aws-sdk 2.1396.0 → 2.1397.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +14 -1
- package/README.md +1 -1
- package/apis/cloudtrail-2013-11-01.min.json +33 -33
- package/apis/codeguru-security-2018-05-10.examples.json +5 -0
- package/apis/codeguru-security-2018-05-10.min.json +703 -0
- package/apis/codeguru-security-2018-05-10.paginators.json +22 -0
- package/apis/drs-2020-02-26.min.json +392 -97
- package/apis/drs-2020-02-26.paginators.json +6 -0
- package/apis/ec2-2016-11-15.min.json +1178 -1013
- package/apis/ec2-2016-11-15.paginators.json +6 -0
- package/apis/lightsail-2016-11-28.min.json +4 -2
- package/apis/metadata.json +7 -0
- package/apis/s3-2006-03-01.examples.json +121 -121
- package/apis/securityhub-2018-10-26.examples.json +276 -0
- package/apis/securityhub-2018-10-26.min.json +957 -559
- package/apis/verifiedpermissions-2021-12-01.examples.json +5 -0
- package/apis/verifiedpermissions-2021-12-01.min.json +1215 -0
- package/apis/verifiedpermissions-2021-12-01.paginators.json +28 -0
- package/apis/verifiedpermissions-2021-12-01.waiters2.json +5 -0
- package/apis/wafv2-2019-07-29.min.json +241 -169
- package/apis/wellarchitected-2020-03-31.min.json +655 -75
- package/apis/wellarchitected-2020-03-31.paginators.json +15 -0
- package/clients/all.d.ts +2 -0
- package/clients/all.js +3 -1
- package/clients/cloudtrail.d.ts +28 -13
- package/clients/codegurusecurity.d.ts +761 -0
- package/clients/codegurusecurity.js +18 -0
- package/clients/drs.d.ts +354 -3
- package/clients/ec2.d.ts +225 -48
- package/clients/imagebuilder.d.ts +1 -1
- package/clients/lightsail.d.ts +12 -4
- package/clients/s3.d.ts +1 -1
- package/clients/securityhub.d.ts +470 -0
- package/clients/simspaceweaver.d.ts +2 -2
- package/clients/verifiedpermissions.d.ts +1392 -0
- package/clients/verifiedpermissions.js +19 -0
- package/clients/wafv2.d.ts +105 -27
- package/clients/wellarchitected.d.ts +533 -7
- package/dist/aws-sdk-core-react-native.js +2 -2
- package/dist/aws-sdk-react-native.js +95 -14
- package/dist/aws-sdk.js +1227 -1049
- package/dist/aws-sdk.min.js +80 -80
- package/lib/config_service_placeholders.d.ts +4 -0
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -0,0 +1,19 @@
|
|
1
|
+
require('../lib/node_loader');
|
2
|
+
var AWS = require('../lib/core');
|
3
|
+
var Service = AWS.Service;
|
4
|
+
var apiLoader = AWS.apiLoader;
|
5
|
+
|
6
|
+
apiLoader.services['verifiedpermissions'] = {};
|
7
|
+
AWS.VerifiedPermissions = Service.defineService('verifiedpermissions', ['2021-12-01']);
|
8
|
+
Object.defineProperty(apiLoader.services['verifiedpermissions'], '2021-12-01', {
|
9
|
+
get: function get() {
|
10
|
+
var model = require('../apis/verifiedpermissions-2021-12-01.min.json');
|
11
|
+
model.paginators = require('../apis/verifiedpermissions-2021-12-01.paginators.json').pagination;
|
12
|
+
model.waiters = require('../apis/verifiedpermissions-2021-12-01.waiters2.json').waiters;
|
13
|
+
return model;
|
14
|
+
},
|
15
|
+
enumerable: true,
|
16
|
+
configurable: true
|
17
|
+
});
|
18
|
+
|
19
|
+
module.exports = AWS.VerifiedPermissions;
|
package/clients/wafv2.d.ts
CHANGED
@@ -459,6 +459,28 @@ declare namespace WAFV2 {
|
|
459
459
|
}
|
460
460
|
export type APIKeyTokenDomains = TokenDomain[];
|
461
461
|
export type APIKeyVersion = number;
|
462
|
+
export interface AWSManagedRulesACFPRuleSet {
|
463
|
+
/**
|
464
|
+
* The path of the account creation endpoint for your application. This is the page on your website that accepts the completed registration form for a new user. This page must accept POST requests. For example, for the URL https://example.com/web/signup, you would provide the path /web/signup.
