cdk-docker-image-deployment 0.0.54 → 0.0.55

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -132,11 +132,11 @@ declare class WAFV2 extends Service {
132
132
  */
133
133
  disassociateWebACL(callback?: (err: AWSError, data: WAFV2.Types.DisassociateWebACLResponse) => void): Request<WAFV2.Types.DisassociateWebACLResponse, AWSError>;
134
134
  /**
135
- * Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
135
+ * Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
136
136
  */
137
137
  generateMobileSdkReleaseUrl(params: WAFV2.Types.GenerateMobileSdkReleaseUrlRequest, callback?: (err: AWSError, data: WAFV2.Types.GenerateMobileSdkReleaseUrlResponse) => void): Request<WAFV2.Types.GenerateMobileSdkReleaseUrlResponse, AWSError>;
138
138
  /**
139
- * Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
139
+ * Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
140
140
  */
141
141
  generateMobileSdkReleaseUrl(callback?: (err: AWSError, data: WAFV2.Types.GenerateMobileSdkReleaseUrlResponse) => void): Request<WAFV2.Types.GenerateMobileSdkReleaseUrlResponse, AWSError>;
142
142
  /**
@@ -164,11 +164,11 @@ declare class WAFV2 extends Service {
164
164
  */
165
165
  getManagedRuleSet(callback?: (err: AWSError, data: WAFV2.Types.GetManagedRuleSetResponse) => void): Request<WAFV2.Types.GetManagedRuleSetResponse, AWSError>;
166
166
  /**
167
- * Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
167
+ * Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
168
168
  */
169
169
  getMobileSdkRelease(params: WAFV2.Types.GetMobileSdkReleaseRequest, callback?: (err: AWSError, data: WAFV2.Types.GetMobileSdkReleaseResponse) => void): Request<WAFV2.Types.GetMobileSdkReleaseResponse, AWSError>;
170
170
  /**
171
- * Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
171
+ * Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
172
172
  */
173
173
  getMobileSdkRelease(callback?: (err: AWSError, data: WAFV2.Types.GetMobileSdkReleaseResponse) => void): Request<WAFV2.Types.GetMobileSdkReleaseResponse, AWSError>;
174
174
  /**
@@ -268,11 +268,11 @@ declare class WAFV2 extends Service {
268
268
  */
269
269
  listManagedRuleSets(callback?: (err: AWSError, data: WAFV2.Types.ListManagedRuleSetsResponse) => void): Request<WAFV2.Types.ListManagedRuleSetsResponse, AWSError>;
270
270
  /**
271
- * Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
271
+ * Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
272
272
  */
273
273
  listMobileSdkReleases(params: WAFV2.Types.ListMobileSdkReleasesRequest, callback?: (err: AWSError, data: WAFV2.Types.ListMobileSdkReleasesResponse) => void): Request<WAFV2.Types.ListMobileSdkReleasesResponse, AWSError>;
274
274
  /**
275
- * Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage Security Token Service (STS) security tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
275
+ * Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
276
276
  */
277
277
  listMobileSdkReleases(callback?: (err: AWSError, data: WAFV2.Types.ListMobileSdkReleasesResponse) => void): Request<WAFV2.Types.ListMobileSdkReleasesResponse, AWSError>;
278
278
  /**
@@ -397,14 +397,20 @@ declare class WAFV2 extends Service {
397
397
  updateWebACL(callback?: (err: AWSError, data: WAFV2.Types.UpdateWebACLResponse) => void): Request<WAFV2.Types.UpdateWebACLResponse, AWSError>;
398
398
  }
399
399
  declare namespace WAFV2 {
400
+ export interface AWSManagedRulesBotControlRuleSet {
401
+ /**
402
+ * The inspection level to use for the Bot Control rule group. The common level is the least expensive. The targeted level includes all common level rules and adds rules with more advanced inspection criteria. For details, see WAF Bot Control rule group.
