creation fraud prevention (ACFP) rule group and WAF Fraud Control account creation fraud prevention (ACFP) in the WAF Developer Guide.
2182
+ */
2183
+ AWSManagedRulesACFPRuleSet?: AWSManagedRulesACFPRuleSet;
2140
2184
  }
2141
2185
  export type ManagedRuleGroupConfigs = ManagedRuleGroupConfig[];
2142
2186
  export interface ManagedRuleGroupStatement {
@@ -2161,7 +2205,7 @@ declare namespace WAFV2 {
2161
2205
  */
2162
2206
  ScopeDownStatement?: Statement;
2163
2207
  /**
2164
- * Additional information that's used by a managed rule group. Many managed rule groups don't require this. Use the AWSManagedRulesATPRuleSet configuration object for the account takeover prevention managed rule group, to provide information such as the sign-in page of your application and the type of content to accept or reject from the client. Use the AWSManagedRulesBotControlRuleSet configuration object to configure the protection level that you want the Bot Control rule group to use.
2208
+ * Additional information that's used by a managed rule group. Many managed rule groups don't require this. The rule groups used for intelligent threat mitigation require additional configuration: Use the AWSManagedRulesACFPRuleSet configuration object to configure the account creation fraud prevention managed rule group. The configuration includes the registration and sign-up pages of your application and the locations in the account creation request payload of data, such as the user email and phone number fields. Use the AWSManagedRulesATPRuleSet configuration object to configure the account takeover prevention managed rule group. The configuration includes the sign-in page of your application and the locations in the login request payload of data such as the username and password. Use the AWSManagedRulesBotControlRuleSet configuration object to configure the protection level that you want the Bot Control rule group to use.
2165
2209
  */
2166
2210
  ManagedRuleGroupConfigs?: ManagedRuleGroupConfigs;
2167
2211
  /**
@@ -2334,11 +2378,18 @@ declare namespace WAFV2 {
2334
2378
  export type PaginationLimit = number;
2335
2379
  export interface PasswordField {
2336
2380
  /**
2337
- * The name of the password field. For example /form/password.
2381
+ * The name of the password field. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "password": "THE_PASSWORD" } }, the password field specification is /form/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named password1, the password field specification is password1.
2338
2382
  */
2339
2383
  Identifier: FieldIdentifier;
2340
2384
  }
2341
2385
  export type PayloadType = "JSON"|"FORM_ENCODED"|string;
2386
+ export interface PhoneNumberField {
2387
+ /**
2388
+ * The name of a single primary phone number field. How you specify the phone number fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryphoneline1": "THE_PHONE1", "primaryphoneline2": "THE_PHONE2", "primaryphoneline3": "THE_PHONE3" } }, the phone number field identifiers are /form/primaryphoneline1, /form/primaryphoneline2, and /form/primaryphoneline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryphoneline1, primaryphoneline2, and primaryphoneline3, the phone number field identifiers are primaryphoneline1, primaryphoneline2, and primaryphoneline3.
2389
+ */
2390
+ Identifier: FieldIdentifier;
2391
+ }
2392
+ export type PhoneNumberFields = PhoneNumberField[];
2342
2393
  export type Platform = "IOS"|"ANDROID"|string;
2343
2394
  export type PolicyString = string;
2344
2395
  export type PopulationSize = number;
@@ -2604,6 +2655,7 @@ declare namespace WAFV2 {
2604
2655
  ARN?: ResourceArn;
2605
2656
  }
2606
2657
  export type RegexPatternString = string;
2658
+ export type RegistrationPagePathString = string;
2607
2659
  export type RegularExpressionList = Regex[];
2608
2660
  export type ReleaseNotes = string;
2609
2661
  export type ReleaseSummaries = ReleaseSummary[];
@@ -2630,14 +2682,40 @@ declare namespace WAFV2 {
2630
2682
  */
2631
2683
  PayloadType: PayloadType;
2632
2684
  /**
2633
- * Details about your login page username field. How you specify this depends on the payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "login": { "username": "THE_USERNAME", "password": "THE_PASSWORD" } }, the username field specification is /login/username and the password field specification is /login/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named username1 and password1, the username field specification is username1 and the password field specification is password1.