|
465
|
+
*/
|
466
|
+
CreationPath: CreationPathString;
|
467
|
+
/**
|
468
|
+
* The path of the account registration endpoint for your application. This is the page on your website that presents the registration form to new users. This page must accept GET text/html requests. For example, for the URL https://example.com/web/register, you would provide the path /web/register.
|
469
|
+
*/
|
470
|
+
RegistrationPagePath: RegistrationPagePathString;
|
471
|
+
/**
|
472
|
+
* The criteria for inspecting account creation requests, used by the ACFP rule group to validate and track account creation attempts.
|
473
|
+
*/
|
474
|
+
RequestInspection: RequestInspectionACFP;
|
475
|
+
/**
|
476
|
+
* The criteria for inspecting responses to account creation requests, used by the ACFP rule group to track account creation success rates. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions. The ACFP rule group evaluates the responses that your protected resources send back to client account creation attempts, keeping count of successful and failed attempts from each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that have had too many successful account creation attempts in a short amount of time.
|
477
|
+
*/
|
478
|
+
ResponseInspection?: ResponseInspection;
|
479
|
+
/**
|
480
|
+
* Allow the use of regular expressions in the registration page path and the account creation path.
|
481
|
+
*/
|
482
|
+
EnableRegexInPath?: Boolean;
|
483
|
+
}
|
462
484
|
export interface AWSManagedRulesATPRuleSet {
|
463
485
|
/**
|
464
486
|
* The path of the login endpoint for your application. For example, for the URL https://example.com/web/login, you would provide the path /web/login. The rule group inspects only HTTP POST requests to your specified login endpoint.
|
@@ -469,9 +491,13 @@ declare namespace WAFV2 {
|
|
469
491
|
*/
|
470
492
|
RequestInspection?: RequestInspection;
|
471
493
|
/**
|
472
|
-
* The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts
|
494
|
+
* The criteria for inspecting responses to login requests, used by the ATP rule group to track login failure rates. Response inspection is available only in web ACLs that protect Amazon CloudFront distributions. The ATP rule group evaluates the responses that your protected resources send back to client login attempts, keeping count of successful and failed attempts for each IP address and client session. Using this information, the rule group labels and mitigates requests from client sessions and IP addresses that have had too many failed login attempts in a short amount of time.
|
473
495
|
*/
|
474
496
|
ResponseInspection?: ResponseInspection;
|
497
|
+
/**
|
498
|
+
* Allow the use of regular expressions in the login page path.
|
499
|
+
*/
|
500
|
+
EnableRegexInPath?: Boolean;
|
475
501
|
}
|
476
502
|
export interface AWSManagedRulesBotControlRuleSet {
|
477
503
|
/**
|
@@ -487,6 +513,13 @@ declare namespace WAFV2 {
|
|
487
513
|
Action: ActionValue;
|
488
514
|
}
|
489
515
|
export type ActionValue = "ALLOW"|"BLOCK"|"COUNT"|"CAPTCHA"|"CHALLENGE"|"EXCLUDED_AS_COUNT"|string;
|
516
|
+
export interface AddressField {
|
517
|
+
/**
|
518
|
+
* The name of a single primary address field. How you specify the address fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryaddressline1": "THE_ADDRESS1", "primaryaddressline2": "THE_ADDRESS2", "primaryaddressline3": "THE_ADDRESS3" } }, the address field idenfiers are /form/primaryaddressline1, /form/primaryaddressline2, and /form/primaryaddressline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryaddressline1, primaryaddressline2, and primaryaddressline3, the address fields identifiers are primaryaddressline1, primaryaddressline2, and primaryaddressline3.
