vendor: update all dependencies
This commit is contained in:
parent
940df88eb2
commit
d64789528d
4309 changed files with 1327278 additions and 1001118 deletions
99
vendor/github.com/aws/aws-sdk-go/models/apis/waf/2015-08-24/api-2.json
generated
vendored
99
vendor/github.com/aws/aws-sdk-go/models/apis/waf/2015-08-24/api-2.json
generated
vendored
|
@ -260,6 +260,20 @@
|
|||
{"shape":"WAFNonEmptyEntityException"}
|
||||
]
|
||||
},
|
||||
"DeletePermissionPolicy":{
|
||||
"name":"DeletePermissionPolicy",
|
||||
"http":{
|
||||
"method":"POST",
|
||||
"requestUri":"/"
|
||||
},
|
||||
"input":{"shape":"DeletePermissionPolicyRequest"},
|
||||
"output":{"shape":"DeletePermissionPolicyResponse"},
|
||||
"errors":[
|
||||
{"shape":"WAFInternalErrorException"},
|
||||
{"shape":"WAFStaleDataException"},
|
||||
{"shape":"WAFNonexistentItemException"}
|
||||
]
|
||||
},
|
||||
"DeleteRateBasedRule":{
|
||||
"name":"DeleteRateBasedRule",
|
||||
"http":{
|
||||
|
@ -479,6 +493,19 @@
|
|||
{"shape":"WAFNonexistentItemException"}
|
||||
]
|
||||
},
|
||||
"GetPermissionPolicy":{
|
||||
"name":"GetPermissionPolicy",
|
||||
"http":{
|
||||
"method":"POST",
|
||||
"requestUri":"/"
|
||||
},
|
||||
"input":{"shape":"GetPermissionPolicyRequest"},
|
||||
"output":{"shape":"GetPermissionPolicyResponse"},
|
||||
"errors":[
|
||||
{"shape":"WAFInternalErrorException"},
|
||||
{"shape":"WAFNonexistentItemException"}
|
||||
]
|
||||
},
|
||||
"GetRateBasedRule":{
|
||||
"name":"GetRateBasedRule",
|
||||
"http":{
|
||||
|
@ -814,6 +841,21 @@
|
|||
{"shape":"WAFInvalidAccountException"}
|
||||
]
|
||||
},
|
||||
"PutPermissionPolicy":{
|
||||
"name":"PutPermissionPolicy",
|
||||
"http":{
|
||||
"method":"POST",
|
||||
"requestUri":"/"
|
||||
},
|
||||
"input":{"shape":"PutPermissionPolicyRequest"},
|
||||
"output":{"shape":"PutPermissionPolicyResponse"},
|
||||
"errors":[
|
||||
{"shape":"WAFInternalErrorException"},
|
||||
{"shape":"WAFStaleDataException"},
|
||||
{"shape":"WAFNonexistentItemException"},
|
||||
{"shape":"WAFInvalidPermissionPolicyException"}
|
||||
]
|
||||
},
|
||||
"UpdateByteMatchSet":{
|
||||
"name":"UpdateByteMatchSet",
|
||||
"http":{
|
||||
|
@ -1444,6 +1486,18 @@
|
|||
"ChangeToken":{"shape":"ChangeToken"}
|
||||
}
|
||||
},
|
||||
"DeletePermissionPolicyRequest":{
|
||||
"type":"structure",
|
||||
"required":["ResourceArn"],
|
||||
"members":{
|
||||
"ResourceArn":{"shape":"ResourceArn"}
|
||||
}
|
||||
},
|
||||
"DeletePermissionPolicyResponse":{
|
||||
"type":"structure",
|
||||
"members":{
|
||||
}
|
||||
},
|
||||
"DeleteRateBasedRuleRequest":{
|
||||
"type":"structure",
|
||||
"required":[
|
||||
|
@ -1984,6 +2038,19 @@
|
|||
"IPSet":{"shape":"IPSet"}
|
||||
}
|
||||
},
|
||||
"GetPermissionPolicyRequest":{
|
||||
"type":"structure",
|
||||
"required":["ResourceArn"],
|
||||
"members":{
|
||||
"ResourceArn":{"shape":"ResourceArn"}
|
||||
}
|
||||
},
|
||||
"GetPermissionPolicyResponse":{
|
||||
"type":"structure",
|
||||
"members":{
|
||||
"Policy":{"shape":"PolicyString"}
|
||||
}
|
||||
},
|
||||
"GetRateBasedRuleManagedKeysRequest":{
|
||||
"type":"structure",
|
||||
"required":["RuleId"],
|
||||
|
@ -2492,6 +2559,10 @@
|
|||
"ILLEGAL_COMBINATION"
|
||||
]
|
||||
},
|
||||
"PolicyString":{
|
||||
"type":"string",
|
||||
"min":1
|
||||
},
|
||||
"PopulationSize":{"type":"long"},
|
||||
"PositionalConstraint":{
|
||||
"type":"string",
|
||||
|
@ -2532,6 +2603,22 @@
|
|||
"type":"list",
|
||||
"member":{"shape":"Predicate"}
|
||||
},
|
||||
"PutPermissionPolicyRequest":{
|
||||
"type":"structure",
|
||||
"required":[
|
||||
"ResourceArn",
|
||||
"Policy"
|
||||
],
|
||||
"members":{
|
||||
"ResourceArn":{"shape":"ResourceArn"},
|
||||
"Policy":{"shape":"PolicyString"}
|
||||
}
|
||||
},
|
||||