2685
+ * The name of the field in the request payload that contains your customer's username. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "username": "THE_USERNAME" } }, the username field specification is /form/username. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named username1, the username field specification is username1
2634
2686
  */
2635
2687
  UsernameField: UsernameField;
2636
2688
  /**
2637
- * Details about your login page password field. How you specify this depends on the payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "login": { "username": "THE_USERNAME", "password": "THE_PASSWORD" } }, the username field specification is /login/username and the password field specification is /login/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named username1 and password1, the username field specification is username1 and the password field specification is password1.
2689
+ * The name of the field in the request payload that contains your customer's password. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "password": "THE_PASSWORD" } }, the password field specification is /form/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named password1, the password field specification is password1.
2638
2690
  */
2639
2691
  PasswordField: PasswordField;
2640
2692
  }
2693
+ export interface RequestInspectionACFP {
2694
+ /**
2695
+ * The payload type for your account creation endpoint, either JSON or form encoded.
2696
+ */
2697
+ PayloadType: PayloadType;
2698
+ /**
2699
+ * The name of the field in the request payload that contains your customer's username. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "username": "THE_USERNAME" } }, the username field specification is /form/username. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named username1, the username field specification is username1
2700
+ */
2701
+ UsernameField?: UsernameField;
2702
+ /**
2703
+ * The name of the field in the request payload that contains your customer's password. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "password": "THE_PASSWORD" } }, the password field specification is /form/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named password1, the password field specification is password1.
2704
+ */
2705
+ PasswordField?: PasswordField;
2706
+ /**
2707
+ * The name of the field in the request payload that contains your customer's email. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "email": "THE_EMAIL" } }, the email field specification is /form/email. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named email1, the email field specification is email1.
2708
+ */
2709
+ EmailField?: EmailField;
2710
+ /**
2711
+ * The names of the fields in the request payload that contain your customer's primary phone number. Order the phone number fields in the array exactly as they are ordered in the request payload. How you specify the phone number fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryphoneline1": "THE_PHONE1", "primaryphoneline2": "THE_PHONE2", "primaryphoneline3": "THE_PHONE3" } }, the phone number field identifiers are /form/primaryphoneline1, /form/primaryphoneline2, and /form/primaryphoneline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryphoneline1, primaryphoneline2, and primaryphoneline3, the phone number field identifiers are primaryphoneline1, primaryphoneline2, and primaryphoneline3.
2712
+ */
2713
+ PhoneNumberFields?: PhoneNumberFields;
2714
+ /**
2715
+ * The names of the fields in the request payload that contain your customer's primary physical address. Order the address fields in the array exactly as they are ordered in the request payload. How you specify the address fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryaddressline1": "THE_ADDRESS1", "primaryaddressline2": "THE_ADDRESS2", "primaryaddressline3": "THE_ADDRESS3" } }, the address field idenfiers are /form/primaryaddressline1, /form/primaryaddressline2, and /form/primaryaddressline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryaddressline1, primaryaddressline2, and primaryaddressline3, the address fields identifiers are primaryaddressline1, primaryaddressline2, and primaryaddressline3.
2716
+ */
2717
+ AddressFields?: AddressFields;
2718
+ }
2641
2719
  export type ResourceArn = string;
2642
2720
  export type ResourceArns = ResourceArn[];
2643
2721
  export type ResourceType = "APPLICATION_LOAD_BALANCER"|"API_GATEWAY"|"APPSYNC"|"COGNITO_USER_POOL"|"APP_RUNNER_SERVICE"|"VERIFIED_ACCESS_INSTANCE"|string;
@@ -2646,29 +2724,29 @@ declare namespace WAFV2 {
2646
2724
  export type ResponseContentType = "TEXT_PLAIN"|"TEXT_HTML"|"APPLICATION_JSON"|string;
2647
2725
  export interface ResponseInspection {
2648
2726
  /**
2649
- * Configures inspection of the response status code.
2727
+ * Configures inspection of the response status code for success and failure indicators.
2650
2728
  */
2651
2729
  StatusCode?: ResponseInspectionStatusCode;
2652
2730
  /**
2653
- * Configures inspection of the response header.
2731
+ * Configures inspection of the response header for success and failure indicators.
2654
2732
  */
2655
2733
  Header?: ResponseInspectionHeader;
2656
2734
  /**
2657
- * Configures inspection of the response body. WAF can inspect the first 65,536 bytes (64 KB) of the response body.
2735
+ * Configures inspection of the response body for success and failure indicators. WAF can inspect the first 65,536 bytes (64 KB) of the response body.
