Skip to content

Commit d30039c

Browse files
author
awstools
committed
feat(client-wafv2): test and verified, safe to release
1 parent 2e04900 commit d30039c

File tree

4 files changed

+38
-49
lines changed

4 files changed

+38
-49
lines changed

clients/client-wafv2/src/commands/UpdateWebACLCommand.ts

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1153,6 +1153,16 @@ export interface UpdateWebACLCommandOutput extends UpdateWebACLResponse, __Metad
11531153
* OnSourceDDoSProtectionConfig: { // OnSourceDDoSProtectionConfig
11541154
* ALBLowReputationMode: "ACTIVE_UNDER_DDOS" || "ALWAYS_ON", // required
11551155
* },
1156+
* ApplicationConfig: { // ApplicationConfig
1157+
* Attributes: [ // ApplicationAttributes
1158+
* { // ApplicationAttribute
1159+
* Name: "STRING_VALUE",
1160+
* Values: [ // AttributeValues
1161+
* "STRING_VALUE",
1162+
* ],
1163+
* },
1164+
* ],
1165+
* },
11561166
* };
11571167
* const command = new UpdateWebACLCommand(input);
11581168
* const response = await client.send(command);

clients/client-wafv2/src/models/models_0.ts

Lines changed: 18 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -2899,7 +2899,7 @@ export interface RuleAction {
28992899
/**
29002900
* <p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>
29012901
* <note>
2902-
* <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p>
2902+
* <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>
29032903
* </note>
29042904
* <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>
29052905
* @public
@@ -2908,7 +2908,7 @@ export interface RuleActionOverride {
29082908
/**
29092909
* <p>The name of the rule to override.</p>
29102910
* <note>
2911-
* <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p>
2911+
* <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>
29122912
* </note>
29132913
* @public
29142914
*/
@@ -9542,6 +9542,22 @@ export interface UpdateWebACLRequest {
95429542
* @public
95439543
*/
95449544
OnSourceDDoSProtectionConfig?: OnSourceDDoSProtectionConfig | undefined;
9545+
9546+
/**
9547+
* <p>Configures the ability for the WAF console to store and retrieve application attributes.
9548+
* Application attributes help WAF give recommendations for protection packs.</p>
9549+
* <p>When using <code>UpdateWebACL</code>, <code>ApplicationConfig</code> follows these rules:</p>
9550+
* <ul>
9551+
* <li>
9552+
* <p>If you omit <code>ApplicationConfig</code> from the request, all existing entries in the web ACL are retained.</p>
9553+
* </li>
9554+
* <li>
9555+
* <p>If you include <code>ApplicationConfig</code>, entries must match the existing values exactly. Any attempt to modify existing entries will result in an error.</p>
9556+
* </li>
9557+
* </ul>
9558+
* @public
9559+
*/
9560+
ApplicationConfig?: ApplicationConfig | undefined;
95459561
}
95469562

95479563
/**

clients/client-wafv2/src/protocols/Aws_json1_1.ts

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -3132,6 +3132,7 @@ const se_UpdateRuleGroupRequest = (input: UpdateRuleGroupRequest, context: __Ser
31323132
*/
31333133
const se_UpdateWebACLRequest = (input: UpdateWebACLRequest, context: __SerdeContext): any => {
31343134
return take(input, {
3135+
ApplicationConfig: _json,
31353136
AssociationConfig: _json,
31363137
CaptchaConfig: _json,
31373138
ChallengeConfig: _json,

