aws-sdk 2.1451.0 → 2.1452.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/CHANGELOG.md +7 -1
- package/README.md +1 -1
- package/apis/appflow-2020-08-23.min.json +26 -24
- package/apis/medialive-2017-10-14.min.json +248 -225
- package/apis/wafv2-2019-07-29.min.json +7 -4
- package/clients/appflow.d.ts +6 -2
- package/clients/ec2.d.ts +1 -1
- package/clients/elbv2.d.ts +3 -3
- package/clients/medialive.d.ts +20 -0
- package/clients/wafv2.d.ts +16 -12
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +4 -4
- package/dist/aws-sdk.js +3 -3
- package/dist/aws-sdk.min.js +2 -2
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -2284,7 +2284,10 @@
|
|
2284
2284
|
"InspectionLevel"
|
2285
2285
|
],
|
2286
2286
|
"members": {
|
2287
|
-
"InspectionLevel": {}
|
2287
|
+
"InspectionLevel": {},
|
2288
|
+
"EnableMachineLearning": {
|
2289
|
+
"type": "boolean"
|
2290
|
+
}
|
2288
2291
|
}
|
2289
2292
|
},
|
2290
2293
|
"AWSManagedRulesATPRuleSet": {
|
@@ -2312,7 +2315,7 @@
|
|
2312
2315
|
}
|
2313
2316
|
},
|
2314
2317
|
"ResponseInspection": {
|
2315
|
-
"shape": "
|
2318
|
+
"shape": "S35"
|
2316
2319
|
},
|
2317
2320
|
"EnableRegexInPath": {
|
2318
2321
|
"type": "boolean"
|
@@ -2378,7 +2381,7 @@
|
|
2378
2381
|
}
|
2379
2382
|
},
|
2380
2383
|
"ResponseInspection": {
|
2381
|
-
"shape": "
|
2384
|
+
"shape": "S35"
|
2382
2385
|
},
|
2383
2386
|
"EnableRegexInPath": {
|
2384
2387
|
"type": "boolean"
|
@@ -2411,7 +2414,7 @@
|
|
2411
2414
|
"Identifier": {}
|
2412
2415
|
}
|
2413
2416
|
},
|
2414
|
-
"
|
2417
|
+
"S35": {
|
2415
2418
|
"type": "structure",
|
2416
2419
|
"members": {
|
2417
2420
|
"StatusCode": {
|
package/clients/appflow.d.ts
CHANGED
@@ -2758,11 +2758,15 @@ declare namespace Appflow {
|
|
2758
2758
|
/**
|
2759
2759
|
* The name of the user.
|
2760
2760
|
*/
|
2761
|
-
username
|
2761
|
+
username?: Username;
|
2762
2762
|
/**
|
2763
2763
|
* The password that corresponds to the user name.
|
2764
2764
|
*/
|
2765
|
-
password
|
2765
|
+
password?: Password;
|
2766
|
+
/**
|
2767
|
+
* The OAuth 2.0 credentials required to authenticate the user.
|
2768
|
+
*/
|
2769
|
+
oAuth2Credentials?: OAuth2Credentials;
|
2766
2770
|
}
|
2767
2771
|
export interface ServiceNowConnectorProfileProperties {
|
2768
2772
|
/**
|
package/clients/ec2.d.ts
CHANGED
@@ -26487,7 +26487,7 @@ declare namespace EC2 {
|
|
26487
26487
|
export type LocalStorageType = "hdd"|"ssd"|string;
|
26488
26488
|
export type LocalStorageTypeSet = LocalStorageType[];
|
26489
26489
|
export type Location = string;
|
26490
|
-
export type LocationType = "region"|"availability-zone"|"availability-zone-id"|string;
|
26490
|
+
export type LocationType = "region"|"availability-zone"|"availability-zone-id"|"outpost"|string;
|
26491
26491
|
export type LogDestinationType = "cloud-watch-logs"|"s3"|"kinesis-data-firehose"|string;
|
26492
26492
|
export type Long = number;
|
26493
26493
|
export interface MaintenanceDetails {
|
package/clients/elbv2.d.ts
CHANGED
@@ -93,11 +93,11 @@ declare class ELBv2 extends Service {
|
|
93
93
|
*/
|
94
94
|
deleteTargetGroup(callback?: (err: AWSError, data: ELBv2.Types.DeleteTargetGroupOutput) => void): Request<ELBv2.Types.DeleteTargetGroupOutput, AWSError>;
|
95
95
|
/**
|
96
|
-
* Deregisters the specified targets from the specified target group. After the targets are deregistered, they no longer receive traffic from the load balancer. Note: If the specified target does not exist, the action returns successfully.