2658
2736
  */
2659
2737
  BodyContains?: ResponseInspectionBodyContains;
2660
2738
  /**
2661
- * Configures inspection of the response JSON. WAF can inspect the first 65,536 bytes (64 KB) of the response JSON.
2739
+ * Configures inspection of the response JSON for success and failure indicators. WAF can inspect the first 65,536 bytes (64 KB) of the response JSON.
2662
2740
  */
2663
2741
  Json?: ResponseInspectionJson;
2664
2742
  }
2665
2743
  export interface ResponseInspectionBodyContains {
2666
2744
  /**
2667
- * Strings in the body of the response that indicate a successful login attempt. To be counted as a successful login, the string can be anywhere in the body and must be an exact match, including case. Each string must be unique among the success and failure strings. JSON example: "SuccessStrings": [ "Login successful", "Welcome to our site!" ]
2745
+ * Strings in the body of the response that indicate a successful login or account creation attempt. To be counted as a success, the string can be anywhere in the body and must be an exact match, including case. Each string must be unique among the success and failure strings. JSON examples: "SuccessStrings": [ "Login successful" ] and "SuccessStrings": [ "Account creation successful", "Welcome to our site!" ]
2668
2746
  */
2669
2747
  SuccessStrings: ResponseInspectionBodyContainsSuccessStrings;
2670
2748
  /**
2671
- * Strings in the body of the response that indicate a failed login attempt. To be counted as a failed login, the string can be anywhere in the body and must be an exact match, including case. Each string must be unique among the success and failure strings. JSON example: "FailureStrings": [ "Login failed" ]
2749
+ * Strings in the body of the response that indicate a failed login or account creation attempt. To be counted as a failure, the string can be anywhere in the body and must be an exact match, including case. Each string must be unique among the success and failure strings. JSON example: "FailureStrings": [ "Request failed" ]
2672
2750
  */
2673
2751
  FailureStrings: ResponseInspectionBodyContainsFailureStrings;
2674
2752
  }
@@ -2676,15 +2754,15 @@ declare namespace WAFV2 {
2676
2754
  export type ResponseInspectionBodyContainsSuccessStrings = SuccessValue[];
2677
2755
  export interface ResponseInspectionHeader {
2678
2756
  /**
2679
- * The name of the header to match against. The name must be an exact match, including case. JSON example: "Name": [ "LoginResult" ]
2757
+ * The name of the header to match against. The name must be an exact match, including case. JSON example: "Name": [ "RequestResult" ]
2680
2758
  */
2681
2759
  Name: ResponseInspectionHeaderName;
2682
2760
  /**
2683
- * Values in the response header with the specified name that indicate a successful login attempt. To be counted as a successful login, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "SuccessValues": [ "LoginPassed", "Successful login" ]
2761
+ * Values in the response header with the specified name that indicate a successful login or account creation attempt. To be counted as a success, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON examples: "SuccessValues": [ "LoginPassed", "Successful login" ] and "SuccessValues": [ "AccountCreated", "Successful account creation" ]
2684
2762
  */
2685
2763
  SuccessValues: ResponseInspectionHeaderSuccessValues;
2686
2764
  /**
2687
- * Values in the response header with the specified name that indicate a failed login attempt. To be counted as a failed login, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "FailureValues": [ "LoginFailed", "Failed login" ]
2765
+ * Values in the response header with the specified name that indicate a failed login or account creation attempt. To be counted as a failure, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON examples: "FailureValues": [ "LoginFailed", "Failed login" ] and "FailureValues": [ "AccountCreationFailed" ]
2688
2766
  */
2689
2767
  FailureValues: ResponseInspectionHeaderFailureValues;
2690
2768
  }
@@ -2693,15 +2771,15 @@ declare namespace WAFV2 {
2693
2771
  export type ResponseInspectionHeaderSuccessValues = SuccessValue[];
2694
2772
  export interface ResponseInspectionJson {
2695
2773
  /**
2696
- * The identifier for the value to match against in the JSON. The identifier must be an exact match, including case. JSON example: "Identifier": [ "/login/success" ]
2774
+ * The identifier for the value to match against in the JSON. The identifier must be an exact match, including case. JSON examples: "Identifier": [ "/login/success" ] and "Identifier": [ "/sign-up/success" ]
2697
2775
  */
2698
2776
  Identifier: FieldIdentifier;
2699
2777
  /**
2700
