cdk-docker-image-deployment 0.0.54 → 0.0.55
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/destination.js +1 -1
- package/lib/docker-image-deployment.js +1 -1
- package/lib/source.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +8 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +14 -0
- package/node_modules/aws-sdk/apis/fms-2018-01-01.min.json +49 -43
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +217 -195
- package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +293 -285
- package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +251 -163
- package/node_modules/aws-sdk/clients/ec2.d.ts +23 -3
- package/node_modules/aws-sdk/clients/fms.d.ts +12 -1
- package/node_modules/aws-sdk/clients/glue.d.ts +25 -0
- package/node_modules/aws-sdk/clients/redshift.d.ts +2 -2
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +14 -2
- package/node_modules/aws-sdk/clients/wafv2.d.ts +118 -20
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +6 -6
- package/node_modules/aws-sdk/dist/aws-sdk.js +17 -3
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +70 -70
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +4 -4
|
@@ -132,11 +132,11 @@ declare class WAFV2 extends Service {
|
|
|
132
132
|
*/
|
|
133
133
|
disassociateWebACL(callback?: (err: AWSError, data: WAFV2.Types.DisassociateWebACLResponse) => void): Request<WAFV2.Types.DisassociateWebACLResponse, AWSError>;
|
|
134
134
|
/**
|
|
135
|
-
* Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage
|
|
135
|
+
* Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
|
|
136
136
|
*/
|
|
137
137
|
generateMobileSdkReleaseUrl(params: WAFV2.Types.GenerateMobileSdkReleaseUrlRequest, callback?: (err: AWSError, data: WAFV2.Types.GenerateMobileSdkReleaseUrlResponse) => void): Request<WAFV2.Types.GenerateMobileSdkReleaseUrlResponse, AWSError>;
|
|
138
138
|
/**
|
|
139
|
-
* Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage
|
|
139
|
+
* Generates a presigned download URL for the specified release of the mobile SDK. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
|
|
140
140
|
*/
|
|
141
141
|
generateMobileSdkReleaseUrl(callback?: (err: AWSError, data: WAFV2.Types.GenerateMobileSdkReleaseUrlResponse) => void): Request<WAFV2.Types.GenerateMobileSdkReleaseUrlResponse, AWSError>;
|
|
142
142
|
/**
|
|
@@ -164,11 +164,11 @@ declare class WAFV2 extends Service {
|
|
|
164
164
|
*/
|
|
165
165
|
getManagedRuleSet(callback?: (err: AWSError, data: WAFV2.Types.GetManagedRuleSetResponse) => void): Request<WAFV2.Types.GetManagedRuleSetResponse, AWSError>;
|
|
166
166
|
/**
|
|
167
|
-
* Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage
|
|
167
|
+
* Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
|
|
168
168
|
*/
|
|
169
169
|
getMobileSdkRelease(params: WAFV2.Types.GetMobileSdkReleaseRequest, callback?: (err: AWSError, data: WAFV2.Types.GetMobileSdkReleaseResponse) => void): Request<WAFV2.Types.GetMobileSdkReleaseResponse, AWSError>;
|
|
170
170
|
/**
|
|
171
|
-
* Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage
|
|
171
|
+
* Retrieves information for the specified mobile SDK release, including release notes and tags. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
|
|
172
172
|
*/
|
|
173
173
|
getMobileSdkRelease(callback?: (err: AWSError, data: WAFV2.Types.GetMobileSdkReleaseResponse) => void): Request<WAFV2.Types.GetMobileSdkReleaseResponse, AWSError>;
|
|
174
174
|
/**
|
|
@@ -268,11 +268,11 @@ declare class WAFV2 extends Service {
|
|
|
268
268
|
*/
|
|
269
269
|
listManagedRuleSets(callback?: (err: AWSError, data: WAFV2.Types.ListManagedRuleSetsResponse) => void): Request<WAFV2.Types.ListManagedRuleSetsResponse, AWSError>;
|
|
270
270
|
/**
|
|
271
|
-
* Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage
|
|
271
|
+
* Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
|
|
272
272
|
*/
|
|
273
273
|
listMobileSdkReleases(params: WAFV2.Types.ListMobileSdkReleasesRequest, callback?: (err: AWSError, data: WAFV2.Types.ListMobileSdkReleasesResponse) => void): Request<WAFV2.Types.ListMobileSdkReleasesResponse, AWSError>;
|
|
274
274
|
/**
|
|
275
|
-
* Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage
|
|
275
|
+
* Retrieves a list of the available releases for the mobile SDK and the specified device platform. The mobile SDK is not generally available. Customers who have access to the mobile SDK can use it to establish and manage WAF tokens for use in HTTP(S) requests from a mobile device to WAF. For more information, see WAF client application integration in the WAF Developer Guide.