"PutPermissionPolicyResponse":{
|
||||
"type":"structure",
|
||||
"members":{
|
||||
}
|
||||
},
|
||||
"RateBasedRule":{
|
||||
"type":"structure",
|
||||
"required":[
|
||||
|
@ -2665,6 +2752,11 @@
|
|||
"member":{"shape":"RegexPatternString"},
|
||||
"max":10
|
||||
},
|
||||
"ResourceArn":{
|
||||
"type":"string",
|
||||
"max":1224,
|
||||
"min":1
|
||||
},
|
||||
"ResourceId":{
|
||||
"type":"string",
|
||||
"max":128,
|
||||
|
@ -3214,6 +3306,13 @@
|
|||
},
|
||||
"exception":true
|
||||
},
|
||||
"WAFInvalidPermissionPolicyException":{
|
||||
"type":"structure",
|
||||
"members":{
|
||||
"message":{"shape":"errorMessage"}
|
||||
},
|
||||
"exception":true
|
||||
},
|
||||
"WAFInvalidRegexPatternException":{
|
||||
"type":"structure",
|
||||
"members":{
|
||||
|
|
62
vendor/github.com/aws/aws-sdk-go/models/apis/waf/2015-08-24/docs-2.json
generated
vendored
62
vendor/github.com/aws/aws-sdk-go/models/apis/waf/2015-08-24/docs-2.json
generated
vendored
|
@ -17,6 +17,7 @@
|
|||
"DeleteByteMatchSet": "<p>Permanently deletes a <a>ByteMatchSet</a>. You can't delete a <code>ByteMatchSet</code> if it's still used in any <code>Rules</code> or if it still includes any <a>ByteMatchTuple</a> objects (any filters).</p> <p>If you just want to remove a <code>ByteMatchSet</code> from a <code>Rule</code>, use <a>UpdateRule</a>.</p> <p>To permanently delete a <code>ByteMatchSet</code>, perform the following steps:</p> <ol> <li> <p>Update the <code>ByteMatchSet</code> to remove filters, if any. For more information, see <a>UpdateByteMatchSet</a>.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of a <code>DeleteByteMatchSet</code> request.</p> </li> <li> <p>Submit a <code>DeleteByteMatchSet</code> request.</p> </li> </ol>",
|
||||
"DeleteGeoMatchSet": "<p>Permanently deletes a <a>GeoMatchSet</a>. You can't delete a <code>GeoMatchSet</code> if it's still used in any <code>Rules</code> or if it still includes any countries.</p> <p>If you just want to remove a <code>GeoMatchSet</code> from a <code>Rule</code>, use <a>UpdateRule</a>.</p> <p>To permanently delete a <code>GeoMatchSet</code> from AWS WAF, perform the following steps:</p> <ol> <li> <p>Update the <code>GeoMatchSet</code> to remove any countries. For more information, see <a>UpdateGeoMatchSet</a>.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of a <code>DeleteGeoMatchSet</code> request.</p> </li> <li> <p>Submit a <code>DeleteGeoMatchSet</code> request.</p> </li> </ol>",
|
||||
"DeleteIPSet": "<p>Permanently deletes an <a>IPSet</a>. You can't delete an <code>IPSet</code> if it's still used in any <code>Rules</code> or if it still includes any IP addresses.</p> <p>If you just want to remove an <code>IPSet</code> from a <code>Rule</code>, use <a>UpdateRule</a>.</p> <p>To permanently delete an <code>IPSet</code> from AWS WAF, perform the following steps:</p> <ol> <li> <p>Update the <code>IPSet</code> to remove IP address ranges, if any. For more information, see <a>UpdateIPSet</a>.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of a <code>DeleteIPSet</code> request.</p> </li> <li> <p>Submit a <code>DeleteIPSet</code> request.</p> </li> </ol>",
|
||||
"DeletePermissionPolicy": "<p>Permanently deletes an IAM policy from the specified RuleGroup.</p> <p>The user making the request must be the owner of the RuleGroup.</p>",
|
||||
"DeleteRateBasedRule": "<p>Permanently deletes a <a>RateBasedRule</a>. You can't delete a rule if it's still used in any <code>WebACL</code> objects or if it still includes any predicates, such as <code>ByteMatchSet</code> objects.</p> <p>If you just want to remove a rule from a <code>WebACL</code>, use <a>UpdateWebACL</a>.</p> <p>To permanently delete a <code>RateBasedRule</code> from AWS WAF, perform the following steps:</p> <ol> <li> <p>Update the <code>RateBasedRule</code> to remove predicates, if any. For more information, see <a>UpdateRateBasedRule</a>.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of a <code>DeleteRateBasedRule</code> request.</p> </li> <li> <p>Submit a <code>DeleteRateBasedRule</code> request.</p> </li> </ol>",