|
519
|
+
*/
|
520
|
+
Identifier: FieldIdentifier;
|
521
|
+
}
|
522
|
+
export type AddressFields = AddressField[];
|
490
523
|
export interface All {
|
491
524
|
}
|
492
525
|
export interface AllQueryArguments {
|
@@ -846,6 +879,7 @@ declare namespace WAFV2 {
|
|
846
879
|
*/
|
847
880
|
Summary?: WebACLSummary;
|
848
881
|
}
|
882
|
+
export type CreationPathString = string;
|
849
883
|
export interface CustomHTTPHeader {
|
850
884
|
/**
|
851
885
|
* The name of the custom header. For custom request header insertion, when WAF inserts the header into the request, it prefixes this name x-amzn-waf-, to avoid confusion with the headers that are already in the request. For example, for the header name sample, WAF inserts the header x-amzn-waf-sample.
|
@@ -1097,6 +1131,12 @@ declare namespace WAFV2 {
|
|
1097
1131
|
export interface DisassociateWebACLResponse {
|
1098
1132
|
}
|
1099
1133
|
export type DownloadUrl = string;
|
1134
|
+
export interface EmailField {
|
1135
|
+
/**
|
1136
|
+
* The name of the email field. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "email": "THE_EMAIL" } }, the email field specification is /form/email. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named email1, the email field specification is email1.
|
1137
|
+
*/
|
1138
|
+
Identifier: FieldIdentifier;
|
1139
|
+
}
|
1100
1140
|
export type EntityDescription = string;
|
1101
1141
|
export type EntityId = string;
|
1102
1142
|
export type EntityName = string;
|
@@ -1154,7 +1194,7 @@ declare namespace WAFV2 {
|
|
1154
1194
|
*/
|
1155
1195
|
Cookies?: Cookies;
|
1156
1196
|
/**
|
1157
|
-
* Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection. WAF generates the string and then uses that as the field to match component in its inspection. WAF separates the header names in the string using
|
1197
|
+
* Inspect a string containing the list of the request's header names, ordered as they appear in the web request that WAF receives for inspection. WAF generates the string and then uses that as the field to match component in its inspection. WAF separates the header names in the string using colons and no added spaces, for example host:user-agent:accept:authorization:referer.
|
1158
1198
|
*/
|
1159
1199
|
HeaderOrder?: HeaderOrder;
|
1160
1200
|
}
|
@@ -1511,7 +1551,7 @@ declare namespace WAFV2 {
|
|
1511
1551
|
*/
|
1512
1552
|
LockToken?: LockToken;
|
1513
1553
|
/**
|
1514
|
-
* The URL to use in SDK integrations with Amazon Web Services managed rule groups. For example, you can use the integration SDKs with the account takeover prevention managed rule group AWSManagedRulesATPRuleSet. This is only populated if you are using a rule group in your web ACL that integrates with your applications in this way. For more information, see WAF client application integration in the WAF Developer Guide.
|
1554
|
+
* The URL to use in SDK integrations with Amazon Web Services managed rule groups. For example, you can use the integration SDKs with the account takeover prevention managed rule group AWSManagedRulesATPRuleSet and the account creation fraud prevention managed rule group AWSManagedRulesACFPRuleSet. This is only populated if you are using a rule group in your web ACL that integrates with your applications in this way. For more information, see WAF client application integration in the WAF Developer Guide.
|
1515
1555
|
*/
|
1516
1556
|
ApplicationIntegrationURL?: OutputUrl;
|
1517
1557
|
}
|
@@ -2049,7 +2089,7 @@ declare namespace WAFV2 {
|
|
2049
2089
|
*/
|
2050
2090
|
LogDestinationConfigs: LogDestinationConfigs;
|
2051
2091
|
/**
|
2052
|
-
* The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED.
|
2092
|
+
* The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting. Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch. You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method.