|
96
|
+
* Deregisters the specified targets from the specified target group. After the targets are deregistered, they no longer receive traffic from the load balancer. The load balancer stops sending requests to targets that are deregistering, but uses connection draining to ensure that in-flight traffic completes on the existing connections. This deregistration delay is configured by default but can be updated for each target group. For more information, see the following: Deregistration delay in the Application Load Balancers User Guide Deregistration delay in the Network Load Balancers User Guide Deregistration delay in the Gateway Load Balancers User Guide Note: If the specified target does not exist, the action returns successfully.
|
97
97
|
*/
|
98
98
|
deregisterTargets(params: ELBv2.Types.DeregisterTargetsInput, callback?: (err: AWSError, data: ELBv2.Types.DeregisterTargetsOutput) => void): Request<ELBv2.Types.DeregisterTargetsOutput, AWSError>;
|
99
99
|
/**
|
100
|
-
* Deregisters the specified targets from the specified target group. After the targets are deregistered, they no longer receive traffic from the load balancer. Note: If the specified target does not exist, the action returns successfully.
|
100
|
+
* Deregisters the specified targets from the specified target group. After the targets are deregistered, they no longer receive traffic from the load balancer. The load balancer stops sending requests to targets that are deregistering, but uses connection draining to ensure that in-flight traffic completes on the existing connections. This deregistration delay is configured by default but can be updated for each target group. For more information, see the following: Deregistration delay in the Application Load Balancers User Guide Deregistration delay in the Network Load Balancers User Guide Deregistration delay in the Gateway Load Balancers User Guide Note: If the specified target does not exist, the action returns successfully.
|
101
101
|
*/
|
102
102
|
deregisterTargets(callback?: (err: AWSError, data: ELBv2.Types.DeregisterTargetsOutput) => void): Request<ELBv2.Types.DeregisterTargetsOutput, AWSError>;
|
103
103
|
/**
|
@@ -1819,7 +1819,7 @@ declare namespace ELBv2 {
|
|
1819
1819
|
export type TargetGroupArns = TargetGroupArn[];
|
1820
1820
|
export interface TargetGroupAttribute {
|
1821
1821
|
/**
|
1822
|
-
* The name of the attribute. The following attributes are supported by all load balancers: deregistration_delay.timeout_seconds - The amount of time, in seconds, for Elastic Load Balancing to wait before changing the state of a deregistering target from draining to unused. The range is 0-3600 seconds. The default value is 300 seconds. If the target is a Lambda function, this attribute is not supported. stickiness.enabled - Indicates whether target stickiness is enabled. The value is true or false. The default is false. stickiness.type - Indicates the type of stickiness. The possible values are: lb_cookie and app_cookie for Application Load Balancers. source_ip for Network Load Balancers. source_ip_dest_ip and source_ip_dest_ip_proto for Gateway Load Balancers. The following attributes are supported by Application Load Balancers and Network Load Balancers: load_balancing.cross_zone.enabled - Indicates whether cross zone load balancing is enabled. The value is true, false or use_load_balancer_configuration. The default is use_load_balancer_configuration. target_group_health.dns_failover.minimum_healthy_targets.count - The minimum number of targets that must be healthy. If the number of healthy targets is below this value, mark the zone as unhealthy in DNS, so that traffic is routed only to healthy zones. The possible values are off or an integer from 1 to the maximum number of targets. The default is off. target_group_health.dns_failover.minimum_healthy_targets.percentage - The minimum percentage of targets that must be healthy. If the percentage of healthy targets is below this value, mark the zone as unhealthy in DNS, so that traffic is routed only to healthy zones. The possible values are off or an integer from 1 to 100. The default is off. target_group_health.unhealthy_state_routing.minimum_healthy_targets.count - The minimum number of targets that must be healthy. If the number of healthy targets is below this value, send traffic to all targets, including unhealthy targets. The possible values are 1 to the maximum number of targets. The default is 1. target_group_health.unhealthy_state_routing.minimum_healthy_targets.percentage - The minimum percentage of targets that must be healthy. If the percentage of healthy targets is below this value, send traffic to all targets, including unhealthy targets. The possible values are off or an integer from 1 to 100. The default is off. The following attributes are supported only if the load balancer is an Application Load Balancer and the target is an instance or an IP address: