|
1481 | 1481 | "UseDualStack": true
|
1482 | 1482 | }
|
1483 | 1483 | },
|
1484 |
| - { |
1485 |
| - "documentation": "For region us-iso-east-1 with FIPS enabled and DualStack enabled", |
1486 |
| - "expect": { |
1487 |
| - "error": "FIPS and DualStack are enabled, but this partition does not support one or both" |
1488 |
| - }, |
1489 |
| - "params": { |
1490 |
| - "Region": "us-iso-east-1", |
1491 |
| - "UseFIPS": true, |
1492 |
| - "UseDualStack": true |
1493 |
| - } |
1494 |
| - }, |
1495 | 1484 | {
|
1496 | 1485 | "documentation": "For region us-iso-east-1 with FIPS enabled and DualStack disabled",
|
1497 | 1486 | "expect": {
|
|
1505 | 1494 | "UseDualStack": false
|
1506 | 1495 | }
|
1507 | 1496 | },
|
1508 |
| - { |
1509 |
| - "documentation": "For region us-iso-east-1 with FIPS disabled and DualStack enabled", |
1510 |
| - "expect": { |
1511 |
| - "error": "DualStack is enabled but this partition does not support DualStack" |
1512 |
| - }, |
1513 |
| - "params": { |
1514 |
| - "Region": "us-iso-east-1", |
1515 |
| - "UseFIPS": false, |
1516 |
| - "UseDualStack": true |
1517 |
| - } |
1518 |
| - }, |
1519 | 1497 | {
|
1520 | 1498 | "documentation": "For region us-iso-east-1 with FIPS disabled and DualStack disabled",
|
1521 | 1499 | "expect": {
|
|
1529 | 1507 | "UseDualStack": false
|
1530 | 1508 | }
|
1531 | 1509 | },
|
1532 |
| - { |
1533 |
| - "documentation": "For region us-isob-east-1 with FIPS enabled and DualStack enabled", |
1534 |
| - "expect": { |
1535 |
| - "error": "FIPS and DualStack are enabled, but this partition does not support one or both" |
1536 |
| - }, |
1537 |
| - "params": { |
1538 |
| - "Region": "us-isob-east-1", |
1539 |
| - "UseFIPS": true, |
1540 |
| - "UseDualStack": true |
1541 |
| - } |
1542 |
| - }, |
1543 | 1510 | {
|
1544 | 1511 | "documentation": "For region us-isob-east-1 with FIPS enabled and DualStack disabled",
|
1545 | 1512 | "expect": {
|
|
1553 | 1520 | "UseDualStack": false
|
1554 | 1521 | }
|
1555 | 1522 | },
|
1556 |
| - { |
1557 |
| - "documentation": "For region us-isob-east-1 with FIPS disabled and DualStack enabled", |
1558 |
| - "expect": { |
1559 |
| - "error": "DualStack is enabled but this partition does not support DualStack" |
1560 |
| - }, |
1561 |
| - "params": { |
1562 |
| - "Region": "us-isob-east-1", |
1563 |
| - "UseFIPS": false, |
1564 |
| - "UseDualStack": true |
1565 |
| - } |
1566 |
| - }, |
1567 | 1523 | {
|
1568 | 1524 | "documentation": "For region us-isob-east-1 with FIPS disabled and DualStack disabled",
|
1569 | 1525 | "expect": {
|
|
1975 | 1931 | "traits": {
|
1976 | 1932 | "smithy.api#length": {
|
1977 | 1933 | "min": 1,
|
1978 |
| - "max": 10 |
| 1934 | + "max": 50 |
1979 | 1935 | }
|
1980 | 1936 | }
|
1981 | 1937 | },
|
|
11380 | 11336 | "Name": {
|
11381 | 11337 | "target": "com.amazonaws.wafv2#EntityName",
|
11382 | 11338 | "traits": {
|
11383 |
| - "smithy.api#documentation": "<p>The name of the rule to override.</p>\n <note>\n <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p>\n </note>", |
| 11339 | + "smithy.api#documentation": "<p>The name of the rule to override.</p>\n <note>\n <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>\n </note>", |
11384 | 11340 | "smithy.api#required": {}
|
11385 | 11341 | }
|
11386 | 11342 | },
|
|
11393 | 11349 | }
|
11394 | 11350 | },
|
11395 | 11351 | "traits": {
|
11396 |
| - "smithy.api#documentation": "<p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>\n <note>\n <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p>\n </note>\n <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>" |
| 11352 | + "smithy.api#documentation": "<p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>\n <note>\n <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>\n </note>\n <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>" |
11397 | 11353 | }
|
11398 | 11354 | },
|
11399 | 11355 | "com.amazonaws.wafv2#RuleActionOverrides": {
|
|
13046 | 13002 | "traits": {
|
13047 | 13003 | "smithy.api#documentation": "<p>Specifies the type of DDoS protection to apply to web request data for a web ACL. For most scenarios, it is recommended to use the default protection level, <code>ACTIVE_UNDER_DDOS</code>. \n If a web ACL is associated with multiple Application Load Balancers, the changes you make to DDoS protection in that web ACL will apply to all associated Application Load Balancers.</p>"
|
13048 | 13004 | }
|
| 13005 | + }, |
| 13006 | + "ApplicationConfig": { |
| 13007 | + "target": "com.amazonaws.wafv2#ApplicationConfig", |
| 13008 | + "traits": { |
| 13009 | + "smithy.api#documentation": "<p>Configures the ability for the WAF console to store and retrieve application attributes. \n Application attributes help WAF give recommendations for protection packs.</p>\n <p>When using <code>UpdateWebACL</code>, <code>ApplicationConfig</code> follows these rules:</p>\n <ul>\n <li>\n <p>If you omit <code>ApplicationConfig</code> from the request, all existing entries in the web ACL are retained.</p>\n </li>\n <li>\n <p>If you include <code>ApplicationConfig</code>, entries must match the existing values exactly. Any attempt to modify existing entries will result in an error.</p>\n </li>\n </ul>" |
| 13010 | + } |
13049 | 13011 | }
|
13050 | 13012 | },
|
13051 | 13013 | "traits": {
|
|
0 commit comments