|
2053
2093
|
*/
|
2054
2094
|
RedactedFields?: RedactedFields;
|
2055
2095
|
/**
|
@@ -2118,15 +2158,15 @@ declare namespace WAFV2 {
|
|
2118
2158
|
*/
|
2119
2159
|
LoginPath?: LoginPathString;
|
2120
2160
|
/**
|
2121
|
-
* Instead of this setting, provide your configuration under AWSManagedRulesATPRuleSet
|
2161
|
+
* Instead of this setting, provide your configuration under the request inspection configuration for AWSManagedRulesATPRuleSet or AWSManagedRulesACFPRuleSet.
|
2122
2162
|
*/
|
2123
2163
|
PayloadType?: PayloadType;
|
2124
2164
|
/**
|
2125
|
-
* Instead of this setting, provide your configuration under AWSManagedRulesATPRuleSet
|
2165
|
+
* Instead of this setting, provide your configuration under the request inspection configuration for AWSManagedRulesATPRuleSet or AWSManagedRulesACFPRuleSet.
|
2126
2166
|
*/
|
2127
2167
|
UsernameField?: UsernameField;
|
2128
2168
|
/**
|
2129
|
-
* Instead of this setting, provide your configuration under AWSManagedRulesATPRuleSet
|
2169
|
+
* Instead of this setting, provide your configuration under the request inspection configuration for AWSManagedRulesATPRuleSet or AWSManagedRulesACFPRuleSet.
|
2130
2170
|
*/
|
2131
2171
|
PasswordField?: PasswordField;
|
2132
2172
|
/**
|
@@ -2137,6 +2177,10 @@ declare namespace WAFV2 {
|
|
2137
2177
|
* Additional configuration for using the account takeover prevention (ATP) managed rule group, AWSManagedRulesATPRuleSet. Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests. This configuration replaces the individual configuration fields in ManagedRuleGroupConfig and provides additional feature configuration. For information about using the ATP managed rule group, see WAF Fraud Control account takeover prevention (ATP) rule group and WAF Fraud Control account takeover prevention (ATP) in the WAF Developer Guide.
|
2138
2178
|
*/
|
2139
2179
|
AWSManagedRulesATPRuleSet?: AWSManagedRulesATPRuleSet;
|
2180
|
+
/**
|
2181
|
+
* Additional configuration for using the account creation fraud prevention (ACFP) managed rule group, AWSManagedRulesACFPRuleSet. Use this to provide account creation request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to account creation requests. For information about using the ACFP managed rule group, see WAF Fraud Control account creation fraud prevention (ACFP) rule group and WAF Fraud Control account creation fraud prevention (ACFP) in the WAF Developer Guide.
|
2182
|
+
*/
|
2183
|
+
AWSManagedRulesACFPRuleSet?: AWSManagedRulesACFPRuleSet;
|
2140
2184
|
}
|
2141
2185
|
export type ManagedRuleGroupConfigs = ManagedRuleGroupConfig[];
|
2142
2186
|
export interface ManagedRuleGroupStatement {
|
@@ -2161,7 +2205,7 @@ declare namespace WAFV2 {
|
|
2161
2205
|
*/
|
2162
2206
|
ScopeDownStatement?: Statement;
|
2163
2207
|
/**
|
2164
|
-
* Additional information that's used by a managed rule group. Many managed rule groups don't require this. Use the
|
2208
|
+
* Additional information that's used by a managed rule group. Many managed rule groups don't require this. The rule groups used for intelligent threat mitigation require additional configuration: Use the AWSManagedRulesACFPRuleSet configuration object to configure the account creation fraud prevention managed rule group. The configuration includes the registration and sign-up pages of your application and the locations in the account creation request payload of data, such as the user email and phone number fields. Use the AWSManagedRulesATPRuleSet configuration object to configure the account takeover prevention managed rule group. The configuration includes the sign-in page of your application and the locations in the login request payload of data such as the username and password. Use the AWSManagedRulesBotControlRuleSet configuration object to configure the protection level that you want the Bot Control rule group to use.
