You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat(client-wafv2): For web ACLs that protect CloudFront protections, the default request body inspection size is now 16 KB, and you can use the new association configuration to increase the inspection size further, up to 64 KB. Sizes over 16 KB can incur additional costs.
Copy file name to clipboardExpand all lines: clients/client-wafv2/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -39,7 +39,7 @@ Guide</a>.</p>
39
39
<ul>
40
40
<li>
41
41
<p>For regional applications, you can use any of the endpoints in the list.
42
-
A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service. </p>
42
+
A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
43
43
</li>
44
44
<li>
45
45
<p>For Amazon CloudFront applications, you must use the API endpoint listed for
Copy file name to clipboardExpand all lines: clients/client-wafv2/src/WAFV2.ts
+13-11
Original file line number
Diff line number
Diff line change
@@ -242,7 +242,7 @@ import { WAFV2Client } from "./WAFV2Client";
242
242
* <ul>
243
243
* <li>
244
244
* <p>For regional applications, you can use any of the endpoints in the list.
245
-
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service. </p>
245
+
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
246
246
* </li>
247
247
* <li>
248
248
* <p>For Amazon CloudFront applications, you must use the API endpoint listed for
@@ -276,10 +276,10 @@ export class WAFV2 extends WAFV2Client {
276
276
/**
277
277
* @public
278
278
* <p>Associates a web ACL with a regional application resource, to protect the resource.
279
-
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service. </p>
279
+
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
280
280
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
281
281
* associate a web ACL, in the CloudFront call <code>UpdateDistribution</code>, set the web ACL ID
282
-
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
282
+
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a> in the <i>Amazon CloudFront Developer Guide</i>. </p>
283
283
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
284
284
*/
285
285
publicassociateWebACL(
@@ -323,8 +323,8 @@ export class WAFV2 extends WAFV2Client {
323
323
* Simple rules that cost little to run use fewer WCUs than more complex rules
324
324
* that use more processing power.
325
325
* Rule group capacity is fixed at creation, which helps users plan their
326
-
* web ACL WCU usage when they use a rule group.
327
-
* The WCU limit for web ACLs is 1,500. </p>
326
+
* web ACL WCU usage when they use a rule group. For more information, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/aws-waf-capacity-units.html">WAF web ACL capacity units (WCU)</a>
327
+
* in the <i>WAF Developer Guide</i>. </p>
328
328
*/
329
329
publiccheckCapacity(
330
330
args: CheckCapacityCommandInput,
@@ -456,7 +456,7 @@ export class WAFV2 extends WAFV2Client {
456
456
/**
457
457
* @public
458
458
* <p>Creates a <a>WebACL</a> per the specifications provided.</p>
459
-
* <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, Amazon Cognito user pool, or an App Runner service. </p>
459
+
* <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
460
460
*/
461
461
publiccreateWebACL(
462
462
args: CreateWebACLCommandInput,
@@ -696,7 +696,8 @@ export class WAFV2 extends WAFV2Client {
696
696
* </li>
697
697
* <li>
698
698
* <p>For Amazon CloudFront distributions, use the CloudFront call
699
-
* <code>ListDistributionsByWebACLId</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_ListDistributionsByWebACLId.html">ListDistributionsByWebACLId</a>.</p>
699
+
* <code>ListDistributionsByWebACLId</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_ListDistributionsByWebACLId.html">ListDistributionsByWebACLId</a>
700
+
* in the <i>Amazon CloudFront API Reference</i>. </p>
700
701
* </li>
701
702
* </ul>
702
703
* </li>
@@ -708,7 +709,8 @@ export class WAFV2 extends WAFV2Client {
708
709
* </li>
709
710
* <li>
710
711
* <p>For Amazon CloudFront distributions, provide an empty web ACL ID in the CloudFront call
711
-
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
712
+
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>
713
+
* in the <i>Amazon CloudFront API Reference</i>. </p>
712
714
* </li>
713
715
* </ul>
714
716
* </li>
@@ -778,10 +780,10 @@ export class WAFV2 extends WAFV2Client {
778
780
/**
779
781
* @public
780
782
* <p>Disassociates the specified regional application resource from any existing web ACL
781
-
* association. A resource can have at most one web ACL association. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service. </p>
783
+
* association. A resource can have at most one web ACL association. A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
782
784
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
783
785
* disassociate a web ACL, provide an empty web ACL ID in the CloudFront call
784
-
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
786
+
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a> in the <i>Amazon CloudFront API Reference</i>. </p>
785
787
*/
786
788
publicdisassociateWebACL(
787
789
args: DisassociateWebACLCommandInput,
@@ -2045,7 +2047,7 @@ export class WAFV2 extends WAFV2Client {
2045
2047
* </ol>
2046
2048
* </note>
2047
2049
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
2048
-
* <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, Amazon Cognito user pool, or an App Runner service. </p>
2050
+
* <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
* <p>For regional applications, you can use any of the endpoints in the list.