|
||||
"DeleteRegexMatchSet": "<p>Permanently deletes a <a>RegexMatchSet</a>. You can't delete a <code>RegexMatchSet</code> if it's still used in any <code>Rules</code> or if it still includes any <code>RegexMatchTuples</code> objects (any filters).</p> <p>If you just want to remove a <code>RegexMatchSet</code> from a <code>Rule</code>, use <a>UpdateRule</a>.</p> <p>To permanently delete a <code>RegexMatchSet</code>, perform the following steps:</p> <ol> <li> <p>Update the <code>RegexMatchSet</code> to remove filters, if any. For more information, see <a>UpdateRegexMatchSet</a>.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of a <code>DeleteRegexMatchSet</code> request.</p> </li> <li> <p>Submit a <code>DeleteRegexMatchSet</code> request.</p> </li> </ol>",
|
||||
"DeleteRegexPatternSet": "<p>Permanently deletes a <a>RegexPatternSet</a>. You can't delete a <code>RegexPatternSet</code> if it's still used in any <code>RegexMatchSet</code> or if the <code>RegexPatternSet</code> is not empty. </p>",
|
||||
|
@ -31,6 +32,7 @@
|
|||
"GetChangeTokenStatus": "<p>Returns the status of a <code>ChangeToken</code> that you got by calling <a>GetChangeToken</a>. <code>ChangeTokenStatus</code> is one of the following values:</p> <ul> <li> <p> <code>PROVISIONED</code>: You requested the change token by calling <code>GetChangeToken</code>, but you haven't used it yet in a call to create, update, or delete an AWS WAF object.</p> </li> <li> <p> <code>PENDING</code>: AWS WAF is propagating the create, update, or delete request to all AWS WAF servers.</p> </li> <li> <p> <code>IN_SYNC</code>: Propagation is complete.</p> </li> </ul>",
|
||||
"GetGeoMatchSet": "<p>Returns the <a>GeoMatchSet</a> that is specified by <code>GeoMatchSetId</code>.</p>",
|
||||
"GetIPSet": "<p>Returns the <a>IPSet</a> that is specified by <code>IPSetId</code>.</p>",
|
||||
"GetPermissionPolicy": "<p>Returns the IAM policy attached to the RuleGroup.</p>",
|
||||
"GetRateBasedRule": "<p>Returns the <a>RateBasedRule</a> that is specified by the <code>RuleId</code> that you included in the <code>GetRateBasedRule</code> request.</p>",
|
||||
"GetRateBasedRuleManagedKeys": "<p>Returns an array of IP addresses currently being blocked by the <a>RateBasedRule</a> that is specified by the <code>RuleId</code>. The maximum number of managed keys that will be blocked is 10,000. If more than 10,000 addresses exceed the rate limit, the 10,000 addresses with the highest rates will be blocked.</p>",
|
||||
"GetRegexMatchSet": "<p>Returns the <a>RegexMatchSet</a> specified by <code>RegexMatchSetId</code>.</p>",
|
||||
|
@ -56,6 +58,7 @@
|
|||
"ListSubscribedRuleGroups": "<p>Returns an array of <a>RuleGroup</a> objects that you are subscribed to.</p>",
|
||||
"ListWebACLs": "<p>Returns an array of <a>WebACLSummary</a> objects in the response.</p>",
|
||||
"ListXssMatchSets": "<p>Returns an array of <a>XssMatchSet</a> objects.</p>",
|
||||
