cdk-lambda-subminute 2.0.229 → 2.0.231

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/CHANGELOG.md +16 -1
  4. package/node_modules/aws-sdk/README.md +1 -1
  5. package/node_modules/aws-sdk/apis/appflow-2020-08-23.min.json +26 -24
  6. package/node_modules/aws-sdk/apis/billingconductor-2021-07-30.min.json +70 -42
  7. package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.min.json +72 -40
  8. package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +248 -225
  9. package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +11 -7
  10. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +187 -182
  11. package/node_modules/aws-sdk/apis/vpc-lattice-2022-11-30.min.json +49 -52
  12. package/node_modules/aws-sdk/apis/wafv2-2019-07-29.min.json +7 -4
  13. package/node_modules/aws-sdk/clients/appflow.d.ts +6 -2
  14. package/node_modules/aws-sdk/clients/billingconductor.d.ts +31 -0
  15. package/node_modules/aws-sdk/clients/cloud9.d.ts +1 -1
  16. package/node_modules/aws-sdk/clients/computeoptimizer.d.ts +48 -8
  17. package/node_modules/aws-sdk/clients/ec2.d.ts +2 -2
  18. package/node_modules/aws-sdk/clients/ecs.d.ts +2 -2
  19. package/node_modules/aws-sdk/clients/elbv2.d.ts +3 -3
  20. package/node_modules/aws-sdk/clients/medialive.d.ts +20 -0
  21. package/node_modules/aws-sdk/clients/rds.d.ts +16 -0
  22. package/node_modules/aws-sdk/clients/sagemaker.d.ts +12 -2
  23. package/node_modules/aws-sdk/clients/vpclattice.d.ts +30 -21
  24. package/node_modules/aws-sdk/clients/wafv2.d.ts +16 -12
  25. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  26. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +9 -9
  27. package/node_modules/aws-sdk/dist/aws-sdk.js +14 -10
  28. package/node_modules/aws-sdk/dist/aws-sdk.min.js +25 -25
  29. package/node_modules/aws-sdk/lib/core.js +1 -1
  30. package/node_modules/aws-sdk/package.json +1 -1
  31. package/package.json +3 -3
@@ -68,11 +68,11 @@ declare class VPCLattice extends Service {
68
68
  */
69
69
  createServiceNetworkServiceAssociation(callback?: (err: AWSError, data: VPCLattice.Types.CreateServiceNetworkServiceAssociationResponse) => void): Request<VPCLattice.Types.CreateServiceNetworkServiceAssociationResponse, AWSError>;
70
70
  /**
71
- * Associates a VPC with a service network. When you associate a VPC with the service network, it enables all the resources within that VPC to be clients and communicate with other services in the service network. For more information, see Manage VPC associations in the Amazon VPC Lattice User Guide. You can't use this operation if there is a disassociation in progress. If the association fails, retry by deleting the association and recreating it. As a result of this operation, the association gets created in the service network account and the VPC owner account. If you add a security group to the service network and VPC association, the association must continue to always have at least one security group. You can add or edit security groups at any time. However, to remove all security groups, you must first delete the association and recreate it without security groups.
71
+ * Associates a VPC with a service network. When you associate a VPC with the service network, it enables all the resources within that VPC to be clients and communicate with other services in the service network. For more information, see Manage VPC associations in the Amazon VPC Lattice User Guide. You can't use this operation if there is a disassociation in progress. If the association fails, retry by deleting the association and recreating it. As a result of this operation, the association gets created in the service network account and the VPC owner account. Once a security group is added to the VPC association it cannot be removed. You can add or update the security groups being used for the VPC association once a security group is attached. To remove all security groups you must reassociate the VPC.
