cdk-lambda-subminute 2.0.230 → 2.0.232

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -833,143 +833,143 @@ declare namespace SecurityHub {
833
833
  }
834
834
  export interface AutomationRulesFindingFilters {
835
835
  /**
836
- * The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub.
836
+ * The Amazon Resource Name (ARN) for a third-party product that generated a finding in Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
837
837
  */
838
838
  ProductArn?: StringFilterList;
839
839
  /**
840
- * The Amazon Web Services account ID in which a finding was generated.
840
+ * The Amazon Web Services account ID in which a finding was generated. Array Members: Minimum number of 1 item. Maximum number of 100 items.
841
841
  */
842
842
  AwsAccountId?: StringFilterList;
843
843
  /**
844
- * The product-specific identifier for a finding.
844
+ * The product-specific identifier for a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
845
845
  */
846
846
  Id?: StringFilterList;
847
847
  /**
848
- * The identifier for the solution-specific component that generated a finding.
848
+ * The identifier for the solution-specific component that generated a finding. Array Members: Minimum number of 1 item. Maximum number of 100 items.
849
849
  */
850
850
  GeneratorId?: StringFilterList;
851
851
  /**
852
- * One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the Security Hub User Guide.
852
+ * One or more finding types in the format of namespace/category/classifier that classify a finding. For a list of namespaces, classifiers, and categories, see Types taxonomy for ASFF in the Security Hub User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
853
853
  */
854
854
  Type?: StringFilterList;
855
855
  /**
856
- * A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.
856
+ * A timestamp that indicates when the potential security issue captured by a finding was first observed by the security findings product. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z. Array Members: Minimum number of 1 item. Maximum number of 20 items.
857
857
  */
858
858
  FirstObservedAt?: DateFilterList;
859
859
  /**
860
- * A timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings product. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.
860
+ * A timestamp that indicates when the potential security issue captured by a finding was most recently observed by the security findings product. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z. Array Members: Minimum number of 1 item. Maximum number of 20 items.
861
861
  */
862
862
  LastObservedAt?: DateFilterList;
863
863
  /**
864
- * A timestamp that indicates when this finding record was created. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.
864
+ * A timestamp that indicates when this finding record was created. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z. Array Members: Minimum number of 1 item. Maximum number of 20 items.
865
865
  */
866
866
  CreatedAt?: DateFilterList;
867
867
  /**
868
- * A timestamp that indicates when the finding record was most recently updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.
868
+ * A timestamp that indicates when the finding record was most recently updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z. Array Members: Minimum number of 1 item. Maximum number of 20 items.
869
869
  */
870
870
  UpdatedAt?: DateFilterList;
871
871
  /**
872
- * The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidence is scored on a 0–100 basis using a ratio scale. A value of 0 means 0 percent confidence, and a value of 100 means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the Security Hub User Guide.
872
+ * The likelihood that a finding accurately identifies the behavior or issue that it was intended to identify. Confidence is scored on a 0–100 basis using a ratio scale. A value of 0 means 0 percent confidence, and a value of 100 means 100 percent confidence. For example, a data exfiltration detection based on a statistical deviation of network traffic has low confidence because an actual exfiltration hasn't been verified. For more information, see Confidence in the Security Hub User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
873
873
  */
874
874
  Confidence?: NumberFilterList;
875
875
  /**
876
- * The level of importance that is assigned to the resources that are associated with a finding. Criticality is scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources. For more information, see Criticality in the Security Hub User Guide.
876
+ * The level of importance that is assigned to the resources that are associated with a finding. Criticality is scored on a 0–100 basis, using a ratio scale that supports only full integers. A score of 0 means that the underlying resources have no criticality, and a score of 100 is reserved for the most critical resources. For more information, see Criticality in the Security Hub User Guide. Array Members: Minimum number of 1 item. Maximum number of 20 items.
877
877
  */
878
878
  Criticality?: NumberFilterList;
879
879
  /**
880
- * A finding's title.
880
+ * A finding's title. Array Members: Minimum number of 1 item. Maximum number of 100 items.
881
881
  */
882
882
  Title?: StringFilterList;
883
883
  /**
884
- * A finding's description.
884
+ * A finding's description. Array Members: Minimum number of 1 item. Maximum number of 20 items.