403
+ */
404
+ InspectionLevel: InspectionLevel;
405
+ }
400
406
  export type Action = string;
401
407
  export interface ActionCondition {
402
408
  /**
403
- * The action setting that a log record must contain in order to meet the condition.
409
+ * The action setting that a log record must contain in order to meet the condition. This is the action that WAF applied to the web request. For rule groups, this is either the configured rule action setting, or if you've applied a rule action override to the rule, it's the override action. The value EXCLUDED_AS_COUNT matches on excluded rules and also on rules that have a rule action override of Count.
404
410
  */
405
411
  Action: ActionValue;
406
412
  }
407
- export type ActionValue = "ALLOW"|"BLOCK"|"COUNT"|"CAPTCHA"|"EXCLUDED_AS_COUNT"|string;
413
+ export type ActionValue = "ALLOW"|"BLOCK"|"COUNT"|"CAPTCHA"|"CHALLENGE"|"EXCLUDED_AS_COUNT"|string;
408
414
  export interface All {
409
415
  }
410
416
  export interface AllQueryArguments {
@@ -468,13 +474,13 @@ declare namespace WAFV2 {
468
474
  export type CapacityUnit = number;
469
475
  export interface CaptchaAction {
470
476
  /**
471
- * Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.
477
+ * Defines custom handling for the web request, used when the CAPTCHA inspection determines that the request's token is valid and unexpired. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.
472
478
  */
473
479
  CustomRequestHandling?: CustomRequestHandling;
474
480
  }
475
481
  export interface CaptchaConfig {
476
482
  /**
477
- * Determines how long a CAPTCHA token remains valid after the client successfully solves a CAPTCHA puzzle.
483
+ * Determines how long a CAPTCHA timestamp in the token remains valid after the client successfully solves a CAPTCHA puzzle.
478
484
  */
479
485
  ImmunityTimeProperty?: ImmunityTimeProperty;
480
486
  }
@@ -484,7 +490,33 @@ declare namespace WAFV2 {
484
490
  */
485
491
  ResponseCode?: ResponseCode;
486
492
  /**
487
- * The time that the CAPTCHA puzzle was solved for the supplied token.
493
+ * The time that the CAPTCHA was last solved for the supplied token.
494
+ */
495
+ SolveTimestamp?: SolveTimestamp;
496
+ /**
497
+ * The reason for failure, populated when the evaluation of the token fails.
498
+ */
499
+ FailureReason?: FailureReason;
500
+ }
501
+ export interface ChallengeAction {
502
+ /**
503
+ * Defines custom handling for the web request, used when the challenge inspection determines that the request's token is valid and unexpired. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.
504
+ */
505
+ CustomRequestHandling?: CustomRequestHandling;
506
+ }
507
+ export interface ChallengeConfig {
508
+ /**
509
+ * Determines how long a challenge timestamp in the token remains valid after the client successfully responds to a challenge.
510
+ */
511
+ ImmunityTimeProperty?: ImmunityTimeProperty;
512
+ }
513
+ export interface ChallengeResponse {
514
+ /**
515
+ * The HTTP response code indicating the status of the challenge token in the web request. If the token is missing, invalid, or expired, this code is 202 Request Accepted.
516
+ */
517
+ ResponseCode?: ResponseCode;
518
+ /**
519
+ * The time that the challenge was last solved for the supplied token.
488
520
  */
489
521
  SolveTimestamp?: SolveTimestamp;
490
522
  /**
@@ -696,6 +728,14 @@ declare namespace WAFV2 {
696
728
  * Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. If you don't specify this, WAF uses its default settings for CaptchaConfig.
697
729
  */
698
730
  CaptchaConfig?: CaptchaConfig;
731
+ /**
732
+ * Specifies how WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. If you don't specify this, WAF uses its default settings for ChallengeConfig.