|
|
276
276
|
*/
|
|
277
277
|
listMobileSdkReleases(callback?: (err: AWSError, data: WAFV2.Types.ListMobileSdkReleasesResponse) => void): Request<WAFV2.Types.ListMobileSdkReleasesResponse, AWSError>;
|
|
278
278
|
/**
|
|
@@ -397,14 +397,20 @@ declare class WAFV2 extends Service {
|
|
|
397
397
|
updateWebACL(callback?: (err: AWSError, data: WAFV2.Types.UpdateWebACLResponse) => void): Request<WAFV2.Types.UpdateWebACLResponse, AWSError>;
|
|
398
398
|
}
|
|
399
399
|
declare namespace WAFV2 {
|
|
400
|
+
export interface AWSManagedRulesBotControlRuleSet {
|
|
401
|
+
/**
|
|
402
|
+
* The inspection level to use for the Bot Control rule group. The common level is the least expensive. The targeted level includes all common level rules and adds rules with more advanced inspection criteria. For details, see WAF Bot Control rule group.
|
|
403
|
+
*/
|
|
404
|
+
InspectionLevel: InspectionLevel;
|
|
405
|
+
}
|
|
400
406
|
export type Action = string;
|
|
401
407
|
export interface ActionCondition {
|
|
402
408
|
/**
|
|
403
|
-
* The action setting that a log record must contain in order to meet the condition.
|
|
409
|
+
* The action setting that a log record must contain in order to meet the condition. This is the action that WAF applied to the web request. For rule groups, this is either the configured rule action setting, or if you've applied a rule action override to the rule, it's the override action. The value EXCLUDED_AS_COUNT matches on excluded rules and also on rules that have a rule action override of Count.
|
|
404
410
|
*/
|
|
405
411
|
Action: ActionValue;
|
|
406
412
|
}
|
|
407
|
-
export type ActionValue = "ALLOW"|"BLOCK"|"COUNT"|"CAPTCHA"|"EXCLUDED_AS_COUNT"|string;
|
|
413
|
+
export type ActionValue = "ALLOW"|"BLOCK"|"COUNT"|"CAPTCHA"|"CHALLENGE"|"EXCLUDED_AS_COUNT"|string;
|
|
408
414
|
export interface All {
|
|
409
415
|
}
|
|
410
416
|
export interface AllQueryArguments {
|
|
@@ -468,13 +474,13 @@ declare namespace WAFV2 {
|
|
|
468
474
|
export type CapacityUnit = number;
|
|
469
475
|
export interface CaptchaAction {
|
|
470
476
|
/**
|
|
471
|
-
* Defines custom handling for the web request. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.
|
|
477
|
+
* Defines custom handling for the web request, used when the CAPTCHA inspection determines that the request's token is valid and unexpired. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.
|
|
472
478
|
*/
|
|
473
479
|
CustomRequestHandling?: CustomRequestHandling;
|
|
474
480
|
}
|
|
475
481
|
export interface CaptchaConfig {
|
|
476
482
|
/**
|
|
477
|
-
* Determines how long a CAPTCHA token remains valid after the client successfully solves a CAPTCHA puzzle.
|
|
483
|
+
* Determines how long a CAPTCHA timestamp in the token remains valid after the client successfully solves a CAPTCHA puzzle.
|
|
478
484
|
*/
|
|
479
485
|
ImmunityTimeProperty?: ImmunityTimeProperty;
|
|
480
486
|
}
|
|
@@ -484,7 +490,33 @@ declare namespace WAFV2 {
|
|
|
484
490
|
*/
|
|
485
491
|
ResponseCode?: ResponseCode;
|
|
486
492
|
/**
|
|
487
|
-
* The time that the CAPTCHA
|
|
493
|
+
* The time that the CAPTCHA was last solved for the supplied token.
