aws-sdk 2.1625.0 → 2.1626.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/chatbot-2017-10-11.min.json +138 -24
- package/apis/cloudformation-2010-05-15.min.json +48 -43
- package/apis/kms-2014-11-01.min.json +3 -0
- package/apis/opensearch-2021-01-01.min.json +18 -12
- package/apis/wafv2-2019-07-29.min.json +42 -32
- package/clients/chatbot.d.ts +100 -0
- package/clients/cloudformation.d.ts +11 -2
- package/clients/kms.d.ts +6 -6
- package/clients/opensearch.d.ts +14 -1
- package/clients/wafv2.d.ts +34 -4
- package/dist/aws-sdk-core-react-native.js +4 -2
- package/dist/aws-sdk-react-native.js +9 -7
- package/dist/aws-sdk.js +57 -47
- package/dist/aws-sdk.min.js +53 -53
- package/lib/core.js +1 -1
- package/lib/query/query_param_serializer.js +3 -1
- package/package.json +1 -1
package/clients/kms.d.ts
CHANGED
@@ -220,11 +220,11 @@ declare class KMS extends Service {
|
|
220
220
|
*/
|
221
221
|
getKeyRotationStatus(callback?: (err: AWSError, data: KMS.Types.GetKeyRotationStatusResponse) => void): Request<KMS.Types.GetKeyRotationStatusResponse, AWSError>;
|
222
222
|
/**
|
223
|
-
* Returns the public key and an import token you need to import or reimport key material for a KMS key. By default, KMS keys are created with key material that KMS generates. This operation supports Importing key material, an advanced feature that lets you generate and import the cryptographic key material for a KMS key. For more information about importing key material into KMS, see Importing key material in the Key Management Service Developer Guide. Before calling GetParametersForImport, use the CreateKey operation with an Origin value of EXTERNAL to create a KMS key with no key material. You can import key material for a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric signing KMS key. You can also import key material into a multi-Region key of any supported type. However, you can't import key material into a KMS key in a custom key store. You can also use GetParametersForImport to get a public key and import token to reimport the original key material into a KMS key whose key material expired or was deleted. GetParametersForImport returns the items that you need to import your key material. The public key (or "wrapping key") of an
|
223
|
+
* Returns the public key and an import token you need to import or reimport key material for a KMS key. By default, KMS keys are created with key material that KMS generates. This operation supports Importing key material, an advanced feature that lets you generate and import the cryptographic key material for a KMS key. For more information about importing key material into KMS, see Importing key material in the Key Management Service Developer Guide. Before calling GetParametersForImport, use the CreateKey operation with an Origin value of EXTERNAL to create a KMS key with no key material. You can import key material for a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric signing KMS key. You can also import key material into a multi-Region key of any supported type. However, you can't import key material into a KMS key in a custom key store. You can also use GetParametersForImport to get a public key and import token to reimport the original key material into a KMS key whose key material expired or was deleted. GetParametersForImport returns the items that you need to import your key material. The public key (or "wrapping key") of an asymmetric key pair that KMS generates. You will use this public key to encrypt ("wrap") your key material while it's in transit to KMS. A import token that ensures that KMS can decrypt your key material and associate it with the correct KMS key. The public key and its import token are permanently linked and must be used together. Each public key and import token set is valid for 24 hours. The expiration date and time appear in the ParametersValidTo field in the GetParametersForImport response. You cannot use an expired public key or import token in an ImportKeyMaterial request. If your key and token expire, send another GetParametersForImport request. GetParametersForImport requires the following information: The key ID of the KMS key for which you are importing the key material. The key spec of the public key ("wrapping key") that you will use to encrypt your key material during import. The wrapping algorithm that you will use with the public key to encrypt your key material. You can use the same or a different public key spec and wrapping algorithm each time you import or reimport the same key material. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:GetParametersForImport (key policy) Related operations: ImportKeyMaterial DeleteImportedKeyMaterial Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