733
+ */
734
+ ChallengeConfig?: ChallengeConfig;
735
+ /**
736
+ * Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains. Example JSON: "TokenDomains": { "mywebsite.com", "myotherwebsite.com" }
737
+ */
738
+ TokenDomains?: TokenDomains;
699
739
  }
700
740
  export interface CreateWebACLResponse {
701
741
  /**
@@ -936,7 +976,7 @@ declare namespace WAFV2 {
936
976
  Name: EntityName;
937
977
  }
938
978
  export type ExcludedRules = ExcludedRule[];
939
- export type FailureReason = "TOKEN_MISSING"|"TOKEN_EXPIRED"|string;
979
+ export type FailureReason = "TOKEN_MISSING"|"TOKEN_EXPIRED"|"TOKEN_INVALID"|"TOKEN_DOMAIN_MISMATCH"|string;
940
980
  export type FallbackBehavior = "MATCH"|"NO_MATCH"|string;
941
981
  export type FieldIdentifier = string;
942
982
  export interface FieldToMatch {
@@ -1013,7 +1053,7 @@ declare namespace WAFV2 {
1013
1053
  */
1014
1054
  FirewallManagerStatement: FirewallManagerStatement;
1015
1055
  /**
1016
- * The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead exclude those rules in your rule group reference statement settings.
1056
+ * The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead use the rule action override option, with Count action, in your rule group reference statement settings.
1017
1057
  */
1018
1058
  OverrideAction: OverrideAction;
1019
1059
  /**
@@ -1467,10 +1507,11 @@ declare namespace WAFV2 {
1467
1507
  export type IPString = string;
1468
1508
  export interface ImmunityTimeProperty {
1469
1509
  /**
1470
- * The amount of time, in seconds, that a CAPTCHA token is valid. The default setting is 300.
1510
+ * The amount of time, in seconds, that a CAPTCHA or challenge timestamp is considered valid by WAF. The default setting is 300. For the Challenge action, the minimum setting is 300.
1471
1511
  */
1472
1512
  ImmunityTime: TimeWindowSecond;
1473
1513
  }
1514
+ export type InspectionLevel = "COMMON"|"TARGETED"|string;
1474
1515
  export interface JsonBody {
1475
1516
  /**
1476
1517
  * The patterns to look for in the JSON body. WAF inspects the results of these pattern matches against the rule inspection criteria.
@@ -1857,6 +1898,10 @@ declare namespace WAFV2 {
1857
1898
  * Details about your login page password field.
1858
1899
  */
1859
1900
  PasswordField?: PasswordField;
1901
+ /**
1902
+ * Additional configuration for using the Bot Control managed rule group. Use this to specify the inspection level that you want to use. For information about using the Bot Control managed rule group, see WAF Bot Control rule group and WAF Bot Control in the WAF Developer Guide.
1903
+ */
1904
+ AWSManagedRulesBotControlRuleSet?: AWSManagedRulesBotControlRuleSet;
1860
1905
  }
1861
1906
  export type ManagedRuleGroupConfigs = ManagedRuleGroupConfig[];
1862
1907
  export interface ManagedRuleGroupStatement {
@@ -1873,7 +1918,7 @@ declare namespace WAFV2 {
1873
1918
  */
1874
1919
  Version?: VersionKeyString;
1875
1920
  /**
1876
- * The rules in the referenced rule group whose actions are set to Count. When you exclude a rule, WAF evaluates it exactly as it would if the rule action setting were Count. This is a useful option for testing the rules in a rule group without modifying how they handle your web traffic.
1921
+ * Rules in the referenced rule group whose actions are set to Count. Instead of this option, use RuleActionOverrides. It accepts any valid action setting, including Count.
1877
1922
  */
1878
1923
  ExcludedRules?: ExcludedRules;
1879
1924
  /**
@@ -1881,9 +1926,13 @@ declare namespace WAFV2 {
1881
1926
  */
1882
1927
  ScopeDownStatement?: Statement;
1883
1928
  /**
1884
- * Additional information that's used by a managed rule group. Most managed rule groups don't require this. Use this for the account takeover prevention managed rule group AWSManagedRulesATPRuleSet, to provide information about the sign-in page of your application. You can provide multiple individual ManagedRuleGroupConfig objects for any rule group configuration, for example UsernameField and PasswordField. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: LoginPath, PasswordField, PayloadType and UsernameField.