"PutPermissionPolicy": "<p>Attaches a IAM policy to the specified resource. The only supported use for this action is to share a RuleGroup across accounts.</p> <p>The <code>PutPermissionPolicy</code> is subject to the following restrictions:</p> <ul> <li> <p>You can attach only one policy with each <code>PutPermissionPolicy</code> request.</p> </li> <li> <p>The policy must include an <code>Effect</code>, <code>Action</code> and <code>Principal</code>. </p> </li> <li> <p> <code>Effect</code> must specify <code>Allow</code>.</p> </li> <li> <p>The <code>Action</code> in the policy must be <code>waf:UpdateWebACL</code> and <code>waf-regional:UpdateWebACL</code>. Any extra or wildcard actions in the policy will be rejected.</p> </li> <li> <p>The policy cannot include a <code>Resource</code> parameter.</p> </li> <li> <p>The ARN in the request must be a valid WAF RuleGroup ARN and the RuleGroup must exist in the same region.</p> </li> <li> <p>The user making the request must be the owner of the RuleGroup.</p> </li> <li> <p>Your policy must be composed using IAM Policy version 2012-10-17.</p> </li> </ul> <p>For more information, see <a href=\"https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html\">IAM Policies</a>. </p> <p>An example of a valid policy parameter is shown in the Examples section below.</p>",
|
||||
"UpdateByteMatchSet": "<p>Inserts or deletes <a>ByteMatchTuple</a> objects (filters) in a <a>ByteMatchSet</a>. For each <code>ByteMatchTuple</code> object, you specify the following values: </p> <ul> <li> <p>Whether to insert or delete the object from the array. If you want to change a <code>ByteMatchSetUpdate</code> object, you delete the existing object and add a new one.</p> </li> <li> <p>The part of a web request that you want AWS WAF to inspect, such as a query string or the value of the <code>User-Agent</code> header. </p> </li> <li> <p>The bytes (typically a string that corresponds with ASCII characters) that you want AWS WAF to look for. For more information, including how you specify the values for the AWS WAF API and the AWS CLI or SDKs, see <code>TargetString</code> in the <a>ByteMatchTuple</a> data type. </p> </li> <li> <p>Where to look, such as at the beginning or the end of a query string.</p> </li> <li> <p>Whether to perform any conversions on the request, such as converting it to lowercase, before inspecting it for the specified string.</p> </li> </ul> <p>For example, you can add a <code>ByteMatchSetUpdate</code> object that matches web requests in which <code>User-Agent</code> headers contain the string <code>BadBot</code>. You can then configure AWS WAF to block those requests.</p> <p>To create and configure a <code>ByteMatchSet</code>, perform the following steps:</p> <ol> <li> <p>Create a <code>ByteMatchSet.</code> For more information, see <a>CreateByteMatchSet</a>.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of an <code>UpdateByteMatchSet</code> request.</p> </li> <li> <p>Submit an <code>UpdateByteMatchSet</code> request to specify the part of the request that you want AWS WAF to inspect (for example, the header or the URI) and the value that you want AWS WAF to watch for.</p> </li> </ol> <p>For more information about how to use the AWS WAF API to allow or block HTTP requests, see the <a href=\"http://docs.aws.amazon.com/waf/latest/developerguide/\">AWS WAF Developer Guide</a>.</p>",
|
||||
"UpdateGeoMatchSet": "<p>Inserts or deletes <a>GeoMatchConstraint</a> objects in an <code>GeoMatchSet</code>. For each <code>GeoMatchConstraint</code> object, you specify the following values: </p> <ul> <li> <p>Whether to insert or delete the object from the array. If you want to change an <code>GeoMatchConstraint</code> object, you delete the existing object and add a new one.</p> </li> <li> <p>The <code>Type</code>. The only valid value for <code>Type</code> is <code>Country</code>.</p> </li> <li> <p>The <code>Value</code>, which is a two character code for the country to add to the <code>GeoMatchConstraint</code> object. Valid codes are listed in <a>GeoMatchConstraint$Value</a>.</p> </li> </ul> <p>To create and configure an <code>GeoMatchSet</code>, perform the following steps:</p> <ol> <li> <p>Submit a <a>CreateGeoMatchSet</a> request.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of an <a>UpdateGeoMatchSet</a> request.