482
-
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service. </p>
482
+
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
483
483
* </li>
484
484
* <li>
485
485
* <p>For Amazon CloudFront applications, you must use the API endpoint listed for
* <p>Associates a web ACL with a regional application resource, to protect the resource.
39
-
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, a Amazon Cognito user pool, or an App Runner service. </p>
39
+
* A regional application can be an Application Load Balancer (ALB), an Amazon API Gateway REST API, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
40
40
* <p>For Amazon CloudFront, don't use this call. Instead, use your CloudFront distribution configuration. To
41
41
* associate a web ACL, in the CloudFront call <code>UpdateDistribution</code>, set the web ACL ID
42
-
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
42
+
* to the Amazon Resource Name (ARN) of the web ACL. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a> in the <i>Amazon CloudFront Developer Guide</i>. </p>
43
43
* <p>When you make changes to web ACLs or web ACL components, like rules and rule groups, WAF propagates the changes everywhere that the web ACL and its components are stored and used. Your changes are applied within seconds, but there might be a brief period of inconsistency when the changes have arrived in some places and not in others. So, for example, if you change a rule action setting, the action might be the old action in one area and the new action in another area. Or if you add an IP address to an IP set used in a blocking rule, the new address might briefly be blocked in one area while still allowed in another. This temporary inconsistency can occur when you first associate a web ACL with an Amazon Web Services resource and when you change a web ACL that is already associated with a resource. Generally, any inconsistencies of this type last only a few seconds.</p>
44
44
* @example
45
45
* Use a bare-bones client and the command you need to make an API call.
* Simple rules that cost little to run use fewer WCUs than more complex rules
46
46
* that use more processing power.
47
47
* Rule group capacity is fixed at creation, which helps users plan their
48
-
* web ACL WCU usage when they use a rule group.
49
-
* The WCU limit for web ACLs is 1,500. </p>
48
+
* web ACL WCU usage when they use a rule group. For more information, see <a href="https://docs.aws.amazon.com/waf/latest/developerguide/aws-waf-capacity-units.html">WAF web ACL capacity units (WCU)</a>
49
+
* in the <i>WAF Developer Guide</i>. </p>
50
50
* @example
51
51
* Use a bare-bones client and the command you need to make an API call.
* <p>Creates a <a>WebACL</a> per the specifications provided.</p>
39
-
* <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, Amazon Cognito user pool, or an App Runner service. </p>
39
+
* <p> A web ACL defines a collection of rules to use to inspect and control web requests. Each rule has an action defined (allow, block, or count) for requests that match the statement of the rule. In the web ACL, you assign a default action to take (allow, block) for any request that does not match any of the rules. The rules in a web ACL can be a combination of the types <a>Rule</a>, <a>RuleGroup</a>, and managed rule group. You can associate a web ACL with one or more Amazon Web Services resources to protect. The resources can be an Amazon CloudFront distribution, an Amazon API Gateway REST API, an Application Load Balancer, an AppSync GraphQL API, an Amazon Cognito user pool, or an App Runner service. </p>
40
40
* @example
41
41
* Use a bare-bones client and the command you need to make an API call.
* <p>For Amazon CloudFront distributions, use the CloudFront call
53
-
* <code>ListDistributionsByWebACLId</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_ListDistributionsByWebACLId.html">ListDistributionsByWebACLId</a>.</p>
53
+
* <code>ListDistributionsByWebACLId</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_ListDistributionsByWebACLId.html">ListDistributionsByWebACLId</a>
54
+
* in the <i>Amazon CloudFront API Reference</i>. </p>
* <p>For Amazon CloudFront distributions, provide an empty web ACL ID in the CloudFront call
65
-
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>.</p>
66
+
* <code>UpdateDistribution</code>. For information, see <a href="https://docs.aws.amazon.com/cloudfront/latest/APIReference/API_UpdateDistribution.html">UpdateDistribution</a>
67
+
* in the <i>Amazon CloudFront API Reference</i>. </p>
0 commit comments