load_balancing.algorithm.type - The load balancing algorithm determines how the load balancer selects targets when routing requests. The value is round_robin or least_outstanding_requests. The default is round_robin. slow_start.duration_seconds - The time period, in seconds, during which a newly registered target receives an increasing share of the traffic to the target group. After this time period ends, the target receives its full share of traffic. The range is 30-900 seconds (15 minutes). The default is 0 seconds (disabled). stickiness.app_cookie.cookie_name - Indicates the name of the application-based cookie. Names that start with the following prefixes are not allowed: AWSALB, AWSALBAPP, and AWSALBTG; they're reserved for use by the load balancer. stickiness.app_cookie.duration_seconds - The time period, in seconds, during which requests from a client should be routed to the same target. After this time period expires, the application-based cookie is considered stale. The range is 1 second to 1 week (604800 seconds). The default value is 1 day (86400 seconds). stickiness.lb_cookie.duration_seconds - The time period, in seconds, during which requests from a client should be routed to the same target. After this time period expires, the load balancer-generated cookie is considered stale. The range is 1 second to 1 week (604800 seconds). The default value is 1 day (86400 seconds). The following attribute is supported only if the load balancer is an Application Load Balancer and the target is a Lambda function: lambda.multi_value_headers.enabled - Indicates whether the request and response headers that are exchanged between the load balancer and the Lambda function include arrays of values or strings. The value is true or false. The default is false. If the value is false and the request contains a duplicate header field name or query parameter key, the load balancer uses the last value sent by the client. The following attributes are supported only by Network Load Balancers: deregistration_delay.connection_termination.enabled - Indicates whether the load balancer terminates connections at the end of the deregistration timeout. The value is true or false.
|
1822
|
+
* The name of the attribute. The following attributes are supported by all load balancers: deregistration_delay.timeout_seconds - The amount of time, in seconds, for Elastic Load Balancing to wait before changing the state of a deregistering target from draining to unused. The range is 0-3600 seconds. The default value is 300 seconds. If the target is a Lambda function, this attribute is not supported. stickiness.enabled - Indicates whether target stickiness is enabled. The value is true or false. The default is false. stickiness.type - Indicates the type of stickiness. The possible values are: lb_cookie and app_cookie for Application Load Balancers. source_ip for Network Load Balancers. source_ip_dest_ip and source_ip_dest_ip_proto for Gateway Load Balancers. The following attributes are supported by Application Load Balancers and Network Load Balancers: load_balancing.cross_zone.enabled - Indicates whether cross zone load balancing is enabled. The value is true, false or use_load_balancer_configuration. The default is use_load_balancer_configuration. target_group_health.dns_failover.minimum_healthy_targets.count - The minimum number of targets that must be healthy. If the number of healthy targets is below this value, mark the zone as unhealthy in DNS, so that traffic is routed only to healthy zones. The possible values are off or an integer from 1 to the maximum number of targets. The default is off. target_group_health.dns_failover.minimum_healthy_targets.percentage - The minimum percentage of targets that must be healthy. If the percentage of healthy targets is below this value, mark the zone as unhealthy in DNS, so that traffic is routed only to healthy zones. The possible values are off or an integer from 1 to 100. The default is off. target_group_health.unhealthy_state_routing.minimum_healthy_targets.count - The minimum number of targets that must be healthy. If the number of healthy targets is below this value, send traffic to all targets, including unhealthy targets. The possible values are 1 to the maximum number of targets. The default is 1. target_group_health.unhealthy_state_routing.minimum_healthy_targets.percentage - The minimum percentage of targets that must be healthy. If the percentage of healthy targets is below this value, send traffic to all targets, including unhealthy targets. The possible values are off or an integer from 1 to 100. The default is off. The following attributes are supported only if the load balancer is an Application Load Balancer and the target is an instance or an IP address: load_balancing.algorithm.type - The load balancing algorithm determines how the load balancer selects targets when routing requests. The value is round_robin or least_outstanding_requests. The