- * Values for the specified identifier in the response JSON that indicate a successful login attempt. To be counted as a successful login, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "SuccessValues": [ "True", "Succeeded" ]
2778
+ * Values for the specified identifier in the response JSON that indicate a successful login or account creation attempt. To be counted as a success, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "SuccessValues": [ "True", "Succeeded" ]
2701
2779
  */
2702
2780
  SuccessValues: ResponseInspectionJsonSuccessValues;
2703
2781
  /**
2704
- * Values for the specified identifier in the response JSON that indicate a failed login attempt. To be counted as a failed login, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "FailureValues": [ "False", "Failed" ]
2782
+ * Values for the specified identifier in the response JSON that indicate a failed login or account creation attempt. To be counted as a failure, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "FailureValues": [ "False", "Failed" ]
2705
2783
  */
2706
2784
  FailureValues: ResponseInspectionJsonFailureValues;
2707
2785
  }
@@ -2709,11 +2787,11 @@ declare namespace WAFV2 {
2709
2787
  export type ResponseInspectionJsonSuccessValues = SuccessValue[];
2710
2788
  export interface ResponseInspectionStatusCode {
2711
2789
  /**
2712
- * Status codes in the response that indicate a successful login attempt. To be counted as a successful login, the response status code must match one of these. Each code must be unique among the success and failure status codes. JSON example: "SuccessCodes": [ 200, 201 ]
2790
+ * Status codes in the response that indicate a successful login or account creation attempt. To be counted as a success, the response status code must match one of these. Each code must be unique among the success and failure status codes. JSON example: "SuccessCodes": [ 200, 201 ]
2713
2791
  */
2714
2792
  SuccessCodes: ResponseInspectionStatusCodeSuccessCodes;
2715
2793
  /**
2716
- * Status codes in the response that indicate a failed login attempt. To be counted as a failed login, the response status code must match one of these. Each code must be unique among the success and failure status codes. JSON example: "FailureCodes": [ 400, 404 ]
2794
+ * Status codes in the response that indicate a failed login or account creation attempt. To be counted as a failure, the response status code must match one of these. Each code must be unique among the success and failure status codes. JSON example: "FailureCodes": [ 400, 404 ]
2717
2795
  */
2718
2796
  FailureCodes: ResponseInspectionStatusCodeFailureCodes;
2719
2797
  }
@@ -3036,7 +3114,7 @@ declare namespace WAFV2 {
3036
3114
  */
3037
3115
  NotStatement?: NotStatement;
3038
3116
  /**
3039
- * A rule statement used to run the rules that are defined in a managed rule group. To use this, provide the vendor name and the name of the rule group in this statement. You can retrieve the required names by calling ListAvailableManagedRuleGroups. You cannot nest a ManagedRuleGroupStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule. You are charged additional fees when you use the WAF Bot Control managed rule group AWSManagedRulesBotControlRuleSet or the WAF Fraud Control account takeover prevention (ATP) managed rule group AWSManagedRulesATPRuleSet. For more information, see WAF Pricing.
3117
+ * A rule statement used to run the rules that are defined in a managed rule group. To use this, provide the vendor name and the name of the rule group in this statement. You can retrieve the required names by calling ListAvailableManagedRuleGroups. You cannot nest a ManagedRuleGroupStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule. You are charged additional fees when you use the WAF Bot Control managed rule group AWSManagedRulesBotControlRuleSet, the WAF Fraud Control account takeover prevention (ATP) managed rule group AWSManagedRulesATPRuleSet, or the WAF Fraud Control account creation fraud prevention (ACFP) managed rule group AWSManagedRulesACFPRuleSet. For more information, see WAF Pricing.
3040
3118
  */
3041
3119
  ManagedRuleGroupStatement?: ManagedRuleGroupStatement;
3042
3120
  /**
@@ -3337,7 +3415,7 @@ declare namespace WAFV2 {
3337
3415
  }
3338
3416
  export interface UsernameField {
3339
3417
  /**
3340
- * The name of the username field. For example /form/username.
3418
+ * The name of the username field. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "username": "THE_USERNAME" } }, the username field specification is /form/username. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named username1, the username field specification is username1
3341
3419
  */
3342
3420
  Identifier: FieldIdentifier;
3343
3421
  }