You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(client-wafv2): You can now inspect all request headers and all cookies. You can now specify how to handle oversize body contents in your rules that inspect the body.
Copy file name to clipboardExpand all lines: clients/client-wafv2/src/WAFV2.ts
+43-3
Original file line number
Diff line number
Diff line change
@@ -278,6 +278,8 @@ export class WAFV2 extends WAFV2Client {
278
278
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
279
279
* associate a web ACL, in the CloudFront call <code>UpdateDistribution</code>, set the web ACL ID
280
280
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
281
+
*
282
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
281
283
*/
282
284
publicassociateWebACL(
283
285
args: AssociateWebACLCommandInput,
@@ -666,9 +668,38 @@ export class WAFV2 extends WAFV2Client {
666
668
}
667
669
668
670
/**
669
-
* <p>Deletes the specified <a>WebACL</a>.</p>
671
+
* <p>Deletes the specified <a>WebACL</a>.</p>
670
672
* <p>You can only use this if <code>ManagedByFirewallManager</code> is false in the specified
671
673
* <a>WebACL</a>. </p>
674
+
* <note>
675
+
* <p>Before deleting any web ACL, first disassociate it from all resources.</p>
676
+
* <ul>
677
+
* <li>
678
+
* <p>To retrieve a list of the resources that are associated with a web ACL, use the following calls:</p>
* <p>For Amazon CloudFront distributions, use the CloudFront call <code>ListDistributionsByWebACLId</code>.
685
+
* For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_ListDistributionsByWebACLId.html">ListDistributionsByWebACLId</a>.</p>
686
+
* </li>
687
+
* </ul>
688
+
* </li>
689
+
* <li>
690
+
* <p>To disassociate a resource from a web ACL, use the following calls:</p>
* <p>For Amazon CloudFront distributions, provide an empty web ACL ID in the CloudFront call
697
+
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
698
+
* </li>
699
+
* </ul>
700
+
* </li>
701
+
* </ul>
702
+
* </note>
672
703
*/
673
704
publicdeleteWebACL(
674
705
args: DeleteWebACLCommandInput,
@@ -730,7 +761,8 @@ export class WAFV2 extends WAFV2Client {
730
761
}
731
762
732
763
/**
733
-
* <p>Disassociates a web ACL from a regional application resource. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. </p>
764
+
* <p>Disassociates the specified regional application resource from any existing web ACL association. A resource can have at most one
765
+
* web ACL association. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. </p>
734
766
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
735
767
* disassociate a web ACL, provide an empty web ACL ID in the CloudFront call
736
768
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
@@ -1740,6 +1772,8 @@ export class WAFV2 extends WAFV2Client {
1740
1772
* <note>
1741
1773
* <p>This operation completely replaces the mutable specifications that you already have for the IP set with the ones that you provide to this call. To modify the IP set, retrieve it by calling <a>GetIPSet</a>, update the settings as needed, and then provide the complete IP set specification to this call.</p>
1742
1774
* </note>
1775
+
*
1776
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
@@ -1809,6 +1843,8 @@ export class WAFV2 extends WAFV2Client {
1809
1843
* <note>
1810
1844
* <p>This operation completely replaces the mutable specifications that you already have for the regex pattern set with the ones that you provide to this call. To modify the regex pattern set, retrieve it by calling <a>GetRegexPatternSet</a>, update the settings as needed, and then provide the complete regex pattern set specification to this call.</p>
1811
1845
* </note>
1846
+
*
1847
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
1812
1848
*/
1813
1849
publicupdateRegexPatternSet(
1814
1850
args: UpdateRegexPatternSetCommandInput,
@@ -1844,6 +1880,8 @@ export class WAFV2 extends WAFV2Client {
1844
1880
* <note>
1845
1881
* <p>This operation completely replaces the mutable specifications that you already have for the rule group with the ones that you provide to this call. To modify the rule group, retrieve it by calling <a>GetRuleGroup</a>, update the settings as needed, and then provide the complete rule group specification to this call.</p>
1846
1882
* </note>
1883
+
*
1884
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
1847
1885
* <p> A rule group defines a collection of rules to inspect and control web requests that you can use in a <a>WebACL</a>. When you create a rule group, you define an immutable capacity limit. If you update a rule group, you must stay within the capacity. This allows others to reuse the rule group with confidence in its capacity requirements. </p>
1848
1886
*/
1849
1887
publicupdateRuleGroup(
@@ -1876,7 +1914,9 @@ export class WAFV2 extends WAFV2Client {
1876
1914
}
1877
1915
1878
1916
/**
1879
-
* <p>Updates the specified <a>WebACL</a>.</p>
1917
+
* <p>Updates the specified <a>WebACL</a>. While updating a web ACL, WAF provides continous coverage to the resources that you have associated with the web ACL. </p>
1918
+
*
1919
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
1880
1920
* <note>
1881
1921
* <p>This operation completely replaces the mutable specifications that you already have for the web ACL with the ones that you provide to this call. To modify the web ACL, retrieve it by calling <a>GetWebACL</a>, update the settings as needed, and then provide the complete web ACL specification to this call.</p>
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
28
28
* associate a web ACL, in the CloudFront call <code>UpdateDistribution</code>, set the web ACL ID
29
29
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
30
+
*
31
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
30
32
* @example
31
33
* Use a bare-bones client and the command you need to make an API call.
* <p>For Amazon CloudFront distributions, use the CloudFront call <code>ListDistributionsByWebACLId</code>.
39
+
* For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_ListDistributionsByWebACLId.html">ListDistributionsByWebACLId</a>.</p>
40
+
* </li>
41
+
* </ul>
42
+
* </li>
43
+
* <li>
44
+
* <p>To disassociate a resource from a web ACL, use the following calls:</p>
* <p>For Amazon CloudFront distributions, provide an empty web ACL ID in the CloudFront call
51
+
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
52
+
* </li>
53
+
* </ul>
54
+
* </li>
55
+
* </ul>
56
+
* </note>
28
57
* @example
29
58
* Use a bare-bones client and the command you need to make an API call.
* <p>Disassociates a web ACL from a regional application resource. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. </p>
25
+
* <p>Disassociates the specified regional application resource from any existing web ACL association. A resource can have at most one
26
+
* web ACL association. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, or an AppSync GraphQL API. </p>
26
27
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
27
28
* disassociate a web ACL, provide an empty web ACL ID in the CloudFront call
28
29
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
* <p>This operation completely replaces the mutable specifications that you already have for the IP set with the ones that you provide to this call. To modify the IP set, retrieve it by calling <a>GetIPSet</a>, update the settings as needed, and then provide the complete IP set specification to this call.</p>
28
28
* </note>
29
+
*
30
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
29
31
* @example
30
32
* Use a bare-bones client and the command you need to make an API call.
* <p>This operation completely replaces the mutable specifications that you already have for the regex pattern set with the ones that you provide to this call. To modify the regex pattern set, retrieve it by calling <a>GetRegexPatternSet</a>, update the settings as needed, and then provide the complete regex pattern set specification to this call.</p>
28
28
* </note>
29
+
*
30
+
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
29
31
* @example
30
32
* Use a bare-bones client and the command you need to make an API call.
0 commit comments