885
885
  */
886
886
  Description?: StringFilterList;
887
887
  /**
888
- * Provides a URL that links to a page about the current finding in the finding product.
888
+ * Provides a URL that links to a page about the current finding in the finding product. Array Members: Minimum number of 1 item. Maximum number of 20 items.
889
889
  */
890
890
  SourceUrl?: StringFilterList;
891
891
  /**
892
- * Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub.
892
+ * Provides the name of the product that generated the finding. For control-based findings, the product name is Security Hub. Array Members: Minimum number of 1 item. Maximum number of 20 items.
893
893
  */
894
894
  ProductName?: StringFilterList;
895
895
  /**
896
- * The name of the company for the product that generated the finding. For control-based findings, the company is Amazon Web Services.
896
+ * The name of the company for the product that generated the finding. For control-based findings, the company is Amazon Web Services. Array Members: Minimum number of 1 item. Maximum number of 20 items.
897
897
  */
898
898
  CompanyName?: StringFilterList;
899
899
  /**
900
- * The severity value of the finding.
900
+ * The severity value of the finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
901
901
  */
902
902
  SeverityLabel?: StringFilterList;
903
903
  /**
904
- * The type of resource that the finding pertains to.
904
+ * The type of resource that the finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
905
905
  */
906
906
  ResourceType?: StringFilterList;
907
907
  /**
908
- * The identifier for the given resource type. For Amazon Web Services resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, this is the identifier as defined by the Amazon Web Service that created the resource. For non-Amazon Web Services resources, this is a unique identifier that is associated with the resource.
908
+ * The identifier for the given resource type. For Amazon Web Services resources that are identified by Amazon Resource Names (ARNs), this is the ARN. For Amazon Web Services resources that lack ARNs, this is the identifier as defined by the Amazon Web Service that created the resource. For non-Amazon Web Services resources, this is a unique identifier that is associated with the resource. Array Members: Minimum number of 1 item. Maximum number of 100 items.
909
909
  */
910
910
  ResourceId?: StringFilterList;
911
911
  /**
912
- * The partition in which the resource that the finding pertains to is located. A partition is a group of Amazon Web Services Regions. Each Amazon Web Services account is scoped to one partition.
912
+ * The partition in which the resource that the finding pertains to is located. A partition is a group of Amazon Web Services Regions. Each Amazon Web Services account is scoped to one partition. Array Members: Minimum number of 1 item. Maximum number of 20 items.
913
913
  */
914
914
  ResourcePartition?: StringFilterList;
915
915
  /**
916
- * The Amazon Web Services Region where the resource that a finding pertains to is located.
916
+ * The Amazon Web Services Region where the resource that a finding pertains to is located. Array Members: Minimum number of 1 item. Maximum number of 20 items.
917
917
  */
918
918
  ResourceRegion?: StringFilterList;
919
919
  /**
920
- * A list of Amazon Web Services tags associated with a resource at the time the finding was processed.
920
+ * A list of Amazon Web Services tags associated with a resource at the time the finding was processed. Array Members: Minimum number of 1 item. Maximum number of 20 items.
921
921
  */
922
922
  ResourceTags?: MapFilterList;
923
923
  /**
924
- * Custom fields and values about the resource that a finding pertains to.
924
+ * Custom fields and values about the resource that a finding pertains to. Array Members: Minimum number of 1 item. Maximum number of 20 items.
925
925
  */
926
926
  ResourceDetailsOther?: MapFilterList;
927
927
  /**
928
- * The result of a security check. This field is only used for findings generated from controls.
928
+ * The result of a security check. This field is only used for findings generated from controls. Array Members: Minimum number of 1 item. Maximum number of 20 items.
929
929
  */
930
930
  ComplianceStatus?: StringFilterList;
931
931
  /**
932
- * The security control ID for which a finding was generated. Security control IDs are the same across standards.
932
+ * The security control ID for which a finding was generated. Security control IDs are the same across standards. Array Members: Minimum number of 1 item. Maximum number of 20 items.
933
933
  */
934
934
  ComplianceSecurityControlId?: StringFilterList;
935
935
  /**
936
- * The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response.