|
224
224
|
*/
|
225
225
|
getParametersForImport(params: KMS.Types.GetParametersForImportRequest, callback?: (err: AWSError, data: KMS.Types.GetParametersForImportResponse) => void): Request<KMS.Types.GetParametersForImportResponse, AWSError>;
|
226
226
|
/**
|
227
|
-
* Returns the public key and an import token you need to import or reimport key material for a KMS key. By default, KMS keys are created with key material that KMS generates. This operation supports Importing key material, an advanced feature that lets you generate and import the cryptographic key material for a KMS key. For more information about importing key material into KMS, see Importing key material in the Key Management Service Developer Guide. Before calling GetParametersForImport, use the CreateKey operation with an Origin value of EXTERNAL to create a KMS key with no key material. You can import key material for a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric signing KMS key. You can also import key material into a multi-Region key of any supported type. However, you can't import key material into a KMS key in a custom key store. You can also use GetParametersForImport to get a public key and import token to reimport the original key material into a KMS key whose key material expired or was deleted. GetParametersForImport returns the items that you need to import your key material. The public key (or "wrapping key") of an
|
227
|
+
* Returns the public key and an import token you need to import or reimport key material for a KMS key. By default, KMS keys are created with key material that KMS generates. This operation supports Importing key material, an advanced feature that lets you generate and import the cryptographic key material for a KMS key. For more information about importing key material into KMS, see Importing key material in the Key Management Service Developer Guide. Before calling GetParametersForImport, use the CreateKey operation with an Origin value of EXTERNAL to create a KMS key with no key material. You can import key material for a symmetric encryption KMS key, HMAC KMS key, asymmetric encryption KMS key, or asymmetric signing KMS key. You can also import key material into a multi-Region key of any supported type. However, you can't import key material into a KMS key in a custom key store. You can also use GetParametersForImport to get a public key and import token to reimport the original key material into a KMS key whose key material expired or was deleted. GetParametersForImport returns the items that you need to import your key material. The public key (or "wrapping key") of an asymmetric key pair that KMS generates. You will use this public key to encrypt ("wrap") your key material while it's in transit to KMS. A import token that ensures that KMS can decrypt your key material and associate it with the correct KMS key. The public key and its import token are permanently linked and must be used together. Each public key and import token set is valid for 24 hours. The expiration date and time appear in the ParametersValidTo field in the GetParametersForImport response. You cannot use an expired public key or import token in an ImportKeyMaterial request. If your key and token expire, send another GetParametersForImport request. GetParametersForImport requires the following information: The key ID of the KMS key for which you are importing the key material. The key spec of the public key ("wrapping key") that you will use to encrypt your key material during import. The wrapping algorithm that you will use with the public key to encrypt your key material. You can use the same or a different public key spec and wrapping algorithm each time you import or reimport the same key material. The KMS key that you use for this operation must be in a compatible key state. For details, see Key states of KMS keys in the Key Management Service Developer Guide. Cross-account use: No. You cannot perform this operation on a KMS key in a different Amazon Web Services account. Required permissions: kms:GetParametersForImport (key policy) Related operations: ImportKeyMaterial DeleteImportedKeyMaterial Eventual consistency: The KMS API follows an eventual consistency model. For more information, see KMS eventual consistency.
|
228
228
|
*/
|
229
229
|