</p> </li> <li> <p>Submit an <code>UpdateGeoMatchSet</code> request to specify the country that you want AWS WAF to watch for.</p> </li> </ol> <p>When you update an <code>GeoMatchSet</code>, you specify the country that you want to add and/or the country that you want to delete. If you want to change a country, you delete the existing country and add the new one.</p> <p>For more information about how to use the AWS WAF API to allow or block HTTP requests, see the <a href=\"http://docs.aws.amazon.com/waf/latest/developerguide/\">AWS WAF Developer Guide</a>.</p>",
|
||||
"UpdateIPSet": "<p>Inserts or deletes <a>IPSetDescriptor</a> objects in an <code>IPSet</code>. For each <code>IPSetDescriptor</code> object, you specify the following values: </p> <ul> <li> <p>Whether to insert or delete the object from the array. If you want to change an <code>IPSetDescriptor</code> object, you delete the existing object and add a new one.</p> </li> <li> <p>The IP address version, <code>IPv4</code> or <code>IPv6</code>. </p> </li> <li> <p>The IP address in CIDR notation, for example, <code>192.0.2.0/24</code> (for the range of IP addresses from <code>192.0.2.0</code> to <code>192.0.2.255</code>) or <code>192.0.2.44/32</code> (for the individual IP address <code>192.0.2.44</code>). </p> </li> </ul> <p>AWS WAF supports /8, /16, /24, and /32 IP address ranges for IPv4, and /24, /32, /48, /56, /64 and /128 for IPv6. For more information about CIDR notation, see the Wikipedia entry <a href=\"https://en.wikipedia.org/wiki/Classless_Inter-Domain_Routing\">Classless Inter-Domain Routing</a>.</p> <p>IPv6 addresses can be represented using any of the following formats:</p> <ul> <li> <p>1111:0000:0000:0000:0000:0000:0000:0111/128</p> </li> <li> <p>1111:0:0:0:0:0:0:0111/128</p> </li> <li> <p>1111::0111/128</p> </li> <li> <p>1111::111/128</p> </li> </ul> <p>You use an <code>IPSet</code> to specify which web requests you want to allow or block based on the IP addresses that the requests originated from. For example, if you're receiving a lot of requests from one or a small number of IP addresses and you want to block the requests, you can create an <code>IPSet</code> that specifies those IP addresses, and then configure AWS WAF to block the requests. </p> <p>To create and configure an <code>IPSet</code>, perform the following steps:</p> <ol> <li> <p>Submit a <a>CreateIPSet</a> request.</p> </li> <li> <p>Use <a>GetChangeToken</a> to get the change token that you provide in the <code>ChangeToken</code> parameter of an <a>UpdateIPSet</a> request.</p> </li> <li> <p>Submit an <code>UpdateIPSet</code> request to specify the IP addresses that you want AWS WAF to watch for.</p> </li> </ol> <p>When you update an <code>IPSet</code>, you specify the IP addresses that you want to add and/or the IP addresses that you want to delete. If you want to change an IP address, you delete the existing IP address and add the new one.</p> <p>For more information about how to use the AWS WAF API to allow or block HTTP requests, see the <a href=\"http://docs.aws.amazon.com/waf/latest/developerguide/\">AWS WAF Developer Guide</a>.</p>",
|
||||
|
@ -404,6 +407,16 @@
|
|||
"refs": {
|
||||
}
|
||||
},
|
||||
"DeletePermissionPolicyRequest": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"DeletePermissionPolicyResponse": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"DeleteRateBasedRuleRequest": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
|
@ -610,6 +623,16 @@
|
|||
"refs": {
|
||||
}
|
||||
},
|
||||
"GetPermissionPolicyRequest": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"GetPermissionPolicyResponse": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"GetRateBasedRuleManagedKeysRequest": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
|