default is round_robin. slow_start.duration_seconds - The time period, in seconds, during which a newly registered target receives an increasing share of the traffic to the target group. After this time period ends, the target receives its full share of traffic. The range is 30-900 seconds (15 minutes). The default is 0 seconds (disabled). stickiness.app_cookie.cookie_name - Indicates the name of the application-based cookie. Names that start with the following prefixes are not allowed: AWSALB, AWSALBAPP, and AWSALBTG; they're reserved for use by the load balancer. stickiness.app_cookie.duration_seconds - The time period, in seconds, during which requests from a client should be routed to the same target. After this time period expires, the application-based cookie is considered stale. The range is 1 second to 1 week (604800 seconds). The default value is 1 day (86400 seconds). stickiness.lb_cookie.duration_seconds - The time period, in seconds, during which requests from a client should be routed to the same target. After this time period expires, the load balancer-generated cookie is considered stale. The range is 1 second to 1 week (604800 seconds). The default value is 1 day (86400 seconds). The following attribute is supported only if the load balancer is an Application Load Balancer and the target is a Lambda function: lambda.multi_value_headers.enabled - Indicates whether the request and response headers that are exchanged between the load balancer and the Lambda function include arrays of values or strings. The value is true or false. The default is false. If the value is false and the request contains a duplicate header field name or query parameter key, the load balancer uses the last value sent by the client. The following attributes are supported only by Network Load Balancers: deregistration_delay.connection_termination.enabled - Indicates whether the load balancer terminates connections at the end of the deregistration timeout. The value is true or false. For new UDP/TCP_UDP target groups the default is true. Otherwise, the default is false. preserve_client_ip.enabled - Indicates whether client IP preservation is enabled. The value is true or false. The default is disabled if the target group type is IP address and the target group protocol is TCP or TLS. Otherwise, the default is enabled. Client IP preservation cannot be disabled for UDP and TCP_UDP target groups. proxy_protocol_v2.enabled - Indicates whether Proxy Protocol version 2 is enabled. The value is true or false. The default is false. target_health_state.unhealthy.connection_termination.enabled - Indicates whether the load balancer terminates connections to unhealthy targets. The value is true or false. The default is true. The following attributes are supported only by Gateway Load Balancers: target_failover.on_deregistration - Indicates how the Gateway Load Balancer handles existing flows when a target is deregistered. The possible values are rebalance and no_rebalance. The default is no_rebalance. The two attributes (target_failover.on_deregistration and target_failover.on_unhealthy) can't be set independently. The value you set for both attributes must be the same. target_failover.on_unhealthy - Indicates how the Gateway Load Balancer handles existing flows when a target is unhealthy. The possible values are rebalance and no_rebalance. The default is no_rebalance. The two attributes (target_failover.on_deregistration and target_failover.on_unhealthy) cannot be set independently. The value you set for both attributes must be the same.
|
1823
1823
|
*/
|
1824
1824
|
Key?: TargetGroupAttributeKey;
|
1825
1825
|
/**
|
package/clients/medialive.d.ts
CHANGED
@@ -2862,6 +2862,16 @@ You specify only the font family. All other style information (color, bold, posi
|
|
2862
2862
|
*/
|
2863
2863
|
ThumbnailConfiguration?: ThumbnailConfiguration;
|
2864
2864
|
}
|
2865
|
+
export interface EpochLockingSettings {
|
2866
|
+
/**
|
2867
|
+
* Optional. Enter a value here to use a custom epoch, instead of the standard epoch (which started at 1970-01-01T00:00:00 UTC). Specify the start time of the custom epoch, in YYYY-MM-DDTHH:MM:SS in UTC. The time must be 2000-01-01T00:00:00 or later. Always set the MM:SS portion to 00:00.
|
2868
|
+
*/
|
2869
|
+
CustomEpoch?: __string;
|
2870
|
+
/**
|
2871
|
+
* Optional. Enter a time for the jam sync. The default is midnight UTC. When epoch locking is enabled, MediaLive performs a daily jam sync on every output encode to ensure timecodes don’t diverge from the wall clock. The jam sync applies only to encodes with frame rate of 29.97 or 59.94 FPS. To override, enter a time in HH:MM:SS in UTC. Always set the MM:SS portion to 00:00.
|
2872
|
+
*/
|
2873
|
+
JamSyncTime?: __string;
|
2874
|
+
}
|
2865
2875
|
export interface Esam {
|
2866
2876
|
/**
|
2867
2877
|
* Sent as acquisitionPointIdentity to identify the MediaLive channel to the POIS.