getParametersForImport(callback?: (err: AWSError, data: KMS.Types.GetParametersForImportResponse) => void): Request<KMS.Types.GetParametersForImportResponse, AWSError>;
|
230
230
|
/**
|
@@ -430,7 +430,7 @@ declare class KMS extends Service {
|
|
430
430
|
}
|
431
431
|
declare namespace KMS {
|
432
432
|
export type AWSAccountIdType = string;
|
433
|
-
export type AlgorithmSpec = "RSAES_PKCS1_V1_5"|"RSAES_OAEP_SHA_1"|"RSAES_OAEP_SHA_256"|"RSA_AES_KEY_WRAP_SHA_1"|"RSA_AES_KEY_WRAP_SHA_256"|string;
|
433
|
+
export type AlgorithmSpec = "RSAES_PKCS1_V1_5"|"RSAES_OAEP_SHA_1"|"RSAES_OAEP_SHA_256"|"RSA_AES_KEY_WRAP_SHA_1"|"RSA_AES_KEY_WRAP_SHA_256"|"SM2PKE"|string;
|
434
434
|
export type AliasList = AliasListEntry[];
|
435
435
|
export interface AliasListEntry {
|
436
436
|
/**
|
@@ -1171,11 +1171,11 @@ declare namespace KMS {
|
|
1171
1171
|
*/
|
1172
1172
|
KeyId: KeyIdType;
|
1173
1173
|
/**
|
1174
|
-
* The algorithm you will use with the
|
1174
|
+
* The algorithm you will use with the asymmetric public key (PublicKey) in the response to protect your key material during import. For more information, see Select a wrapping algorithm in the Key Management Service Developer Guide. For RSA_AES wrapping algorithms, you encrypt your key material with an AES key that you generate, then encrypt your AES key with the RSA public key from KMS. For RSAES wrapping algorithms, you encrypt your key material directly with the RSA public key from KMS. For SM2PKE wrapping algorithms, you encrypt your key material directly with the SM2 public key from KMS. The wrapping algorithms that you can use depend on the type of key material that you are importing. To import an RSA private key, you must use an RSA_AES wrapping algorithm, except in China Regions, where you must use the SM2PKE wrapping algorithm to import an RSA private key. The SM2PKE wrapping algorithm is available only in China Regions. The RSA_AES_KEY_WRAP_SHA_256 and RSA_AES_KEY_WRAP_SHA_1 wrapping algorithms are not supported in China Regions. RSA_AES_KEY_WRAP_SHA_256 — Supported for wrapping RSA and ECC key material. RSA_AES_KEY_WRAP_SHA_1 — Supported for wrapping RSA and ECC key material. RSAES_OAEP_SHA_256 — Supported for all types of key material, except RSA key material (private key). You cannot use the RSAES_OAEP_SHA_256 wrapping algorithm with the RSA_2048 wrapping key spec to wrap ECC_NIST_P521 key material. RSAES_OAEP_SHA_1 — Supported for all types of key material, except RSA key material (private key). You cannot use the RSAES_OAEP_SHA_1 wrapping algorithm with the RSA_2048 wrapping key spec to wrap ECC_NIST_P521 key material. RSAES_PKCS1_V1_5 (Deprecated) — As of October 10, 2023, KMS does not support the RSAES_PKCS1_V1_5 wrapping algorithm. SM2PKE (China Regions only) — supported for wrapping RSA, ECC, and SM2 key material.
|
1175
1175
|
*/
|
1176
1176
|
WrappingAlgorithm: AlgorithmSpec;
|
1177
1177
|
/**
|
1178
|
-
* The type of
|
1178
|
+
* The type of public key to return in the response. You will use this wrapping key with the specified wrapping algorithm to protect your key material during import. Use the longest wrapping key that is practical. You cannot use an RSA_2048 public key to directly wrap an ECC_NIST_P521 private key. Instead, use an RSA_AES wrapping algorithm or choose a longer RSA public key. The SM2 wrapping key spec is available only in China Regions.
|
1179
1179
|
*/
|
1180
1180
|
WrappingKeySpec: WrappingKeySpec;
|
1181
1181
|
}
|
@@ -2108,7 +2108,7 @@ declare namespace KMS {
|
|
2108
2108
|
*/
|
2109
2109
|
SigningAlgorithm?: SigningAlgorithmSpec;
|
2110
2110
|
}
|
2111
|
-
export type WrappingKeySpec = "RSA_2048"|"RSA_3072"|"RSA_4096"|string;
|
2111
|
+
export type WrappingKeySpec = "RSA_2048"|"RSA_3072"|"RSA_4096"|"SM2"|string;
|
2112
2112
|
export interface XksKeyConfigurationType {
|
2113
2113
|
/**
|
2114
2114
|
* The ID of the external key in its external key manager. This is the ID that the external key store proxy uses to identify the external key.
|
package/clients/opensearch.d.ts
CHANGED
@@ -1321,9 +1321,14 @@ declare namespace OpenSearch {
|
|
1321
1321
|
* A description of the data source.
|
1322
1322
|
*/
|
1323
1323
|
Description?: DataSourceDescription;
|
1324
|
+
/**
|
1325
|
+
* The status of the data source.
|
1326
|
+
*/
|
1327
|
+
Status?: DataSourceStatus;
|
1324
1328
|
}
|
1325
1329
|
export type DataSourceList = DataSourceDetails[];
|
1326
1330
|
export type DataSourceName = string;
|
1331
|
+
export type DataSourceStatus = "ACTIVE"|"DISABLED"|string;
|
1327
1332
|
export interface DataSourceType {
|
1328
1333
|
/**
|
1329
1334
|
* An Amazon S3 data source.