codegen/sdk-codegen/aws-models/wafv2.json

Lines changed: 9 additions & 47 deletions
Original file line numberDiff line numberDiff line change
@@ -1481,17 +1481,6 @@
14811481
"UseDualStack": true
14821482
}
14831483
},
1484-
{
1485-
"documentation": "For region us-iso-east-1 with FIPS enabled and DualStack enabled",
1486-
"expect": {
1487-
"error": "FIPS and DualStack are enabled, but this partition does not support one or both"
1488-
},
1489-
"params": {
1490-
"Region": "us-iso-east-1",
1491-
"UseFIPS": true,
1492-
"UseDualStack": true
1493-
}
1494-
},
14951484
{
14961485
"documentation": "For region us-iso-east-1 with FIPS enabled and DualStack disabled",
14971486
"expect": {
@@ -1505,17 +1494,6 @@
15051494
"UseDualStack": false
15061495
}
15071496
},
1508-
{
1509-
"documentation": "For region us-iso-east-1 with FIPS disabled and DualStack enabled",
1510-
"expect": {
1511-
"error": "DualStack is enabled but this partition does not support DualStack"
1512-
},
1513-
"params": {
1514-
"Region": "us-iso-east-1",
1515-
"UseFIPS": false,
1516-
"UseDualStack": true
1517-
}
1518-
},
15191497
{
15201498
"documentation": "For region us-iso-east-1 with FIPS disabled and DualStack disabled",
15211499
"expect": {
@@ -1529,17 +1507,6 @@
15291507
"UseDualStack": false
15301508
}
15311509
},
1532-
{
1533-
"documentation": "For region us-isob-east-1 with FIPS enabled and DualStack enabled",
1534-
"expect": {
1535-
"error": "FIPS and DualStack are enabled, but this partition does not support one or both"
1536-
},
1537-
"params": {
1538-
"Region": "us-isob-east-1",
1539-
"UseFIPS": true,
1540-
"UseDualStack": true
1541-
}
1542-
},
15431510
{
15441511
"documentation": "For region us-isob-east-1 with FIPS enabled and DualStack disabled",
15451512
"expect": {
@@ -1553,17 +1520,6 @@
15531520
"UseDualStack": false
15541521
}
15551522
},
1556-
{
1557-
"documentation": "For region us-isob-east-1 with FIPS disabled and DualStack enabled",
1558-
"expect": {
1559-
"error": "DualStack is enabled but this partition does not support DualStack"
1560-
},
1561-
"params": {
1562-
"Region": "us-isob-east-1",
1563-
"UseFIPS": false,
1564-
"UseDualStack": true
1565-
}
1566-
},
15671523
{
15681524
"documentation": "For region us-isob-east-1 with FIPS disabled and DualStack disabled",
15691525
"expect": {
@@ -1975,7 +1931,7 @@
19751931
"traits": {
19761932
"smithy.api#length": {
19771933
"min": 1,
1978-
"max": 10
1934+
"max": 50
19791935
}
19801936
}
19811937
},
@@ -11380,7 +11336,7 @@
1138011336
"Name": {
1138111337
"target": "com.amazonaws.wafv2#EntityName",
1138211338
"traits": {
11383-
"smithy.api#documentation": "<p>The name of the rule to override.</p>\n <note>\n <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p>\n </note>",
11339+
"smithy.api#documentation": "<p>The name of the rule to override.</p>\n <note>\n <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>\n </note>",
1138411340
"smithy.api#required": {}
1138511341
}
1138611342
},
@@ -11393,7 +11349,7 @@
1139311349
}
1139411350
},
1139511351
"traits": {
11396-
"smithy.api#documentation": "<p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>\n <note>\n <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p>\n </note>\n <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>"
11352+
"smithy.api#documentation": "<p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p>\n <note>\n <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p>\n </note>\n <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>"
1139711353
}
1139811354
},
1139911355
"com.amazonaws.wafv2#RuleActionOverrides": {
@@ -13046,6 +13002,12 @@
1304613002
"traits": {
1304713003
"smithy.api#documentation": "<p>Specifies the type of DDoS protection to apply to web request data for a web ACL. For most scenarios, it is recommended to use the default protection level, <code>ACTIVE_UNDER_DDOS</code>. \n If a web ACL is associated with multiple Application Load Balancers, the changes you make to DDoS protection in that web ACL will apply to all associated Application Load Balancers.</p>"
1304813004
}
13005+
},
13006+
"ApplicationConfig": {
13007+
"target": "com.amazonaws.wafv2#ApplicationConfig",
13008+
"traits": {
13009+
"smithy.api#documentation": "<p>Configures the ability for the WAF console to store and retrieve application attributes. \n Application attributes help WAF give recommendations for protection packs.</p>\n <p>When using <code>UpdateWebACL</code>, <code>ApplicationConfig</code> follows these rules:</p>\n <ul>\n <li>\n <p>If you omit <code>ApplicationConfig</code> from the request, all existing entries in the web ACL are retained.</p>\n </li>\n <li>\n <p>If you include <code>ApplicationConfig</code>, entries must match the existing values exactly. Any attempt to modify existing entries will result in an error.</p>\n </li>\n </ul>"
13010+
}
1304913011
}
1305013012
},
1305113013
"traits": {

0 commit comments

Comments
 (0)