|
@@ -3057,6 +3067,10 @@ EPOCH_LOCKING - MediaLive will attempt to synchronize the output of each pipelin
|
|
3057
3067
|
* Adjusts video input buffer for streams with very low video framerates. This is commonly set to enabled for music channels with less than one video frame per second.
|
3058
3068
|
*/
|
3059
3069
|
SupportLowFramerateInputs?: GlobalConfigurationLowFramerateInputs;
|
3070
|
+
/**
|
3071
|
+
* Advanced output locking settings
|
3072
|
+
*/
|
3073
|
+
OutputLockingSettings?: OutputLockingSettings;
|
3060
3074
|
}
|
3061
3075
|
export type GlobalConfigurationInputEndAction = "NONE"|"SWITCH_AND_LOOP_INPUTS"|string;
|
3062
3076
|
export type GlobalConfigurationLowFramerateInputs = "DISABLED"|"ENABLED"|string;
|
@@ -5731,6 +5745,10 @@ the timestamps will be in Coordinated Universal Time (UTC)
|
|
5731
5745
|
export interface OutputLocationRef {
|
5732
5746
|
DestinationRefId?: __string;
|
5733
5747
|
}
|
5748
|
+
export interface OutputLockingSettings {
|
5749
|
+
EpochLockingSettings?: EpochLockingSettings;
|
5750
|
+
PipelineLockingSettings?: PipelineLockingSettings;
|
5751
|
+
}
|
5734
5752
|
export interface OutputSettings {
|
5735
5753
|
ArchiveOutputSettings?: ArchiveOutputSettings;
|
5736
5754
|
FrameCaptureOutputSettings?: FrameCaptureOutputSettings;
|
@@ -5769,6 +5787,8 @@ the timestamps will be in Coordinated Universal Time (UTC)
|
|
5769
5787
|
PipelineId?: __string;
|
5770
5788
|
}
|
5771
5789
|
export type PipelineId = "PIPELINE_0"|"PIPELINE_1"|string;
|
5790
|
+
export interface PipelineLockingSettings {
|
5791
|
+
}
|
5772
5792
|
export interface PipelinePauseStateSettings {
|
5773
5793
|
/**
|
5774
5794
|
* Pipeline ID to pause ("PIPELINE_0" or "PIPELINE_1").
|
package/clients/wafv2.d.ts
CHANGED
@@ -504,6 +504,10 @@ declare namespace WAFV2 {
|
|
504
504
|
* The inspection level to use for the Bot Control rule group. The common level is the least expensive. The targeted level includes all common level rules and adds rules with more advanced inspection criteria. For details, see WAF Bot Control rule group in the WAF Developer Guide.
|
505
505
|
*/
|
506
506
|
InspectionLevel: InspectionLevel;
|
507
|
+
/**
|
508
|
+
* Applies only to the targeted inspection level. Determines whether to use machine learning (ML) to analyze your web traffic for bot-related activity. Machine learning is required for the Bot Control rules TGT_ML_CoordinatedActivityLow and TGT_ML_CoordinatedActivityMedium, which inspect for anomalous behavior that might indicate distributed, coordinated bot activity. For more information about this choice, see the listing for these rules in the table at Bot Control rules listing in the WAF Developer Guide. Default: TRUE
|
509
|
+
*/
|
510
|
+
EnableMachineLearning?: Boolean;
|
507
511
|
}
|
508
512
|
export type Action = string;
|
509
513
|
export interface ActionCondition {
|
@@ -551,7 +555,7 @@ declare namespace WAFV2 {
|
|
551
555
|
export type AssociatedResourceType = "CLOUDFRONT"|string;
|
552
556
|
export interface AssociationConfig {
|
553
557
|
/**
|
554
|
-
* Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384
|
558
|
+
* Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
|
555
559
|
*/
|
556
560
|
RequestBody?: RequestBody;
|
557
561
|
}
|
@@ -563,7 +567,7 @@ declare namespace WAFV2 {
|
|
563
567
|
}
|
564
568
|
export interface Body {
|
565
569
|
/**
|
566
|
-
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192
|
570
|
+
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
567
571
|
*/
|
568
572
|
OversizeHandling?: OversizeHandling;
|
569
573
|
}
|
@@ -869,7 +873,7 @@ declare namespace WAFV2 {
|
|
869
873
|
*/
|
870
874
|
TokenDomains?: TokenDomains;
|
871
875
|
/**
|
872
|
-
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384
|
876
|
+
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
|
873
877
|
*/
|
874
878
|