|
@@ -2052,7 +2057,7 @@ declare namespace OpenSearch {
|
|
2052
2057
|
*/
|
2053
2058
|
Endpoints?: EndpointsMap;
|
2054
2059
|
/**
|
2055
|
-
* The
|
2060
|
+
* The dual stack hosted zone ID for the domain.
|
2056
2061
|
*/
|
2057
2062
|
DomainEndpointV2HostedZoneId?: HostedZoneId;
|
2058
2063
|
/**
|
@@ -2318,6 +2323,10 @@ declare namespace OpenSearch {
|
|
2318
2323
|
* A description of the data source.
|
2319
2324
|
*/
|
2320
2325
|
Description?: DataSourceDescription;
|
2326
|
+
/**
|
2327
|
+
* The status of the data source response.
|
2328
|
+
*/
|
2329
|
+
Status?: DataSourceStatus;
|
2321
2330
|
}
|
2322
2331
|
export interface GetDomainMaintenanceStatusRequest {
|
2323
2332
|
/**
|
@@ -3579,6 +3588,10 @@ declare namespace OpenSearch {
|
|
3579
3588
|
* A new description of the data source.
|
3580
3589
|
*/
|
3581
3590
|
Description?: DataSourceDescription;
|
3591
|
+
/**
|
3592
|
+
* The status of the data source update request.
|
3593
|
+
*/
|
3594
|
+
Status?: DataSourceStatus;
|
3582
3595
|
}
|
3583
3596
|
export interface UpdateDataSourceResponse {
|
3584
3597
|
/**
|
package/clients/wafv2.d.ts
CHANGED
@@ -583,7 +583,7 @@ declare namespace WAFV2 {
|
|
583
583
|
export type Boolean = boolean;
|
584
584
|
export interface ByteMatchStatement {
|
585
585
|
/**
|
586
|
-
* A string value that you want WAF to search for. WAF searches only in the part of web requests that you designate for inspection in FieldToMatch. The maximum length of the value is 200 bytes. Valid values depend on the component that you specify for inspection in FieldToMatch: Method: The HTTP method that you want WAF to search for. This indicates the type of operation specified in the request. UriPath: The value that you want WAF to search for in the URI path, for example, /images/daily-ad.jpg. JA3Fingerprint: Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. You can use this choice only with a string match ByteMatchStatement with the PositionalConstraint set to EXACTLY. You can obtain the JA3 fingerprint for client requests from the web ACL logs. If WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the WAF Developer Guide. HeaderOrder: The list of header names to match for. WAF creates a string that contains the ordered list of header names, from the headers in the web request, and then matches against that string. If SearchString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 200 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent. If you want to search the User-Agent header for the value BadBot, you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90, in the value of SearchString. If you're using the CLI or one of the Amazon Web Services SDKs The value that you want WAF to search for. The SDK automatically base64 encodes the value.
|
586
|
+
* A string value that you want WAF to search for. WAF searches only in the part of web requests that you designate for inspection in FieldToMatch. The maximum length of the value is 200 bytes. Valid values depend on the component that you specify for inspection in FieldToMatch: Method: The HTTP method that you want WAF to search for. This indicates the type of operation specified in the request. UriPath: The value that you want WAF to search for in the URI path, for example, /images/daily-ad.jpg. JA3Fingerprint: Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. You can use this choice only with a string match ByteMatchStatement with the PositionalConstraint set to EXACTLY. You can obtain the JA3 fingerprint for client requests from the web ACL logs. If WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the WAF Developer Guide. HeaderOrder: The list of header names to match for. WAF creates a string that contains the ordered list of header names, from the headers in the web request, and then matches against that string. If SearchString includes alphabetic characters A-Z and a-z, note that the value is case sensitive. If you're using the WAF API Specify a base64-encoded version of the value. The maximum length of the value before you base64-encode it is 200 bytes. For example, suppose the value of Type is HEADER and the value of Data is User-Agent. If you want to search the User-Agent header for the value BadBot, you base64-encode BadBot using MIME base64-encoding and include the resulting value, QmFkQm90, in the value of SearchString. If you're using the CLI or one of the Amazon Web Services SDKs The value that you want WAF to search for. The SDK automatically base64 encodes the value.