|
2165
2209
|
*/
|
2166
2210
|
ManagedRuleGroupConfigs?: ManagedRuleGroupConfigs;
|
2167
2211
|
/**
|
@@ -2334,11 +2378,18 @@ declare namespace WAFV2 {
|
|
2334
2378
|
export type PaginationLimit = number;
|
2335
2379
|
export interface PasswordField {
|
2336
2380
|
/**
|
2337
|
-
* The name of the password field. For example /form/password.
|
2381
|
+
* The name of the password field. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "password": "THE_PASSWORD" } }, the password field specification is /form/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named password1, the password field specification is password1.
|
2338
2382
|
*/
|
2339
2383
|
Identifier: FieldIdentifier;
|
2340
2384
|
}
|
2341
2385
|
export type PayloadType = "JSON"|"FORM_ENCODED"|string;
|
2386
|
+
export interface PhoneNumberField {
|
2387
|
+
/**
|
2388
|
+
* The name of a single primary phone number field. How you specify the phone number fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryphoneline1": "THE_PHONE1", "primaryphoneline2": "THE_PHONE2", "primaryphoneline3": "THE_PHONE3" } }, the phone number field identifiers are /form/primaryphoneline1, /form/primaryphoneline2, and /form/primaryphoneline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryphoneline1, primaryphoneline2, and primaryphoneline3, the phone number field identifiers are primaryphoneline1, primaryphoneline2, and primaryphoneline3.
|
2389
|
+
*/
|
2390
|
+
Identifier: FieldIdentifier;
|
2391
|
+
}
|
2392
|
+
export type PhoneNumberFields = PhoneNumberField[];
|
2342
2393
|
export type Platform = "IOS"|"ANDROID"|string;
|
2343
2394
|
export type PolicyString = string;
|
2344
2395
|
export type PopulationSize = number;
|
@@ -2604,6 +2655,7 @@ declare namespace WAFV2 {
|
|
2604
2655
|
ARN?: ResourceArn;
|
2605
2656
|
}
|
2606
2657
|
export type RegexPatternString = string;
|
2658
|
+
export type RegistrationPagePathString = string;
|
2607
2659
|
export type RegularExpressionList = Regex[];
|
2608
2660
|
export type ReleaseNotes = string;
|
2609
2661
|
export type ReleaseSummaries = ReleaseSummary[];
|
@@ -2630,14 +2682,40 @@ declare namespace WAFV2 {
|
|
2630
2682
|
*/
|
2631
2683
|
PayloadType: PayloadType;
|
2632
2684
|
/**
|
2633
|
-
*
|
2685
|
+
* The name of the field in the request payload that contains your customer's username. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "username": "THE_USERNAME" } }, the username field specification is /form/username. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named username1, the username field specification is username1
|
2634
2686
|
*/
|
2635
2687
|
UsernameField: UsernameField;
|
2636
2688
|
/**
|
2637
|
-
*
|
2689
|
+
* The name of the field in the request payload that contains your customer's password. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "password": "THE_PASSWORD" } }, the password field specification is /form/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named password1, the password field specification is password1.
|
2638
2690
|
*/
|
2639
2691
|
PasswordField: PasswordField;
|
2640
2692
|
}
|
2693
|
+
export interface RequestInspectionACFP {
|
2694
|
+
/**
|
2695
|
+
* The payload type for your account creation endpoint, either JSON or form encoded.
|
2696
|
+
*/
|
2697
|
+
PayloadType: PayloadType;
|
2698
|
+
/**
|
2699
|
+
* The name of the field in the request payload that contains your customer's username. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "username": "THE_USERNAME" } }, the username field specification is /form/username. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named username1, the username field specification is username1
|
2700
|
+
*/
|
2701
|
+
UsernameField?: UsernameField;
|
2702
|
+
/**
|
2703
|
+
* The name of the field in the request payload that contains your customer's password. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "password": "THE_PASSWORD" } }, the password field specification is /form/password. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named password1, the password field specification is password1.
|
2704
|
+
*/
|
2705
|
+
PasswordField?: PasswordField;
|
2706
|
+
/**
|
2707
|
+
* The name of the field in the request payload that contains your customer's email. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "email": "THE_EMAIL" } }, the email field specification is /form/email. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named email1, the email field specification is email1.