|
|
494
|
+
*/
|
|
495
|
+
SolveTimestamp?: SolveTimestamp;
|
|
496
|
+
/**
|
|
497
|
+
* The reason for failure, populated when the evaluation of the token fails.
|
|
498
|
+
*/
|
|
499
|
+
FailureReason?: FailureReason;
|
|
500
|
+
}
|
|
501
|
+
export interface ChallengeAction {
|
|
502
|
+
/**
|
|
503
|
+
* Defines custom handling for the web request, used when the challenge inspection determines that the request's token is valid and unexpired. For information about customizing web requests and responses, see Customizing web requests and responses in WAF in the WAF Developer Guide.
|
|
504
|
+
*/
|
|
505
|
+
CustomRequestHandling?: CustomRequestHandling;
|
|
506
|
+
}
|
|
507
|
+
export interface ChallengeConfig {
|
|
508
|
+
/**
|
|
509
|
+
* Determines how long a challenge timestamp in the token remains valid after the client successfully responds to a challenge.
|
|
510
|
+
*/
|
|
511
|
+
ImmunityTimeProperty?: ImmunityTimeProperty;
|
|
512
|
+
}
|
|
513
|
+
export interface ChallengeResponse {
|
|
514
|
+
/**
|
|
515
|
+
* The HTTP response code indicating the status of the challenge token in the web request. If the token is missing, invalid, or expired, this code is 202 Request Accepted.
|
|
516
|
+
*/
|
|
517
|
+
ResponseCode?: ResponseCode;
|
|
518
|
+
/**
|
|
519
|
+
* The time that the challenge was last solved for the supplied token.
|
|
488
520
|
*/
|
|
489
521
|
SolveTimestamp?: SolveTimestamp;
|
|
490
522
|
/**
|
|
@@ -696,6 +728,14 @@ declare namespace WAFV2 {
|
|
|
696
728
|
* Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. If you don't specify this, WAF uses its default settings for CaptchaConfig.
|
|
697
729
|
*/
|
|
698
730
|
CaptchaConfig?: CaptchaConfig;
|
|
731
|
+
/**
|
|
732
|
+
* Specifies how WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. If you don't specify this, WAF uses its default settings for ChallengeConfig.
|
|
733
|
+
*/
|
|
734
|
+
ChallengeConfig?: ChallengeConfig;
|
|
735
|
+
/**
|
|
736
|
+
* Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains. Example JSON: "TokenDomains": { "mywebsite.com", "myotherwebsite.com" }
|
|
737
|
+
*/
|
|
738
|
+
TokenDomains?: TokenDomains;
|
|
699
739
|
}
|
|
700
740
|
export interface CreateWebACLResponse {
|
|
701
741
|
/**
|
|
@@ -936,7 +976,7 @@ declare namespace WAFV2 {
|
|
|
936
976
|
Name: EntityName;
|
|
937
977
|
}
|
|
938
978
|
export type ExcludedRules = ExcludedRule[];
|
|
939
|
-
export type FailureReason = "TOKEN_MISSING"|"TOKEN_EXPIRED"|string;
|
|
979
|
+
export type FailureReason = "TOKEN_MISSING"|"TOKEN_EXPIRED"|"TOKEN_INVALID"|"TOKEN_DOMAIN_MISMATCH"|string;
|
|
940
980
|
export type FallbackBehavior = "MATCH"|"NO_MATCH"|string;
|
|
941
981
|
export type FieldIdentifier = string;
|
|
942
982
|
export interface FieldToMatch {
|
|
@@ -1013,7 +1053,7 @@ declare namespace WAFV2 {
|
|
|
1013
1053
|
*/
|
|
1014
1054
|
FirewallManagerStatement: FirewallManagerStatement;
|
|
1015
1055
|
/**
|
|
1016
|
-
* The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead
|
|
1056
|
+
* The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead use the rule action override option, with Count action, in your rule group reference statement settings.
|
|
1017
1057
|
*/
|
|
1018
1058
|
OverrideAction: OverrideAction;
|
|
1019
1059
|
/**
|
|
@@ -1467,10 +1507,11 @@ declare namespace WAFV2 {
|
|
|
1467
1507
|
export type IPString = string;
|
|
1468
1508
|
export interface ImmunityTimeProperty {
|
|
1469
1509
|
/**
|
|
1470
|
-
* The amount of time, in seconds, that a CAPTCHA
|
|
1510
|
+
* The amount of time, in seconds, that a CAPTCHA or challenge timestamp is considered valid by WAF. The default setting is 300. For the Challenge action, the minimum setting is 300.