72
72
  */
73
73
  createServiceNetworkVpcAssociation(params: VPCLattice.Types.CreateServiceNetworkVpcAssociationRequest, callback?: (err: AWSError, data: VPCLattice.Types.CreateServiceNetworkVpcAssociationResponse) => void): Request<VPCLattice.Types.CreateServiceNetworkVpcAssociationResponse, AWSError>;
74
74
  /**
75
- * Associates a VPC with a service network. When you associate a VPC with the service network, it enables all the resources within that VPC to be clients and communicate with other services in the service network. For more information, see Manage VPC associations in the Amazon VPC Lattice User Guide. You can't use this operation if there is a disassociation in progress. If the association fails, retry by deleting the association and recreating it. As a result of this operation, the association gets created in the service network account and the VPC owner account. If you add a security group to the service network and VPC association, the association must continue to always have at least one security group. You can add or edit security groups at any time. However, to remove all security groups, you must first delete the association and recreate it without security groups.
75
+ * Associates a VPC with a service network. When you associate a VPC with the service network, it enables all the resources within that VPC to be clients and communicate with other services in the service network. For more information, see Manage VPC associations in the Amazon VPC Lattice User Guide. You can't use this operation if there is a disassociation in progress. If the association fails, retry by deleting the association and recreating it. As a result of this operation, the association gets created in the service network account and the VPC owner account. Once a security group is added to the VPC association it cannot be removed. You can add or update the security groups being used for the VPC association once a security group is attached. To remove all security groups you must reassociate the VPC.
76
76
  */
77
77
  createServiceNetworkVpcAssociation(callback?: (err: AWSError, data: VPCLattice.Types.CreateServiceNetworkVpcAssociationResponse) => void): Request<VPCLattice.Types.CreateServiceNetworkVpcAssociationResponse, AWSError>;
78
78
  /**
@@ -92,11 +92,11 @@ declare class VPCLattice extends Service {
92
92
  */
93
93
  deleteAccessLogSubscription(callback?: (err: AWSError, data: VPCLattice.Types.DeleteAccessLogSubscriptionResponse) => void): Request<VPCLattice.Types.DeleteAccessLogSubscriptionResponse, AWSError>;
94
94
  /**
95
- * Deletes the specified auth policy. If an auth is set to AWS_IAM and the auth policy is deleted, all requests will be denied by default. If you are trying to remove the auth policy completely, you must set the auth_type to NONE. If auth is enabled on the resource, but no auth policy is set, all requests will be denied.
95
+ * Deletes the specified auth policy. If an auth is set to Amazon Web Services_IAM and the auth policy is deleted, all requests will be denied by default. If you are trying to remove the auth policy completely, you must set the auth_type to NONE. If auth is enabled on the resource, but no auth policy is set, all requests will be denied.
96
96
  */
97
97
  deleteAuthPolicy(params: VPCLattice.Types.DeleteAuthPolicyRequest, callback?: (err: AWSError, data: VPCLattice.Types.DeleteAuthPolicyResponse) => void): Request<VPCLattice.Types.DeleteAuthPolicyResponse, AWSError>;
98
98
  /**
99
- * Deletes the specified auth policy. If an auth is set to AWS_IAM and the auth policy is deleted, all requests will be denied by default. If you are trying to remove the auth policy completely, you must set the auth_type to NONE. If auth is enabled on the resource, but no auth policy is set, all requests will be denied.
99
+ * Deletes the specified auth policy. If an auth is set to Amazon Web Services_IAM and the auth policy is deleted, all requests will be denied by default. If you are trying to remove the auth policy completely, you must set the auth_type to NONE. If auth is enabled on the resource, but no auth policy is set, all requests will be denied.
100
100
  */
101
101
  deleteAuthPolicy(callback?: (err: AWSError, data: VPCLattice.Types.DeleteAuthPolicyResponse) => void): Request<VPCLattice.Types.DeleteAuthPolicyResponse, AWSError>;
102
102
  /**
@@ -196,11 +196,11 @@ declare class VPCLattice extends Service {
196
196
  */
197
197
  getListener(callback?: (err: AWSError, data: VPCLattice.Types.GetListenerResponse) => void): Request<VPCLattice.Types.GetListenerResponse, AWSError>;
198
198
  /**
199
- * Retrieves information about the resource policy. The resource policy is an IAM policy created on behalf of the resource owner when they share a resource.