|
587
587
|
*/
|
588
588
|
SearchString: SearchString;
|
589
589
|
/**
|
@@ -999,6 +999,14 @@ declare namespace WAFV2 {
|
|
999
999
|
* The Amazon Resource Name (ARN) of the web ACL from which you want to delete the LoggingConfiguration.
|
1000
1000
|
*/
|
1001
1001
|
ResourceArn: ResourceArn;
|
1002
|
+
/**
|
1003
|
+
* Used to distinguish between various logging options. Currently, there is one option. Default: WAF_LOGS
|
1004
|
+
*/
|
1005
|
+
LogType?: LogType;
|
1006
|
+
/**
|
1007
|
+
* The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage. The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide. Default: CUSTOMER
|
1008
|
+
*/
|
1009
|
+
LogScope?: LogScope;
|
1002
1010
|
}
|
1003
1011
|
export interface DeleteLoggingConfigurationResponse {
|
1004
1012
|
}
|
@@ -1224,7 +1232,7 @@ declare namespace WAFV2 {
|
|
1224
1232
|
*/
|
1225
1233
|
HeaderOrder?: HeaderOrder;
|
1226
1234
|
/**
|
1227
|
-
* Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. You can use this choice only with a string match ByteMatchStatement with the PositionalConstraint set to EXACTLY. You can obtain the JA3 fingerprint for client requests from the web ACL logs. If WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the WAF Developer Guide. Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
1235
|
+
* Available for use with Amazon CloudFront distributions and Application Load Balancers. Match against the request's JA3 fingerprint. The JA3 fingerprint is a 32-character hash derived from the TLS Client Hello of an incoming request. This fingerprint serves as a unique identifier for the client's TLS configuration. WAF calculates and logs this fingerprint for each request that has enough TLS Client Hello information for the calculation. Almost all web requests include this information. You can use this choice only with a string match ByteMatchStatement with the PositionalConstraint set to EXACTLY. You can obtain the JA3 fingerprint for client requests from the web ACL logs. If WAF is able to calculate the fingerprint, it includes it in the logs. For information about the logging fields, see Log fields in the WAF Developer Guide. Provide the JA3 fingerprint string from the logs in your string match statement specification, to match with any future requests that have the same TLS configuration.
|
1228
1236
|
*/
|
1229
1237
|
JA3Fingerprint?: JA3Fingerprint;
|
1230
1238
|
}
|
@@ -1366,6 +1374,14 @@ declare namespace WAFV2 {
|
|
1366
1374
|
* The Amazon Resource Name (ARN) of the web ACL for which you want to get the LoggingConfiguration.
|
1367
1375
|
*/
|
1368
1376
|
ResourceArn: ResourceArn;
|
1377
|
+
/**
|
1378
|
+
* Used to distinguish between various logging options. Currently, there is one option. Default: WAF_LOGS
|
1379
|
+
*/
|
1380
|
+
LogType?: LogType;
|
1381
|
+
/**
|
1382
|
+
* The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage. The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide. Default: CUSTOMER
|
1383
|
+
*/
|
1384
|
+
LogScope?: LogScope;
|
1369
1385
|
}
|
1370
1386
|
export interface GetLoggingConfigurationResponse {
|
1371
1387
|
/**
|
@@ -1941,6 +1957,10 @@ declare namespace WAFV2 {
|
|
1941
1957
|
* The maximum number of objects that you want WAF to return for this request. If more objects are available, in the response, WAF provides a NextMarker value that you can use in a subsequent call to get the next batch of objects.
|
1942
1958
|
*/
|
1943
1959
|
Limit?: PaginationLimit;
|
1960
|
+
/**
|
1961
|
+
* The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage. The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide. Default: CUSTOMER
|
1962
|
+
*/
|
1963
|
+
LogScope?: LogScope;
|
1944
1964
|
}
|
1945
1965
|
export interface ListLoggingConfigurationsResponse {
|
1946
1966
|
/**
|
@@ -2115,6 +2135,8 @@ declare namespace WAFV2 {
|
|
2115
2135
|
}
|
2116
2136
|
export type LockToken = string;
|
2117
2137
|
export type LogDestinationConfigs = ResourceArn[];
|
2138
|
+
export type LogScope = "CUSTOMER"|"SECURITY_LAKE"|string;
|
2139
|
+
export type LogType = "WAF_LOGS"|string;
|
2118
2140
|
export interface LoggingConfiguration {
|
2119
2141
|
/**
|
2120
2142
|
* The Amazon Resource Name (ARN) of the web ACL that you want to associate with LogDestinationConfigs.
