You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(client-wafv2): Add a new CurrentDefaultVersion field to ListAvailableManagedRuleGroupVersions API response; add a new VersioningSupported boolean to each ManagedRuleGroup returned from ListAvailableManagedRuleGroups API response.
* <p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>
1368
1368
* <p>Use this for the account takeover prevention managed rule group
1369
1369
* <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>
1370
+
* <p>You can provide multiple individual <code>ManagedRuleGroupConfig</code> objects for any rule group configuration, for example <code>UsernameField</code> and <code>PasswordField</code>. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: <code>LoginPath</code>, <code>PasswordField</code>, <code>PayloadType</code> and <code>UsernameField</code>.</p>
* <p>Indicates whether the managed rule group is versioned. If it is, you can retrieve the versions list by calling <a>ListAvailableManagedRuleGroupVersions</a>. </p>
4749
+
*/
4750
+
VersioningSupported?: boolean;
4751
+
4746
4752
/**
4747
4753
* <p>The description of the managed rule group, provided by Amazon Web Services Managed Rules or the Amazon Web Services Marketplace seller who manages it.</p>
* <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and <code>wafv2:PutFirewallManagerRuleGroups</code>. WAF rejects any extra actions or wildcard actions in the policy.</p>
5740
+
* <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and
5741
+
* <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify <code>wafv2:GetRuleGroup</code>.
5742
+
* WAF rejects any extra actions or wildcard actions in the policy.</p>
5730
5743
* </li>
5731
5744
* <li>
5732
5745
* <p>The policy must not include a <code>Resource</code> parameter.</p>
* <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and <code>wafv2:PutFirewallManagerRuleGroups</code>. WAF rejects any extra actions or wildcard actions in the policy.</p>
5790
+
* <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and
5791
+
* <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify <code>wafv2:GetRuleGroup</code>.
5792
+
* WAF rejects any extra actions or wildcard actions in the policy.</p>
5778
5793
* </li>
5779
5794
* <li>
5780
5795
* <p>The policy must not include a <code>Resource</code> parameter.</p>
* <p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>
6301
6316
* <p>Use this for the account takeover prevention managed rule group
6302
6317
* <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>
6318
+
* <p>You can provide multiple individual <code>ManagedRuleGroupConfig</code> objects for any rule group configuration, for example <code>UsernameField</code> and <code>PasswordField</code>. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: <code>LoginPath</code>, <code>PasswordField</code>, <code>PayloadType</code> and <code>UsernameField</code>.</p>
"smithy.api#documentation": "<p>The versions that are currently available for the specified managed rule group. </p>"
4523
4532
}
4533
+
},
4534
+
"CurrentDefaultVersion": {
4535
+
"target": "com.amazonaws.wafv2#VersionKeyString",
4536
+
"traits": {
4537
+
"smithy.api#documentation": "<p>The name of the version that's currently set as the default. </p>"
4538
+
}
4524
4539
}
4525
4540
}
4526
4541
},
@@ -5302,7 +5317,7 @@
5302
5317
}
5303
5318
},
5304
5319
"traits": {
5305
-
"smithy.api#documentation": "<p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>\n <p>Use this for the account takeover prevention managed rule group \n <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>"
5320
+
"smithy.api#documentation": "<p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>\n <p>Use this for the account takeover prevention managed rule group \n <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>\n <p>You can provide multiple individual <code>ManagedRuleGroupConfig</code> objects for any rule group configuration, for example <code>UsernameField</code> and <code>PasswordField</code>. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: <code>LoginPath</code>, <code>PasswordField</code>, <code>PayloadType</code> and <code>UsernameField</code>.</p>"
"smithy.api#documentation": "<p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>\n <p>Use this for the account takeover prevention managed rule group \n <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>"
5372
+