199
+ * Retrieves information about the resource policy. The resource policy is an IAM policy created by AWS RAM on behalf of the resource owner when they share a resource.
200
200
  */
201
201
  getResourcePolicy(params: VPCLattice.Types.GetResourcePolicyRequest, callback?: (err: AWSError, data: VPCLattice.Types.GetResourcePolicyResponse) => void): Request<VPCLattice.Types.GetResourcePolicyResponse, AWSError>;
202
202
  /**
203
- * Retrieves information about the resource policy. The resource policy is an IAM policy created on behalf of the resource owner when they share a resource.
203
+ * Retrieves information about the resource policy. The resource policy is an IAM policy created by AWS RAM on behalf of the resource owner when they share a resource.
204
204
  */
205
205
  getResourcePolicy(callback?: (err: AWSError, data: VPCLattice.Types.GetResourcePolicyResponse) => void): Request<VPCLattice.Types.GetResourcePolicyResponse, AWSError>;
206
206
  /**
@@ -332,11 +332,11 @@ declare class VPCLattice extends Service {
332
332
  */
333
333
  listTargets(callback?: (err: AWSError, data: VPCLattice.Types.ListTargetsResponse) => void): Request<VPCLattice.Types.ListTargetsResponse, AWSError>;
334
334
  /**
335
- * Creates or updates the auth policy. The policy string in JSON must not contain newlines or blank lines.
335
+ * Creates or updates the auth policy.
336
336
  */
337
337
  putAuthPolicy(params: VPCLattice.Types.PutAuthPolicyRequest, callback?: (err: AWSError, data: VPCLattice.Types.PutAuthPolicyResponse) => void): Request<VPCLattice.Types.PutAuthPolicyResponse, AWSError>;
338
338
  /**
339
- * Creates or updates the auth policy. The policy string in JSON must not contain newlines or blank lines.
339
+ * Creates or updates the auth policy.
340
340
  */
341
341
  putAuthPolicy(callback?: (err: AWSError, data: VPCLattice.Types.PutAuthPolicyResponse) => void): Request<VPCLattice.Types.PutAuthPolicyResponse, AWSError>;
342
342
  /**
@@ -412,11 +412,11 @@ declare class VPCLattice extends Service {
412
412
  */
413
413
  updateServiceNetwork(callback?: (err: AWSError, data: VPCLattice.Types.UpdateServiceNetworkResponse) => void): Request<VPCLattice.Types.UpdateServiceNetworkResponse, AWSError>;
414
414
  /**
415
- * Updates the service network and VPC association. If you add a security group to the service network and VPC association, the association must continue to always have at least one security group. You can add or edit security groups at any time. However, to remove all security groups, you must first delete the association and recreate it without security groups.
415
+ * Updates the service network and VPC association. Once you add a security group, it cannot be removed.
416
416
  */
417
417
  updateServiceNetworkVpcAssociation(params: VPCLattice.Types.UpdateServiceNetworkVpcAssociationRequest, callback?: (err: AWSError, data: VPCLattice.Types.UpdateServiceNetworkVpcAssociationResponse) => void): Request<VPCLattice.Types.UpdateServiceNetworkVpcAssociationResponse, AWSError>;
418
418
  /**
419
- * Updates the service network and VPC association. If you add a security group to the service network and VPC association, the association must continue to always have at least one security group. You can add or edit security groups at any time. However, to remove all security groups, you must first delete the association and recreate it without security groups.
419
+ * Updates the service network and VPC association. Once you add a security group, it cannot be removed.
420
420
  */
421
421
  updateServiceNetworkVpcAssociation(callback?: (err: AWSError, data: VPCLattice.Types.UpdateServiceNetworkVpcAssociationResponse) => void): Request<VPCLattice.Types.UpdateServiceNetworkVpcAssociationResponse, AWSError>;
422
422
  /**
@@ -1138,7 +1138,7 @@ declare namespace VPCLattice {
1138
1138
  */
1139
1139
  policy?: AuthPolicyString;
1140
1140
  /**
1141
- * The state of the auth policy. The auth policy is only active when the auth type is set to AWS_IAM. If you provide a policy, then authentication and authorization decisions are made based on this policy and the client's IAM policy. If the auth type is NONE, then any auth policy you provide will remain inactive. For more information, see Create a service network in the Amazon VPC Lattice User Guide.