|
@@ -2125,7 +2147,7 @@ declare namespace WAFV2 {
|
|
2125
2147
|
*/
|
2126
2148
|
LogDestinationConfigs: LogDestinationConfigs;
|
2127
2149
|
/**
|
2128
|
-
* The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting. Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch. You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method.
|
2150
|
+
* The parts of the request that you want to keep out of the logs. For example, if you redact the SingleHeader field, the HEADER field in the logs will be REDACTED for all rules that use the SingleHeader FieldToMatch setting. Redaction applies only to the component that's specified in the rule's FieldToMatch setting, so the SingleHeader redaction doesn't apply to rules that use the Headers FieldToMatch. You can specify only the following fields for redaction: UriPath, QueryString, SingleHeader, and Method. This setting has no impact on request sampling. With request sampling, the only way to exclude fields is by disabling sampling in the web ACL visibility configuration.
|
2129
2151
|
*/
|
2130
2152
|
RedactedFields?: RedactedFields;
|
2131
2153
|
/**
|
@@ -2136,6 +2158,14 @@ declare namespace WAFV2 {
|
|
2136
2158
|
* Filtering that specifies which web requests are kept in the logs and which are dropped. You can filter on the rule action and on the web request labels that were applied by matching rules during web ACL evaluation.
|
2137
2159
|
*/
|
2138
2160
|
LoggingFilter?: LoggingFilter;
|
2161
|
+
/**
|
2162
|
+
* Used to distinguish between various logging options. Currently, there is one option. Default: WAF_LOGS
|
2163
|
+
*/
|
2164
|
+
LogType?: LogType;
|
2165
|
+
/**
|
2166
|
+
* The owner of the logging configuration, which must be set to CUSTOMER for the configurations that you manage. The log scope SECURITY_LAKE indicates a configuration that is managed through Amazon Security Lake. You can use Security Lake to collect log and event data from various sources for normalization, analysis, and management. For information, see Collecting data from Amazon Web Services services in the Amazon Security Lake user guide. Default: CUSTOMER
|
2167
|
+
*/
|
2168
|
+
LogScope?: LogScope;
|
2139
2169
|
}
|
2140
2170
|
export type LoggingConfigurations = LoggingConfiguration[];
|
2141
2171
|
export interface LoggingFilter {
|
@@ -3484,7 +3514,7 @@ declare namespace WAFV2 {
|
|
3484
3514
|
export type VersionsToPublish = {[key: string]: VersionToPublish};
|
3485
3515
|
export interface VisibilityConfig {
|
3486
3516
|
/**
|
3487
|
-
* Indicates whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console.
|
3517
|
+
* Indicates whether WAF should store a sampling of the web requests that match the rules. You can view the sampled requests through the WAF console. Request sampling doesn't provide a field redaction option, and any field redaction that you specify in your logging configuration doesn't affect sampling. The only way to exclude fields from request sampling is by disabling sampling in the web ACL visibility configuration.
|
3488
3518
|
*/
|
3489
3519
|
SampledRequestsEnabled: Boolean;
|
3490
3520
|
/**
|
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
83
83
|
/**
|
84
84
|
* @constant
|
85
85
|
*/
|
86
|
-
VERSION: '2.
|
86
|
+
VERSION: '2.1626.0',
|
87
87
|
|
88
88
|
/**
|
89
89
|
* @api private
|
@@ -2949,7 +2949,9 @@ return /******/ (function(modules) { // webpackBootstrap
|
|
2949
2949
|
var memberRules = rules.member || {};
|
2950
2950
|
|
2951
2951
|
if (list.length === 0) {
|
2952
|
-
|
2952
|
+
if (rules.api.protocol !== 'ec2') {
|
2953
|
+
fn.call(this, name, null);
|
2954
|
+
}
|
2953
2955
|
return;
|
2954
2956
|
}
|
2955
2957
|
|