|
|
1471
1511
|
*/
|
|
1472
1512
|
ImmunityTime: TimeWindowSecond;
|
|
1473
1513
|
}
|
|
1514
|
+
export type InspectionLevel = "COMMON"|"TARGETED"|string;
|
|
1474
1515
|
export interface JsonBody {
|
|
1475
1516
|
/**
|
|
1476
1517
|
* The patterns to look for in the JSON body. WAF inspects the results of these pattern matches against the rule inspection criteria.
|
|
@@ -1857,6 +1898,10 @@ declare namespace WAFV2 {
|
|
|
1857
1898
|
* Details about your login page password field.
|
|
1858
1899
|
*/
|
|
1859
1900
|
PasswordField?: PasswordField;
|
|
1901
|
+
/**
|
|
1902
|
+
* Additional configuration for using the Bot Control managed rule group. Use this to specify the inspection level that you want to use. For information about using the Bot Control managed rule group, see WAF Bot Control rule group and WAF Bot Control in the WAF Developer Guide.
|
|
1903
|
+
*/
|
|
1904
|
+
AWSManagedRulesBotControlRuleSet?: AWSManagedRulesBotControlRuleSet;
|
|
1860
1905
|
}
|
|
1861
1906
|
export type ManagedRuleGroupConfigs = ManagedRuleGroupConfig[];
|
|
1862
1907
|
export interface ManagedRuleGroupStatement {
|
|
@@ -1873,7 +1918,7 @@ declare namespace WAFV2 {
|
|
|
1873
1918
|
*/
|
|
1874
1919
|
Version?: VersionKeyString;
|
|
1875
1920
|
/**
|
|
1876
|
-
*
|
|
1921
|
+
* Rules in the referenced rule group whose actions are set to Count. Instead of this option, use RuleActionOverrides. It accepts any valid action setting, including Count.
|
|
1877
1922
|
*/
|
|
1878
1923
|
ExcludedRules?: ExcludedRules;
|
|
1879
1924
|
/**
|
|
@@ -1881,9 +1926,13 @@ declare namespace WAFV2 {
|
|
|
1881
1926
|
*/
|
|
1882
1927
|
ScopeDownStatement?: Statement;
|
|
1883
1928
|
/**
|
|
1884
|
-
* Additional information that's used by a managed rule group.
|
|
1929
|
+
* Additional information that's used by a managed rule group. Many managed rule groups don't require this. Use the AWSManagedRulesBotControlRuleSet configuration object to configure the protection level that you want the Bot Control rule group to use.
|
|
1885
1930
|
*/
|
|
1886
1931
|
ManagedRuleGroupConfigs?: ManagedRuleGroupConfigs;
|
|
1932
|
+
/**
|
|
1933
|
+
* Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change. You can use overrides for testing, for example you can override all of rule actions to Count and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
|
|
1934
|
+
*/
|
|
1935
|
+
RuleActionOverrides?: RuleActionOverrides;
|
|
1887
1936
|
}
|
|
1888
1937
|
export type ManagedRuleGroupSummaries = ManagedRuleGroupSummary[];
|
|
1889
1938
|
export interface ManagedRuleGroupSummary {
|
|
@@ -2038,7 +2087,7 @@ declare namespace WAFV2 {
|
|
|
2038
2087
|
export type OutputUrl = string;
|
|
2039
2088
|
export interface OverrideAction {
|
|
2040
2089
|
/**
|
|
2041
|
-
* Override the rule group evaluation result to count only. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead
|
|
2090
|
+
* Override the rule group evaluation result to count only. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead use the rule action override option, with Count action, in your rule group reference statement settings.