1141
+ * The state of the auth policy. The auth policy is only active when the auth type is set to Amazon Web Services_IAM. If you provide a policy, then authentication and authorization decisions are made based on this policy and the client's IAM policy. If the auth type is NONE, then any auth policy you provide will remain inactive. For more information, see Create a service network in the Amazon VPC Lattice User Guide.
1142
1142
  */
1143
1143
  state?: AuthPolicyState;
1144
1144
  }
@@ -1196,13 +1196,13 @@ declare namespace VPCLattice {
1196
1196
  }
1197
1197
  export interface GetResourcePolicyRequest {
1198
1198
  /**
1199
- * The Amazon Resource Name (ARN) of the service network or service.
1199
+ * An IAM policy.
1200
1200
  */
1201
1201
  resourceArn: ResourceArn;
1202
1202
  }
1203
1203
  export interface GetResourcePolicyResponse {
1204
1204
  /**
1205
- * An IAM policy.
1205
+ * The Amazon Resource Name (ARN) of the service network or service.
1206
1206
  */
1207
1207
  policy?: PolicyString;
1208
1208
  }
@@ -1633,6 +1633,7 @@ declare namespace VPCLattice {
1633
1633
  export type HttpMethod = string;
1634
1634
  export type HttpStatusCode = number;
1635
1635
  export type IpAddressType = "IPV4"|"IPV6"|string;
1636
+ export type LambdaEventStructureVersion = "V1"|"V2"|string;
1636
1637
  export interface ListAccessLogSubscriptionsRequest {
1637
1638
  /**
1638
1639
  * The maximum number of results to return.
@@ -1945,7 +1946,7 @@ declare namespace VPCLattice {
1945
1946
  export type Port = number;
1946
1947
  export interface PutAuthPolicyRequest {
1947
1948
  /**
1948
- * The auth policy. The policy string in JSON must not contain newlines or blank lines.
1949
+ * The auth policy.
1949
1950
  */
1950
1951
  policy: AuthPolicyString;
1951
1952
  /**
@@ -1955,17 +1956,17 @@ declare namespace VPCLattice {
1955
1956
  }
1956
1957
  export interface PutAuthPolicyResponse {
1957
1958
  /**
1958
- * The auth policy. The policy string in JSON must not contain newlines or blank lines.
1959
+ * The auth policy.
1959
1960
  */
1960
1961
  policy?: AuthPolicyString;
1961
1962
  /**
1962
- * The state of the auth policy. The auth policy is only active when the auth type is set to AWS_IAM. If you provide a policy, then authentication and authorization decisions are made based on this policy and the client's IAM policy. If the Auth type is NONE, then, any auth policy you provide will remain inactive. For more information, see Create a service network in the Amazon VPC Lattice User Guide.
1963
+ * The state of the auth policy. The auth policy is only active when the auth type is set to Amazon Web Services_IAM. If you provide a policy, then authentication and authorization decisions are made based on this policy and the client's IAM policy. If the Auth type is NONE, then, any auth policy you provide will remain inactive. For more information, see Create a service network in the Amazon VPC Lattice User Guide.
1963
1964
  */
1964
1965
  state?: AuthPolicyState;
1965
1966
  }
1966
1967
  export interface PutResourcePolicyRequest {
1967
1968
  /**
1968
- * An IAM policy. The policy string in JSON must not contain newlines or blank lines.
1969
+ * An IAM policy.
1969
1970
  */
1970
1971
  policy: PolicyString;
1971
1972
  /**
@@ -2356,14 +2357,18 @@ declare namespace VPCLattice {
2356
2357
  * The type of IP address used for the target group. The possible values are ipv4 and ipv6. This is an optional parameter. If not specified, the IP address type defaults to ipv4.