AssociationConfig?: AssociationConfig;
|
875
879
|
}
|
@@ -1174,7 +1178,7 @@ declare namespace WAFV2 {
|
|
1174
1178
|
*/
|
1175
1179
|
QueryString?: QueryString;
|
1176
1180
|
/**
|
1177
|
-
* Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192
|
1181
|
+
* Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
|
1178
1182
|
*/
|
1179
1183
|
Body?: Body;
|
1180
1184
|
/**
|
@@ -1182,7 +1186,7 @@ declare namespace WAFV2 {
|
|
1182
1186
|
*/
|
1183
1187
|
Method?: Method;
|
1184
1188
|
/**
|
1185
|
-
* Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192
|
1189
|
+
* Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
|
1186
1190
|
*/
|
1187
1191
|
JsonBody?: JsonBody;
|
1188
1192
|
/**
|
@@ -1729,7 +1733,7 @@ declare namespace WAFV2 {
|
|
1729
1733
|
*/
|
1730
1734
|
InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
|
1731
1735
|
/**
|
1732
|
-
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192
|
1736
|
+
* What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
|
1733
1737
|
*/
|
1734
1738
|
OversizeHandling?: OversizeHandling;
|
1735
1739
|
}
|
@@ -2682,7 +2686,7 @@ declare namespace WAFV2 {
|
|
2682
2686
|
export type RequestBody = {[key: string]: RequestBodyAssociatedResourceTypeConfig};
|
2683
2687
|
export interface RequestBodyAssociatedResourceTypeConfig {
|
2684
2688
|
/**
|
2685
|
-
* Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384
|
2689
|
+
* Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 bytes)
|
2686
2690
|
*/
|
2687
2691
|
DefaultSizeInspectionLimit: SizeInspectionLimit;
|
2688
2692
|
}
|
@@ -2810,7 +2814,7 @@ declare namespace WAFV2 {
|
|
2810
2814
|
export type ResponseStatusCode = number;
|
2811
2815
|
export interface Rule {
|
2812
2816
|
/**
|
2813
|
-
* The name of the rule.
|
2817
|
+
* The name of the rule. If you change the name of a Rule after you create it and you want the rule's metric name to reflect the change, update the metric name in the rule's VisibilityConfig settings. WAF doesn't automatically update the metric name when you update the rule name.
|
2814
2818
|
*/
|
2815
2819
|
Name: EntityName;
|
2816
2820
|
/**
|
@@ -2834,7 +2838,7 @@ declare namespace WAFV2 {
|
|
2834
2838
|
*/
|
2835
2839
|
RuleLabels?: Labels;
|
2836
2840
|
/**
|
2837
|
-
* Defines and enables Amazon CloudWatch metrics and web request sample collection.
|
2841
|
+
* Defines and enables Amazon CloudWatch metrics and web request sample collection. If you change the name of a Rule after you create it and you want the rule's metric name to reflect the change, update the metric name as well. WAF doesn't automatically update the metric name.
|
2838
2842
|
*/
|
2839
2843
|
VisibilityConfig: VisibilityConfig;
|
2840
2844
|
/**
|
@@ -3088,7 +3092,7 @@ declare namespace WAFV2 {
|
|
3088
3092
|
*/
|
3089
3093
|
XssMatchStatement?: XssMatchStatement;
|
3090
3094
|
/**
|
3091
|
-
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192
|
3095
|
+
* A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL AssociationConfig, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
|
3092
3096
|
*/
|
3093
3097
|
SizeConstraintStatement?: SizeConstraintStatement;
|
3094
3098
|
/**
|
@@ -3411,7 +3415,7 @@ declare namespace WAFV2 {
|
|
3411
3415
|
*/
|
3412
3416
|
TokenDomains?: TokenDomains;
|
3413
3417
|
/**
|
3414
|
-
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384
|
3418
|
+
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
|
3415
3419
|
*/
|
3416
3420
|
AssociationConfig?: AssociationConfig;
|
3417
3421
|
}
|
@@ -3522,7 +3526,7 @@ declare namespace WAFV2 {
|
|
3522
3526
|
*/
|
3523
3527
|
TokenDomains?: TokenDomains;
|
3524
3528
|
/**
|
3525
|
-
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384
|
3529
|
+
* Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
|
3526
3530
|
*/
|
3527
3531
|
AssociationConfig?: AssociationConfig;
|
3528
3532
|
}
|