|
|
2042
2091
|
*/
|
|
2043
2092
|
Count?: CountAction;
|
|
2044
2093
|
/**
|
|
@@ -2267,7 +2316,7 @@ declare namespace WAFV2 {
|
|
|
2267
2316
|
*/
|
|
2268
2317
|
Action?: RuleAction;
|
|
2269
2318
|
/**
|
|
2270
|
-
* The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead
|
|
2319
|
+
* The action to use in the place of the action that results from the rule group evaluation. Set the override action to none to leave the result of the rule group alone. Set it to count to override the result to count only. You can only use this for rule statements that reference a rule group, like RuleGroupReferenceStatement and ManagedRuleGroupStatement. This option is usually set to none. It does not affect how the rules in the rule group are evaluated. If you want the rules in the rule group to only count matches, do not use this and instead use the rule action override option, with Count action, in your rule group reference statement settings.
|
|
2271
2320
|
*/
|
|
2272
2321
|
OverrideAction?: OverrideAction;
|
|
2273
2322
|
/**
|
|
@@ -2282,6 +2331,10 @@ declare namespace WAFV2 {
|
|
|
2282
2331
|
* Specifies how WAF should handle CAPTCHA evaluations. If you don't specify this, WAF uses the CAPTCHA configuration that's defined for the web ACL.
|
|
2283
2332
|
*/
|
|
2284
2333
|
CaptchaConfig?: CaptchaConfig;
|
|
2334
|
+
/**
|
|
2335
|
+
* Specifies how WAF should handle Challenge evaluations. If you don't specify this, WAF uses the challenge configuration that's defined for the web ACL.
|
|
2336
|
+
*/
|
|
2337
|
+
ChallengeConfig?: ChallengeConfig;
|
|
2285
2338
|
}
|
|
2286
2339
|
export interface RuleAction {
|
|
2287
2340
|
/**
|
|
@@ -2300,7 +2353,22 @@ declare namespace WAFV2 {
|
|
|
2300
2353
|
* Instructs WAF to run a CAPTCHA check against the web request.
|
|
2301
2354
|
*/
|
|
2302
2355
|
Captcha?: CaptchaAction;
|
|
2356
|
+
/**
|
|
2357
|
+
* Instructs WAF to run a Challenge check against the web request.
|
|
2358
|
+
*/
|
|
2359
|
+
Challenge?: ChallengeAction;
|
|
2303
2360
|
}
|
|
2361
|
+
export interface RuleActionOverride {
|
|
2362
|
+
/**
|
|
2363
|
+
* The name of the rule to override.
|
|
2364
|
+
*/
|
|
2365
|
+
Name: EntityName;
|
|
2366
|
+
/**
|
|
2367
|
+
* The override action to use, in place of the configured action of the rule in the rule group.
|
|
2368
|
+
*/
|
|
2369
|
+
ActionToUse: RuleAction;
|
|
2370
|
+
}
|
|
2371
|
+
export type RuleActionOverrides = RuleActionOverride[];
|
|
2304
2372
|
export interface RuleGroup {
|
|
2305
2373
|
/**
|
|
2306
2374
|
* The name of the rule group. You cannot change the name of a rule group after you create it.
|
|
@@ -2353,9 +2421,13 @@ declare namespace WAFV2 {
|
|
|
2353
2421
|
*/
|
|
2354
2422
|
ARN: ResourceArn;
|
|
2355
2423
|
/**
|
|
2356
|
-
*
|
|
2424
|
+
* Rules in the referenced rule group whose actions are set to Count. Instead of this option, use RuleActionOverrides. It accepts any valid action setting, including Count.
|
|
2357
2425
|
*/
|
|
2358
2426
|
ExcludedRules?: ExcludedRules;
|
|
2427
|
+
/**
|
|
2428
|
+
* Action settings to use in the place of the rule actions that are configured inside the rule group. You specify one override for each rule whose action you want to change. You can use overrides for testing, for example you can override all of rule actions to Count and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.
|
|
2429
|
+
*/
|
|
2430
|
+
RuleActionOverrides?: RuleActionOverrides;
|
|
2359
2431
|
}
|
|
2360
2432
|
export type RuleGroupSummaries = RuleGroupSummary[];
|
|
2361
2433
|
export interface RuleGroupSummary {
|
|
@@ -2408,7 +2480,7 @@ declare namespace WAFV2 {
|
|
|
2408
2480
|
*/
|
|
2409
2481
|
Timestamp?: Timestamp;
|
|
2410
2482
|
/**
|
|
2411
|
-
* The action
|
|
2483
|
+
* The action that WAF applied to the request.