1929
+ * Additional information that's used by a managed rule group. Many managed rule groups don't require this. Use the AWSManagedRulesBotControlRuleSet configuration object to configure the protection level that you want the Bot Control rule group to use.
1885
1930
  */
1886
1931
  ManagedRuleGroupConfigs?: ManagedRuleGroupConfigs;
1932
+ /**
1933
+ * Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change. You can use overrides for testing, for example you can override all of rule actions to Count and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
1934
+ */
1935
+ RuleActionOverrides?: RuleActionOverrides;
1887
1936
  }
1888
1937
  export type ManagedRuleGroupSummaries = ManagedRuleGroupSummary[];
1889
1938
  export interface ManagedRuleGroupSummary {
@@ -2038,7 +2087,7 @@ declare namespace WAFV2 {
2038
2087
  export type OutputUrl = string;
2039
2088
  export interface OverrideAction {
2040
2089
  /**
2041
- * Override the rule group evaluation result to count only. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead exclude those rules in your rule group reference statement settings.
2090
+ * Override the rule group evaluation result to count only. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead use the rule action override option, with Count action, in your rule group reference statement settings.
2042
2091
  */
2043
2092
  Count?: CountAction;
2044
2093
  /**
@@ -2267,7 +2316,7 @@ declare namespace WAFV2 {
2267
2316
  */
2268
2317
  Action?: RuleAction;
2269
2318
  /**
2270
- * The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead exclude those rules in your rule group reference statement settings.
2319
+ * The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead use the rule action override option, with Count action, in your rule group reference statement settings.
2271
2320
  */
2272
2321
  OverrideAction?: OverrideAction;
2273
2322
  /**
@@ -2282,6 +2331,10 @@ declare namespace WAFV2 {
2282
2331
  * Specifies how WAF should handle CAPTCHA evaluations. If you don't specify this, WAF uses the CAPTCHA configuration that's defined for the web ACL.
2283
2332
  */
2284
2333
  CaptchaConfig?: CaptchaConfig;
2334
+ /**
2335
+ * Specifies how WAF should handle Challenge evaluations. If you don't specify this, WAF uses the challenge configuration that's defined for the web ACL.
2336
+ */
2337
+ ChallengeConfig?: ChallengeConfig;
2285
2338
  }
2286
2339
  export interface RuleAction {
2287
2340
  /**
@@ -2300,7 +2353,22 @@ declare namespace WAFV2 {
2300
2353
  * Instructs WAF to run a CAPTCHA check against the web request.
2301
2354
  */
2302
2355
  Captcha?: CaptchaAction;
2356
+ /**
2357
+ * Instructs WAF to run a Challenge check against the web request.
2358
+ */
2359
+ Challenge?: ChallengeAction;
2303
2360
  }
2361
+ export interface RuleActionOverride {
2362
+ /**
2363
+ * The name of the rule to override.
2364
+ */
2365
+ Name: EntityName;
2366
+ /**
2367
+ * The override action to use, in place of the configured action of the rule in the rule group.
2368
+ */
2369
+ ActionToUse: RuleAction;
2370
+ }
2371
+ export type RuleActionOverrides = RuleActionOverride[];
2304
2372
  export interface RuleGroup {
2305
2373
  /**
2306
2374
  * The name of the rule group. You cannot change the name of a rule group after you create it.
@@ -2353,9 +2421,13 @@ declare namespace WAFV2 {
2353
2421
  */
2354
2422
  ARN: ResourceArn;
2355
2423
  /**
2356
- * The rules in the referenced rule group whose actions are set to Count. When you exclude a rule, WAF evaluates it exactly as it would if the rule action setting were Count. This is a useful option for testing the rules in a rule group without modifying how they handle your web traffic.