936
+ * The unique identifier of a standard in which a control is enabled. This field consists of the resource portion of the Amazon Resource Name (ARN) returned for a standard in the DescribeStandards API response. Array Members: Minimum number of 1 item. Maximum number of 20 items.
937
937
  */
938
938
  ComplianceAssociatedStandardsId?: StringFilterList;
939
939
  /**
940
- * Provides the veracity of a finding.
940
+ * Provides the veracity of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
941
941
  */
942
942
  VerificationState?: StringFilterList;
943
943
  /**
944
- * Provides information about the status of the investigation into a finding.
944
+ * Provides information about the status of the investigation into a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
945
945
  */
946
946
  WorkflowStatus?: StringFilterList;
947
947
  /**
948
- * Provides the current state of a finding.
948
+ * Provides the current state of a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
949
949
  */
950
950
  RecordState?: StringFilterList;
951
951
  /**
952
- * The ARN for the product that generated a related finding.
952
+ * The ARN for the product that generated a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
953
953
  */
954
954
  RelatedFindingsProductArn?: StringFilterList;
955
955
  /**
956
- * The product-generated identifier for a related finding.
956
+ * The product-generated identifier for a related finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
957
957
  */
958
958
  RelatedFindingsId?: StringFilterList;
959
959
  /**
960
- * The text of a user-defined note that's added to a finding.
960
+ * The text of a user-defined note that's added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
961
961
  */
962
962
  NoteText?: StringFilterList;
963
963
  /**
964
- * The timestamp of when the note was updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z.
964
+ * The timestamp of when the note was updated. Uses the date-time format specified in RFC 3339 section 5.6, Internet Date/Time Format. The value cannot contain spaces. For example, 2020-03-22T13:22:13.933Z. Array Members: Minimum number of 1 item. Maximum number of 20 items.
965
965
  */
966
966
  NoteUpdatedAt?: DateFilterList;
967
967
  /**
968
- * The principal that created a note.
968
+ * The principal that created a note. Array Members: Minimum number of 1 item. Maximum number of 20 items.
969
969
  */
970
970
  NoteUpdatedBy?: StringFilterList;
971
971
  /**
972
- * A list of user-defined name and value string pairs added to a finding.
972
+ * A list of user-defined name and value string pairs added to a finding. Array Members: Minimum number of 1 item. Maximum number of 20 items.
973
973
  */
974
974
  UserDefinedFields?: MapFilterList;
975
975
  }
@@ -413,7 +413,7 @@ declare namespace SimSpaceWeaver {
413
413
  /**
414
414
  * The name of an Amazon S3 bucket. For more information about buckets, see Creating, configuring, and working with Amazon S3 buckets in the Amazon Simple Storage Service User Guide.
415
415
  */
416
- BucketName?: BucketName;
416
+ BucketName: BucketName;
417
417
  /**
418
418
  * A string prefix for an Amazon S3 object key. It's usually a folder name. For more information about folders in Amazon S3, see Organizing objects in the Amazon S3 console using folders in the Amazon Simple Storage Service User Guide.
419
419
  */
@@ -423,11 +423,11 @@ declare namespace SimSpaceWeaver {
423
423
  /**
424
424
  * The name of an Amazon S3 bucket. For more information about buckets, see Creating, configuring, and working with Amazon S3 buckets in the Amazon Simple Storage Service User Guide.
425
425
  */
426
- BucketName?: BucketName;
426
+ BucketName: BucketName;
427
427
  /**
428
428
  * The key name of an object in Amazon S3. For more information about Amazon S3 objects and object keys, see Uploading, downloading, and working with objects in Amazon S3 in the Amazon Simple Storage Service User Guide.
429
429
  */
430
- ObjectKey?: ObjectKey;
430
+ ObjectKey: ObjectKey;
431
431
  }
432
432
  export type SimSpaceWeaverArn = string;
433
433
  export type SimSpaceWeaverLongResourceName = string;
@@ -504,6 +504,10 @@ declare namespace WAFV2 {
504
504
  * The inspection level to use for the Bot Control rule group. The common level is the least expensive. The targeted level includes all common level rules and adds rules with more advanced inspection criteria. For details, see WAF Bot Control rule group in the WAF Developer Guide.