2357
2358
  */
2358
2359
  ipAddressType?: IpAddressType;
2360
+ /**
2361
+ * Lambda event structure version
2362
+ */
2363
+ lambdaEventStructureVersion?: LambdaEventStructureVersion;
2359
2364
  /**
2360
2365
  * The port on which the targets are listening. For HTTP, the default is 80. For HTTPS, the default is 443
2361
2366
  */
2362
- port: Port;
2367
+ port?: Port;
2363
2368
  /**
2364
2369
  * The protocol to use for routing traffic to the targets. Default is the protocol of a target group.
2365
2370
  */
2366
- protocol: TargetGroupProtocol;
2371
+ protocol?: TargetGroupProtocol;
2367
2372
  /**
2368
2373
  * The protocol version. Default value is HTTP1.
2369
2374
  */
@@ -2371,7 +2376,7 @@ declare namespace VPCLattice {
2371
2376
  /**
2372
2377
  * The ID of the VPC.
2373
2378
  */
2374
- vpcIdentifier: VpcId;
2379
+ vpcIdentifier?: VpcId;
2375
2380
  }
2376
2381
  export type TargetGroupId = string;
2377
2382
  export type TargetGroupIdentifier = string;
@@ -2397,6 +2402,10 @@ declare namespace VPCLattice {
2397
2402
  * The type of IP address used for the target group. The possible values are ipv4 and ipv6. This is an optional parameter. If not specified, the IP address type defaults to ipv4.
2398
2403
  */
2399
2404
  ipAddressType?: IpAddressType;
2405
+ /**
2406
+ * Lambda event structure version
2407
+ */
2408
+ lambdaEventStructureVersion?: LambdaEventStructureVersion;
2400
2409
  /**
2401
2410
  * The date and time that the target group was last updated, specified in ISO-8601 format.
2402
2411
  */
@@ -2634,7 +2643,7 @@ declare namespace VPCLattice {
2634
2643
  }
2635
2644
  export interface UpdateServiceNetworkVpcAssociationRequest {
2636
2645
  /**
2637
- * The IDs of the security groups.
2646
+ * The IDs of the security groups. Once you add a security group, it cannot be removed.
2638
2647
  */
2639
2648
  securityGroupIds: UpdateServiceNetworkVpcAssociationRequestSecurityGroupIdsList;
2640
2649
  /**
@@ -504,6 +504,10 @@ declare namespace WAFV2 {
504
504
  * The inspection level to use for the Bot Control rule group. The common level is the least expensive. The targeted level includes all common level rules and adds rules with more advanced inspection criteria. For details, see WAF Bot Control rule group in the WAF Developer Guide.
505
505
  */
506
506
  InspectionLevel: InspectionLevel;
507
+ /**
508
+ * Applies only to the targeted inspection level. Determines whether to use machine learning (ML) to analyze your web traffic for bot-related activity. Machine learning is required for the Bot Control rules TGT_ML_CoordinatedActivityLow and TGT_ML_CoordinatedActivityMedium, which inspect for anomalous behavior that might indicate distributed, coordinated bot activity. For more information about this choice, see the listing for these rules in the table at Bot Control rules listing in the WAF Developer Guide. Default: TRUE
509
+ */
510
+ EnableMachineLearning?: Boolean;
507
511
  }
508
512
  export type Action = string;
509
513
  export interface ActionCondition {
@@ -551,7 +555,7 @@ declare namespace WAFV2 {
551
555
  export type AssociatedResourceType = "CLOUDFRONT"|string;
552
556
  export interface AssociationConfig {
553
557
  /**
554
- * Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
558
+ * Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
555
559
  */
556
560
  RequestBody?: RequestBody;
557
561
  }
@@ -563,7 +567,7 @@ declare namespace WAFV2 {
563
567
  }
564
568
  export interface Body {
565
569
  /**
566
- * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
570
+ * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
567
571
  */
568
572
  OversizeHandling?: OversizeHandling;
569
573
  }
@@ -869,7 +873,7 @@ declare namespace WAFV2 {
869
873
  */
870
874
  TokenDomains?: TokenDomains;
871
875
  /**
872
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
876
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
873
877
  */
874
878
  AssociationConfig?: AssociationConfig;