|
2708
|
+
*/
|
2709
|
+
EmailField?: EmailField;
|
2710
|
+
/**
|
2711
|
+
* The names of the fields in the request payload that contain your customer's primary phone number. Order the phone number fields in the array exactly as they are ordered in the request payload. How you specify the phone number fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryphoneline1": "THE_PHONE1", "primaryphoneline2": "THE_PHONE2", "primaryphoneline3": "THE_PHONE3" } }, the phone number field identifiers are /form/primaryphoneline1, /form/primaryphoneline2, and /form/primaryphoneline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryphoneline1, primaryphoneline2, and primaryphoneline3, the phone number field identifiers are primaryphoneline1, primaryphoneline2, and primaryphoneline3.
|
2712
|
+
*/
|
2713
|
+
PhoneNumberFields?: PhoneNumberFields;
|
2714
|
+
/**
|
2715
|
+
* The names of the fields in the request payload that contain your customer's primary physical address. Order the address fields in the array exactly as they are ordered in the request payload. How you specify the address fields depends on the request inspection payload type. For JSON payloads, specify the field identifiers in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "primaryaddressline1": "THE_ADDRESS1", "primaryaddressline2": "THE_ADDRESS2", "primaryaddressline3": "THE_ADDRESS3" } }, the address field idenfiers are /form/primaryaddressline1, /form/primaryaddressline2, and /form/primaryaddressline3. For form encoded payload types, use the HTML form names. For example, for an HTML form with input elements named primaryaddressline1, primaryaddressline2, and primaryaddressline3, the address fields identifiers are primaryaddressline1, primaryaddressline2, and primaryaddressline3.
|
2716
|
+
*/
|
2717
|
+
AddressFields?: AddressFields;
|
2718
|
+
}
|
2641
2719
|
export type ResourceArn = string;
|
2642
2720
|
export type ResourceArns = ResourceArn[];
|
2643
2721
|
export type ResourceType = "APPLICATION_LOAD_BALANCER"|"API_GATEWAY"|"APPSYNC"|"COGNITO_USER_POOL"|"APP_RUNNER_SERVICE"|"VERIFIED_ACCESS_INSTANCE"|string;
|
@@ -2646,29 +2724,29 @@ declare namespace WAFV2 {
|
|
2646
2724
|
export type ResponseContentType = "TEXT_PLAIN"|"TEXT_HTML"|"APPLICATION_JSON"|string;
|
2647
2725
|
export interface ResponseInspection {
|
2648
2726
|
/**
|
2649
|
-
* Configures inspection of the response status code.
|
2727
|
+
* Configures inspection of the response status code for success and failure indicators.
|
2650
2728
|
*/
|
2651
2729
|
StatusCode?: ResponseInspectionStatusCode;
|
2652
2730
|
/**
|
2653
|
-
* Configures inspection of the response header.
|
2731
|
+
* Configures inspection of the response header for success and failure indicators.
|
2654
2732
|
*/
|
2655
2733
|
Header?: ResponseInspectionHeader;
|
2656
2734
|
/**
|
2657
|
-
* Configures inspection of the response body. WAF can inspect the first 65,536 bytes (64 KB) of the response body.
|
2735
|
+
* Configures inspection of the response body for success and failure indicators. WAF can inspect the first 65,536 bytes (64 KB) of the response body.
|
2658
2736
|
*/
|
2659
2737
|
BodyContains?: ResponseInspectionBodyContains;
|
2660
2738
|
/**
|
2661
|
-
* Configures inspection of the response JSON. WAF can inspect the first 65,536 bytes (64 KB) of the response JSON.
|
2739
|
+
* Configures inspection of the response JSON for success and failure indicators. WAF can inspect the first 65,536 bytes (64 KB) of the response JSON.