505
505
  */
506
506
  InspectionLevel: InspectionLevel;
507
+ /**
508
+ * Applies only to the targeted inspection level. Determines whether to use machine learning (ML) to analyze your web traffic for bot-related activity. Machine learning is required for the Bot Control rules TGT_ML_CoordinatedActivityLow and TGT_ML_CoordinatedActivityMedium, which inspect for anomalous behavior that might indicate distributed, coordinated bot activity. For more information about this choice, see the listing for these rules in the table at Bot Control rules listing in the WAF Developer Guide. Default: TRUE
509
+ */
510
+ EnableMachineLearning?: Boolean;
507
511
  }
508
512
  export type Action = string;
509
513
  export interface ActionCondition {
@@ -551,7 +555,7 @@ declare namespace WAFV2 {
551
555
  export type AssociatedResourceType = "CLOUDFRONT"|string;
552
556
  export interface AssociationConfig {
553
557
  /**
554
- * Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
558
+ * Customizes the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default size is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
555
559
  */
556
560
  RequestBody?: RequestBody;
557
561
  }
@@ -563,7 +567,7 @@ declare namespace WAFV2 {
563
567
  }
564
568
  export interface Body {
565
569
  /**
566
- * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
570
+ * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
567
571
  */
568
572
  OversizeHandling?: OversizeHandling;
569
573
  }
@@ -869,7 +873,7 @@ declare namespace WAFV2 {
869
873
  */
870
874
  TokenDomains?: TokenDomains;
871
875
  /**
872
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
876
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
873
877
  */
874
878
  AssociationConfig?: AssociationConfig;
875
879
  }
@@ -1174,7 +1178,7 @@ declare namespace WAFV2 {
1174
1178
  */
1175
1179
  QueryString?: QueryString;
1176
1180
  /**
1177
- * Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
1181
+ * Inspect the request body as plain text. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the Body object configuration.
1178
1182
  */
1179
1183
  Body?: Body;
1180
1184
  /**
@@ -1182,7 +1186,7 @@ declare namespace WAFV2 {
1182
1186
  */
1183
1187
  Method?: Method;
1184
1188
  /**
1185
- * Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 kilobytes) and for CloudFront distributions, the limit is 16 KB (16,384 kilobytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
1189
+ * Inspect the request body as JSON. The request body immediately follows the request headers. This is the part of a request that contains any additional data that you want to send to your web server as the HTTP request body, such as data from a form. A limited amount of the request body is forwarded to WAF for inspection by the underlying host service. For regional resources, the limit is 8 KB (8,192 bytes) and for CloudFront distributions, the limit is 16 KB (16,384 bytes). For CloudFront distributions, you can increase the limit in the web ACL's AssociationConfig, for additional processing fees. For information about how to handle oversized request bodies, see the JsonBody object configuration.
1186
1190
  */
1187
1191
  JsonBody?: JsonBody;
1188
1192
  /**
@@ -1729,7 +1733,7 @@ declare namespace WAFV2 {
1729
1733
  */
1730
1734
  InvalidFallbackBehavior?: BodyParsingFallbackBehavior;
1731
1735
  /**
1732
- * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 kilobytes) for regional resources and 16 KB (16,384 kilobytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
1736
+ * What WAF should do if the body is larger than WAF can inspect. WAF does not support inspecting the entire contents of the web request body if the body exceeds the limit for the resource type. If the body is larger than the limit, the underlying host service only forwards the contents that are below the limit to WAF for inspection. The default limit is 8 KB (8,192 bytes) for regional resources and 16 KB (16,384 bytes) for CloudFront distributions. For CloudFront distributions, you can increase the limit in the web ACL AssociationConfig, for additional processing fees. The options for oversize handling are the following: CONTINUE - Inspect the available body contents normally, according to the rule inspection criteria. MATCH - Treat the web request as matching the rule statement. WAF applies the rule action to the request. NO_MATCH - Treat the web request as not matching the rule statement. You can combine the MATCH or NO_MATCH settings for oversize handling with your rule and web ACL action settings, so that you block any request whose body is over the limit. Default: CONTINUE
1733
1737
  */
1734
1738
  OversizeHandling?: OversizeHandling;
1735
1739
  }
@@ -2682,7 +2686,7 @@ declare namespace WAFV2 {
2682
2686
  export type RequestBody = {[key: string]: RequestBodyAssociatedResourceTypeConfig};
2683
2687
  export interface RequestBodyAssociatedResourceTypeConfig {
2684
2688
  /**
2685
- * Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 kilobytes)
2689
+ * Specifies the maximum size of the web request body component that an associated CloudFront distribution should send to WAF for inspection. This applies to statements in the web ACL that inspect the body or JSON body. Default: 16 KB (16,384 bytes)
2686
2690
  */
2687
2691
  DefaultSizeInspectionLimit: SizeInspectionLimit;
2688
2692
  }
@@ -2810,7 +2814,7 @@ declare namespace WAFV2 {
2810
2814
  export type ResponseStatusCode = number;
2811
2815
  export interface Rule {
2812
2816
  /**
2813
- * The name of the rule. You can't change the name of a Rule after you create it.