875
879
  }
@@ -1174,7 +1178,7 @@ declare namespace WAFV2 {
1174
1178
  */
1175
1179
  QueryString?: QueryString;
1176
1180
  /**
1177
- * Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
1181
+ * Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
1178
1182
  */
1179
1183
  Body?: Body;
1180
1184
  /**
@@ -1182,7 +1186,7 @@ declare namespace WAFV2 {
1182
1186
  */
1183
1187
  Method?: Method;
1184
1188
  /**
1185
- * Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
1189
+ * Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
1186
1190
  */
1187
1191
  JsonBody?: JsonBody;
1188
1192
  /**
@@ -1729,7 +1733,7 @@ declare namespace WAFV2 {
1729
1733
  */
1730
1734
  InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
1731
1735
  /**
1732
- * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
1736
+ * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
1733
1737
  */
1734
1738
  OversizeHandling?: OversizeHandling;
1735
1739
  }
@@ -2682,7 +2686,7 @@ declare namespace WAFV2 {
2682
2686
  export type RequestBody = {[key: string]: RequestBodyAssociatedResourceTypeConfig};
2683
2687
  export interface RequestBodyAssociatedResourceTypeConfig {
2684
2688
  /**
2685
- * Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 kilobytes)
2689
+ * Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 bytes)
2686
2690
  */
2687
2691
  DefaultSizeInspectionLimit: SizeInspectionLimit;
2688
2692
  }
@@ -2810,7 +2814,7 @@ declare namespace WAFV2 {
2810
2814
  export type ResponseStatusCode = number;
2811
2815
  export interface Rule {
2812
2816
  /**
2813
- * The name of the rule. You can't change the name of a Rule after you create it.
2817
+ * The name of the rule. If you change the name of a Rule after you create it and you want the rule's metric name to reflect the change, update the metric name in the rule's VisibilityConfig settings. WAF doesn't automatically update the metric name when you update the rule name.
2814
2818
  */
2815
2819
  Name: EntityName;
2816
2820
  /**
@@ -2834,7 +2838,7 @@ declare namespace WAFV2 {
2834
2838
  */
2835
2839
  RuleLabels?: Labels;
2836
2840
  /**
2837
- * Defines and enables Amazon CloudWatch metrics and web request sample collection.
2841
+ * Defines and enables Amazon CloudWatch metrics and web request sample collection. If you change the name of a Rule after you create it and you want the rule's metric name to reflect the change, update the metric name as well. WAF doesn't automatically update the metric name.
2838
2842
  */
2839
2843
  VisibilityConfig: VisibilityConfig;
2840
2844
  /**
@@ -3088,7 +3092,7 @@ declare namespace WAFV2 {
3088
3092
  */
3089
3093
  XssMatchStatement?: XssMatchStatement;
3090
3094
  /**
3091
- * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (&gt;) or less than (&lt;). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL AssociationConfig, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
3095
+ * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (&gt;) or less than (&lt;). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL AssociationConfig, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
3092
3096
  */
3093
3097
  SizeConstraintStatement?: SizeConstraintStatement;
3094
3098
  /**
@@ -3411,7 +3415,7 @@ declare namespace WAFV2 {
3411
3415
  */
3412
3416
  TokenDomains?: TokenDomains;
3413
3417
  /**
3414
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3418
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3415
3419
  */
3416
3420
  AssociationConfig?: AssociationConfig;
3417
3421
  }
@@ -3522,7 +3526,7 @@ declare namespace WAFV2 {
3522
3526
  */
3523
3527
  TokenDomains?: TokenDomains;
3524
3528
  /**
3525
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3529
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3526
3530
  */
3527
3531
  AssociationConfig?: AssociationConfig;
3528
3532
  }
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1450.0',
86
+ VERSION: '2.1452.0',
87
87
 
88
88
  /**
89
89
  * @api private