|
2662
2740
|
*/
|
2663
2741
|
Json?: ResponseInspectionJson;
|
2664
2742
|
}
|
2665
2743
|
export interface ResponseInspectionBodyContains {
|
2666
2744
|
/**
|
2667
|
-
* Strings in the body of the response that indicate a successful login attempt. To be counted as a
|
2745
|
+
* Strings in the body of the response that indicate a successful login or account creation attempt. To be counted as a success, the string can be anywhere in the body and must be an exact match, including case. Each string must be unique among the success and failure strings. JSON examples: "SuccessStrings": [ "Login successful" ] and "SuccessStrings": [ "Account creation successful", "Welcome to our site!" ]
|
2668
2746
|
*/
|
2669
2747
|
SuccessStrings: ResponseInspectionBodyContainsSuccessStrings;
|
2670
2748
|
/**
|
2671
|
-
* Strings in the body of the response that indicate a failed login attempt. To be counted as a
|
2749
|
+
* Strings in the body of the response that indicate a failed login or account creation attempt. To be counted as a failure, the string can be anywhere in the body and must be an exact match, including case. Each string must be unique among the success and failure strings. JSON example: "FailureStrings": [ "Request failed" ]
|
2672
2750
|
*/
|
2673
2751
|
FailureStrings: ResponseInspectionBodyContainsFailureStrings;
|
2674
2752
|
}
|
@@ -2676,15 +2754,15 @@ declare namespace WAFV2 {
|
|
2676
2754
|
export type ResponseInspectionBodyContainsSuccessStrings = SuccessValue[];
|
2677
2755
|
export interface ResponseInspectionHeader {
|
2678
2756
|
/**
|
2679
|
-
* The name of the header to match against. The name must be an exact match, including case. JSON example: "Name": [ "
|
2757
|
+
* The name of the header to match against. The name must be an exact match, including case. JSON example: "Name": [ "RequestResult" ]
|
2680
2758
|
*/
|
2681
2759
|
Name: ResponseInspectionHeaderName;
|
2682
2760
|
/**
|
2683
|
-
* Values in the response header with the specified name that indicate a successful login attempt. To be counted as a
|
2761
|
+
* Values in the response header with the specified name that indicate a successful login or account creation attempt. To be counted as a success, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON examples: "SuccessValues": [ "LoginPassed", "Successful login" ] and "SuccessValues": [ "AccountCreated", "Successful account creation" ]
|
2684
2762
|
*/
|
2685
2763
|
SuccessValues: ResponseInspectionHeaderSuccessValues;
|
2686
2764
|
/**
|
2687
|
-
* Values in the response header with the specified name that indicate a failed login attempt. To be counted as a
|
2765
|
+
* Values in the response header with the specified name that indicate a failed login or account creation attempt. To be counted as a failure, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON examples: "FailureValues": [ "LoginFailed", "Failed login" ] and "FailureValues": [ "AccountCreationFailed" ]
|
2688
2766
|
*/
|
2689
2767
|
FailureValues: ResponseInspectionHeaderFailureValues;
|
2690
2768
|
}
|
@@ -2693,15 +2771,15 @@ declare namespace WAFV2 {
|
|
2693
2771
|
export type ResponseInspectionHeaderSuccessValues = SuccessValue[];
|
2694
2772
|
export interface ResponseInspectionJson {
|
2695
2773
|
/**
|
2696
|
-
* The identifier for the value to match against in the JSON. The identifier must be an exact match, including case. JSON
|
2774
|
+
* The identifier for the value to match against in the JSON. The identifier must be an exact match, including case. JSON examples: "Identifier": [ "/login/success" ] and "Identifier": [ "/sign-up/success" ]
|
2697
2775
|
*/
|
2698
2776
|
Identifier: FieldIdentifier;
|
2699
2777
|
/**
|
2700
|
-
* Values for the specified identifier in the response JSON that indicate a successful login attempt. To be counted as a
|
2778
|
+
* Values for the specified identifier in the response JSON that indicate a successful login or account creation attempt. To be counted as a success, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "SuccessValues": [ "True", "Succeeded" ]
|
2701
2779
|
*/
|
2702
2780
|
SuccessValues: ResponseInspectionJsonSuccessValues;
|
2703
2781
|
/**