2817
+ * The name of the rule. If you change the name of a Rule after you create it and you want the rule's metric name to reflect the change, update the metric name in the rule's VisibilityConfig settings. WAF doesn't automatically update the metric name when you update the rule name.
2814
2818
  */
2815
2819
  Name: EntityName;
2816
2820
  /**
@@ -2834,7 +2838,7 @@ declare namespace WAFV2 {
2834
2838
  */
2835
2839
  RuleLabels?: Labels;
2836
2840
  /**
2837
- * Defines and enables Amazon CloudWatch metrics and web request sample collection.
2841
+ * Defines and enables Amazon CloudWatch metrics and web request sample collection. If you change the name of a Rule after you create it and you want the rule's metric name to reflect the change, update the metric name as well. WAF doesn't automatically update the metric name.
2838
2842
  */
2839
2843
  VisibilityConfig: VisibilityConfig;
2840
2844
  /**
@@ -3088,7 +3092,7 @@ declare namespace WAFV2 {
3088
3092
  */
3089
3093
  XssMatchStatement?: XssMatchStatement;
3090
3094
  /**
3091
- * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 kilobytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 kilobytes). For CloudFront web ACLs, you can increase the limit in the web ACL AssociationConfig, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
3095
+ * A rule statement that compares a number of bytes against the size of a request component, using a comparison operator, such as greater than (>) or less than (<). For example, you can use a size constraint statement to look for query strings that are longer than 100 bytes. If you configure WAF to inspect the request body, WAF inspects only the number of bytes of the body up to the limit for the web ACL. By default, for regional web ACLs, this limit is 8 KB (8,192 bytes) and for CloudFront web ACLs, this limit is 16 KB (16,384 bytes). For CloudFront web ACLs, you can increase the limit in the web ACL AssociationConfig, for additional fees. If you know that the request body for your web requests should never exceed the inspection limit, you could use a size constraint statement to block requests that have a larger request body size. If you choose URI for the value of Part of the request to filter on, the slash (/) in the URI counts as one character. For example, the URI /logo.jpg is nine characters long.
3092
3096
  */
3093
3097
  SizeConstraintStatement?: SizeConstraintStatement;
3094
3098
  /**
@@ -3411,7 +3415,7 @@ declare namespace WAFV2 {
3411
3415
  */
3412
3416
  TokenDomains?: TokenDomains;
3413
3417
  /**
3414
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3418
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3415
3419
  */
3416
3420
  AssociationConfig?: AssociationConfig;
3417
3421
  }
@@ -3522,7 +3526,7 @@ declare namespace WAFV2 {
3522
3526
  */
3523
3527
  TokenDomains?: TokenDomains;
3524
3528
  /**
3525
- * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 kilobytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3529
+ * Specifies custom configurations for the associations between the web ACL and protected resources. Use this to customize the maximum size of the request body that your protected CloudFront distributions forward to WAF for inspection. The default is 16 KB (16,384 bytes). You are charged additional fees when your protected resources forward body sizes that are larger than the default. For more information, see WAF Pricing.
3526
3530
  */
3527
3531
  AssociationConfig?: AssociationConfig;
3528
3532
  }
@@ -83,7 +83,7 @@ return /******/ (function(modules) { // webpackBootstrap
83
83
  /**
84
84
  * @constant
85
85
  */
86
- VERSION: '2.1451.0',
86
+ VERSION: '2.1453.0',
87
87
 
88
88
  /**
89
89
  * @api private