|
|
2412
2484
|
*/
|
|
2413
2485
|
Action?: Action;
|
|
2414
2486
|
/**
|
|
@@ -2431,6 +2503,14 @@ declare namespace WAFV2 {
|
|
|
2431
2503
|
* The CAPTCHA response for the request.
|
|
2432
2504
|
*/
|
|
2433
2505
|
CaptchaResponse?: CaptchaResponse;
|
|
2506
|
+
/**
|
|
2507
|
+
* The Challenge response for the request.
|
|
2508
|
+
*/
|
|
2509
|
+
ChallengeResponse?: ChallengeResponse;
|
|
2510
|
+
/**
|
|
2511
|
+
* Used only for rule group rules that have a rule action override in place in the web ACL. This is the action that the rule group rule is configured for, and not the action that was applied to the request. The action that WAF applied is the Action value.
|
|
2512
|
+
*/
|
|
2513
|
+
OverriddenAction?: Action;
|
|
2434
2514
|
}
|
|
2435
2515
|
export type SampledHTTPRequests = SampledHTTPRequest[];
|
|
2436
2516
|
export type Scope = "CLOUDFRONT"|"REGIONAL"|string;
|
|
@@ -2608,6 +2688,8 @@ declare namespace WAFV2 {
|
|
|
2608
2688
|
export type TimeWindowDay = number;
|
|
2609
2689
|
export type TimeWindowSecond = number;
|
|
2610
2690
|
export type Timestamp = Date;
|
|
2691
|
+
export type TokenDomain = string;
|
|
2692
|
+
export type TokenDomains = TokenDomain[];
|
|
2611
2693
|
export type URIString = string;
|
|
2612
2694
|
export interface UntagResourceRequest {
|
|
2613
2695
|
/**
|
|
@@ -2806,6 +2888,14 @@ declare namespace WAFV2 {
|
|
|
2806
2888
|
* Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. If you don't specify this, WAF uses its default settings for CaptchaConfig.
|
|
2807
2889
|
*/
|
|
2808
2890
|
CaptchaConfig?: CaptchaConfig;
|
|
2891
|
+
/**
|
|
2892
|
+
* Specifies how WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. If you don't specify this, WAF uses its default settings for ChallengeConfig.
|
|
2893
|
+
*/
|
|
2894
|
+
ChallengeConfig?: ChallengeConfig;
|
|
2895
|
+
/**
|
|
2896
|
+
* Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains. Example JSON: "TokenDomains": { "mywebsite.com", "myotherwebsite.com" }
|
|
2897
|
+
*/
|
|
2898
|
+
TokenDomains?: TokenDomains;
|
|
2809
2899
|
}
|
|
2810
2900
|
export interface UpdateWebACLResponse {
|
|
2811
2901
|
/**
|
|
@@ -2905,6 +2995,14 @@ declare namespace WAFV2 {
|
|
|
2905
2995
|
* Specifies how WAF should handle CAPTCHA evaluations for rules that don't have their own CaptchaConfig settings. If you don't specify this, WAF uses its default settings for CaptchaConfig.
|
|
2906
2996
|
*/
|
|
2907
2997
|
CaptchaConfig?: CaptchaConfig;
|
|
2998
|
+
/**
|
|
2999
|
+
* Specifies how WAF should handle challenge evaluations for rules that don't have their own ChallengeConfig settings. If you don't specify this, WAF uses its default settings for ChallengeConfig.
|
|
3000
|
+
*/
|
|
3001
|
+
ChallengeConfig?: ChallengeConfig;
|
|
3002
|
+
/**
|
|
3003
|
+
* Specifies the domains that WAF should accept in a web request token. This enables the use of tokens across multiple protected websites. When WAF provides a token, it uses the domain of the Amazon Web Services resource that the web ACL is protecting. If you don't specify a list of token domains, WAF accepts tokens only for the domain of the protected resource. With a token domain list, WAF accepts the resource's host domain plus all domains in the token domain list, including their prefixed subdomains.
|
|
3004
|
+
*/
|
|
3005
|
+
TokenDomains?: TokenDomains;
|
|
2908
3006
|
}
|
|
2909
3007
|
export type WebACLSummaries = WebACLSummary[];
|
|
2910
3008
|
export interface WebACLSummary {
|