|
2704
|
-
* Values for the specified identifier in the response JSON that indicate a failed login attempt. To be counted as a
|
2782
|
+
* Values for the specified identifier in the response JSON that indicate a failed login or account creation attempt. To be counted as a failure, the value must be an exact match, including case. Each value must be unique among the success and failure values. JSON example: "FailureValues": [ "False", "Failed" ]
|
2705
2783
|
*/
|
2706
2784
|
FailureValues: ResponseInspectionJsonFailureValues;
|
2707
2785
|
}
|
@@ -2709,11 +2787,11 @@ declare namespace WAFV2 {
|
|
2709
2787
|
export type ResponseInspectionJsonSuccessValues = SuccessValue[];
|
2710
2788
|
export interface ResponseInspectionStatusCode {
|
2711
2789
|
/**
|
2712
|
-
* Status codes in the response that indicate a successful login attempt. To be counted as a
|
2790
|
+
* Status codes in the response that indicate a successful login or account creation attempt. To be counted as a success, the response status code must match one of these. Each code must be unique among the success and failure status codes. JSON example: "SuccessCodes": [ 200, 201 ]
|
2713
2791
|
*/
|
2714
2792
|
SuccessCodes: ResponseInspectionStatusCodeSuccessCodes;
|
2715
2793
|
/**
|
2716
|
-
* Status codes in the response that indicate a failed login attempt. To be counted as a
|
2794
|
+
* Status codes in the response that indicate a failed login or account creation attempt. To be counted as a failure, the response status code must match one of these. Each code must be unique among the success and failure status codes. JSON example: "FailureCodes": [ 400, 404 ]
|
2717
2795
|
*/
|
2718
2796
|
FailureCodes: ResponseInspectionStatusCodeFailureCodes;
|
2719
2797
|
}
|
@@ -3036,7 +3114,7 @@ declare namespace WAFV2 {
|
|
3036
3114
|
*/
|
3037
3115
|
NotStatement?: NotStatement;
|
3038
3116
|
/**
|
3039
|
-
* A rule statement used to run the rules that are defined in a managed rule group. To use this, provide the vendor name and the name of the rule group in this statement. You can retrieve the required names by calling ListAvailableManagedRuleGroups. You cannot nest a ManagedRuleGroupStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule. You are charged additional fees when you use the WAF Bot Control managed rule group AWSManagedRulesBotControlRuleSet
|
3117
|
+
* A rule statement used to run the rules that are defined in a managed rule group. To use this, provide the vendor name and the name of the rule group in this statement. You can retrieve the required names by calling ListAvailableManagedRuleGroups. You cannot nest a ManagedRuleGroupStatement, for example for use inside a NotStatement or OrStatement. It can only be referenced as a top-level statement within a rule. You are charged additional fees when you use the WAF Bot Control managed rule group AWSManagedRulesBotControlRuleSet, the WAF Fraud Control account takeover prevention (ATP) managed rule group AWSManagedRulesATPRuleSet, or the WAF Fraud Control account creation fraud prevention (ACFP) managed rule group AWSManagedRulesACFPRuleSet. For more information, see WAF Pricing.
|
3040
3118
|
*/
|
3041
3119
|
ManagedRuleGroupStatement?: ManagedRuleGroupStatement;
|
3042
3120
|
/**
|
@@ -3337,7 +3415,7 @@ declare namespace WAFV2 {
|
|
3337
3415
|
}
|
3338
3416
|
export interface UsernameField {
|
3339
3417
|
/**
|
3340
|
-
* The name of the username field. For example /form/username.
|
3418
|
+
* The name of the username field. How you specify this depends on the request inspection payload type. For JSON payloads, specify the field name in JSON pointer syntax. For information about the JSON Pointer syntax, see the Internet Engineering Task Force (IETF) documentation JavaScript Object Notation (JSON) Pointer. For example, for the JSON payload { "form": { "username": "THE_USERNAME" } }, the username field specification is /form/username. For form encoded payload types, use the HTML form names. For example, for an HTML form with the input element named username1, the username field specification is username1
|
3341
3419
|
*/
|
3342
3420
|
Identifier: FieldIdentifier;
|
3343
3421
|
}
|