"smithy.api#documentation": "<p>Additional information that's used by a managed rule group. Most managed rule groups don't require this.</p>\n <p>Use this for the account takeover prevention managed rule group \n <code>AWSManagedRulesATPRuleSet</code>, to provide information about the sign-in page of your application. </p>\n <p>You can provide multiple individual <code>ManagedRuleGroupConfig</code> objects for any rule group configuration, for example <code>UsernameField</code> and <code>PasswordField</code>. The configuration that you provide depends on the needs of the managed rule group. For the ATP managed rule group, you provide the following individual configuration objects: <code>LoginPath</code>, <code>PasswordField</code>, <code>PayloadType</code> and <code>UsernameField</code>.</p>"
5358
5373
}
5359
5374
}
5360
5375
},
@@ -5383,6 +5398,12 @@
5383
5398
"smithy.api#documentation": "<p>The name of the managed rule group. You use this, along with the vendor name, to identify the rule group.</p>"
5384
5399
}
5385
5400
},
5401
+
"VersioningSupported": {
5402
+
"target": "com.amazonaws.wafv2#Boolean",
5403
+
"traits": {
5404
+
"smithy.api#documentation": "<p>Indicates whether the managed rule group is versioned. If it is, you can retrieve the versions list by calling <a>ListAvailableManagedRuleGroupVersions</a>. </p>"
"smithy.api#documentation": "<p>The policy to attach to the specified rule group. </p>\n \n <p>The policy specifications must conform to the following:</p>\n <ul>\n <li> \n <p>The policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.</p>\n </li>\n <li>\n <p>The policy must include specifications for <code>Effect</code>, <code>Action</code>, and <code>Principal</code>.</p>\n </li>\n <li>\n <p>\n <code>Effect</code> must specify <code>Allow</code>.</p>\n </li>\n <li>\n <p>\n <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and <code>wafv2:PutFirewallManagerRuleGroups</code>. WAF rejects any extra actions or wildcard actions in the policy.</p>\n </li>\n <li>\n <p>The policy must not include a <code>Resource</code> parameter.</p>\n </li>\n </ul> \n <p>For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM Policies</a>. </p>",
6250
+
"smithy.api#documentation": "<p>The policy to attach to the specified rule group. </p>\n \n <p>The policy specifications must conform to the following:</p>\n <ul>\n <li> \n <p>The policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.</p>\n </li>\n <li>\n <p>The policy must include specifications for <code>Effect</code>, <code>Action</code>, and <code>Principal</code>.</p>\n </li>\n <li>\n <p>\n <code>Effect</code> must specify <code>Allow</code>.</p>\n </li>\n <li>\n <p>\n <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and \n <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify <code>wafv2:GetRuleGroup</code>. \n WAF rejects any extra actions or wildcard actions in the policy.</p>\n </li>\n <li>\n <p>The policy must not include a <code>Resource</code> parameter.</p>\n </li>\n </ul> \n <p>For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM Policies</a>. </p>",
6230
6251
"smithy.api#required": {}
6231
6252
}
6232
6253
}
@@ -8287,7 +8308,7 @@
8287
8308
}
8288
8309
},
8289
8310
"traits": {
8290
-
"smithy.api#documentation": "<p>The operation failed because the specified policy isn't in the proper format. </p>\n \n <p>The policy specifications must conform to the following:</p>\n <ul>\n <li> \n <p>The policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.</p>\n </li>\n <li>\n <p>The policy must include specifications for <code>Effect</code>, <code>Action</code>, and <code>Principal</code>.</p>\n </li>\n <li>\n <p>\n <code>Effect</code> must specify <code>Allow</code>.</p>\n </li>\n <li>\n <p>\n <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and <code>wafv2:PutFirewallManagerRuleGroups</code>. WAF rejects any extra actions or wildcard actions in the policy.</p>\n </li>\n <li>\n <p>The policy must not include a <code>Resource</code> parameter.</p>\n </li>\n </ul> \n <p>For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM Policies</a>. </p>",
8311
+
"smithy.api#documentation": "<p>The operation failed because the specified policy isn't in the proper format. </p>\n \n <p>The policy specifications must conform to the following:</p>\n <ul>\n <li> \n <p>The policy must be composed using IAM Policy version 2012-10-17 or version 2015-01-01.</p>\n </li>\n <li>\n <p>The policy must include specifications for <code>Effect</code>, <code>Action</code>, and <code>Principal</code>.</p>\n </li>\n <li>\n <p>\n <code>Effect</code> must specify <code>Allow</code>.</p>\n </li>\n <li>\n <p>\n <code>Action</code> must specify <code>wafv2:CreateWebACL</code>, <code>wafv2:UpdateWebACL</code>, and \n <code>wafv2:PutFirewallManagerRuleGroups</code> and may optionally specify <code>wafv2:GetRuleGroup</code>. \n WAF rejects any extra actions or wildcard actions in the policy.</p>\n </li>\n <li>\n <p>The policy must not include a <code>Resource</code> parameter.</p>\n </li>\n </ul> \n <p>For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM Policies</a>. </p>",
0 commit comments