2424
+ * Rules in the referenced rule group whose actions are set to Count. Instead of this option, use RuleActionOverrides. It accepts any valid action setting, including Count.
2357
2425
  */
2358
2426
  ExcludedRules?: ExcludedRules;
2427
+ /**
2428
+ * Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change. You can use overrides for testing, for example you can override all of rule actions to Count and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
2429
+ */
2430
+ RuleActionOverrides?: RuleActionOverrides;
2359
2431
  }
2360
2432
  export type RuleGroupSummaries = RuleGroupSummary[];
2361
2433
  export interface RuleGroupSummary {
@@ -2408,7 +2480,7 @@ declare namespace WAFV2 {
2408
2480
  */
2409
2481
  Timestamp?: Timestamp;
2410
2482
  /**
2411
- * The action for the Rule that the request matched: Allow, Block, or Count.
2483
+ * The action that WAF applied to the request.
2412
2484
  */
2413
2485
  Action?: Action;
2414
2486
  /**
@@ -2431,6 +2503,14 @@ declare namespace WAFV2 {
2431
2503
  * The CAPTCHA response for the request.
2432
2504
  */
2433
2505
  CaptchaResponse?: CaptchaResponse;
2506
+ /**
2507
+ * The Challenge response for the request.
2508
+ */
2509
+ ChallengeResponse?: ChallengeResponse;
2510
+ /**
2511
+ * Used only for rule group rules that have a rule action override in place in the web ACL. This is the action that the rule group rule is configured for, and not the action that was applied to the request. The action that WAF applied is the Action value.
2512
+ */
2513
+ OverriddenAction?: Action;
2434
2514
  }
2435
2515
  export type SampledHTTPRequests = SampledHTTPRequest[];
2436
2516
  export type Scope = "CLOUDFRONT"|"REGIONAL"|string;
@@ -2608,6 +2688,8 @@ declare namespace WAFV2 {
2608
2688
  export type TimeWindowDay = number;
2609
2689
  export type TimeWindowSecond = number;
2610
2690
  export type Timestamp = Date;
2691
+ export type TokenDomain = string;
2692
+ export type TokenDomains = TokenDomain[];
2611
2693
  export type URIString = string;
2612
2694
  export interface UntagResourceRequest {
2613
2695
  /**
@@ -2806,6 +2888,14 @@ declare namespace WAFV2 {
2806
2888
  * Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. If you don't specify this, WAF uses its default settings for CaptchaConfig.
2807
2889
  */
2808
2890
  CaptchaConfig?: CaptchaConfig;
2891
+ /**
2892
+ * Specifies how WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. If you don't specify this, WAF uses its default settings for ChallengeConfig.
2893
+ */
2894
+ ChallengeConfig?: ChallengeConfig;
2895
+ /**
2896
+ * Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains. Example JSON: "TokenDomains": { "mywebsite.com", "myotherwebsite.com" }
2897
+ */
2898
+ TokenDomains?: TokenDomains;
2809
2899
  }
2810
2900
  export interface UpdateWebACLResponse {
2811
2901
  /**
@@ -2905,6 +2995,14 @@ declare namespace WAFV2 {
2905
2995
  * Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. If you don't specify this, WAF uses its default settings for CaptchaConfig.
2906
2996
  */
2907
2997
  CaptchaConfig?: CaptchaConfig;
2998
+ /**
2999
+ * Specifies how WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. If you don't specify this, WAF uses its default settings for ChallengeConfig.
3000
+ */
3001
+ ChallengeConfig?: ChallengeConfig;
3002
+ /**
3003
+ * Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.
3004
+ */
3005
+ TokenDomains?: TokenDomains;
2908
3006
  }
2909
3007
  export type WebACLSummaries = WebACLSummary[];
2910
3008
  export interface WebACLSummary {
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1241.0',
86
+ VERSION: '2.1242.0',
87
87
 
88
88
  /**
89
89
  * @api private