@ -1086,6 +1109,13 @@
|
|||
"WAFInvalidParameterException$reason": null
|
||||
}
|
||||
},
|
||||
"PolicyString": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
"GetPermissionPolicyResponse$Policy": "<p>The IAM policy attached to the specified RuleGroup.</p>",
|
||||
"PutPermissionPolicyRequest$Policy": "<p>The policy to attach to the specified RuleGroup.</p>"
|
||||
}
|
||||
},
|
||||
"PopulationSize": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
|
@ -1118,6 +1148,16 @@
|
|||
"Rule$Predicates": "<p>The <code>Predicates</code> object contains one <code>Predicate</code> element for each <a>ByteMatchSet</a>, <a>IPSet</a>, or <a>SqlInjectionMatchSet</a> object that you want to include in a <code>Rule</code>.</p>"
|
||||
}
|
||||
},
|
||||
"PutPermissionPolicyRequest": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"PutPermissionPolicyResponse": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"RateBasedRule": {
|
||||
"base": "<p>A <code>RateBasedRule</code> is identical to a regular <a>Rule</a>, with one addition: a <code>RateBasedRule</code> counts the number of requests that arrive from a specified IP address every five minutes. For example, based on recent requests that you've seen from an attacker, you might create a <code>RateBasedRule</code> that includes the following conditions: </p> <ul> <li> <p>The requests come from 192.0.2.44.</p> </li> <li> <p>They contain the value <code>BadBot</code> in the <code>User-Agent</code> header.</p> </li> </ul> <p>In the rule, you also define the rate limit as 15,000.</p> <p>Requests that meet both of these conditions and exceed 15,000 requests every five minutes trigger the rule's action (block or count), which is defined in the web ACL.</p>",
|
||||
"refs": {
|
||||
|
@ -1228,6 +1268,14 @@
|
|||
"RegexPatternSet$RegexPatternStrings": "<p>Specifies the regular expression (regex) patterns that you want AWS WAF to search for, such as <code>B[a@]dB[o0]t</code>.</p>"
|
||||
}
|
||||
},
|
||||
"ResourceArn": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
"DeletePermissionPolicyRequest$ResourceArn": "<p>The Amazon Resource Name (ARN) of the RuleGroup from which you want to delete the policy.</p> <p>The user making the request must be the owner of the RuleGroup.</p>",
|
||||
"GetPermissionPolicyRequest$ResourceArn": "<p>The Amazon Resource Name (ARN) of the RuleGroup for which you want to get the policy.</p>",
|
||||
"PutPermissionPolicyRequest$ResourceArn": "<p>The Amazon Resource Name (ARN) of the RuleGroup to which you want to attach the policy.</p>"
|
||||
}
|
||||
},
|
||||
"ResourceId": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
|
@ -1377,7 +1425,7 @@
|
|||
"RuleGroupUpdates": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
"UpdateRuleGroupRequest$Updates": "<p>An array of <code>RuleGroupUpdate</code> objects that you want to insert into or delete from a <a>RuleGroup</a>.</p> <p>You can only insert <code>REGULAR</code> rules into a rule group.</p> <p>The <code>Action</code> data type within <code>ActivatedRule</code> is used only when submitting an <code>UpdateWebACL</code> request. <code>ActivatedRule|Action</code> is not applicable and therefore not available for <code>UpdateRuleGroup</code>.</p>"
|
||||
"UpdateRuleGroupRequest$Updates": "<p>An array of <code>RuleGroupUpdate</code> objects that you want to insert into or delete from a <a>RuleGroup</a>.</p> <p>You can only insert <code>REGULAR</code> rules into a rule group.</p> <p> <code>ActivatedRule|OverrideAction</code> applies only when updating or adding a <code>RuleGroup</code> to a <code>WebACL</code>. In this case you do not use <code>ActivatedRule|Action</code>. For all other update requests, <code>ActivatedRule|Action</code> is used instead of <code>ActivatedRule|OverrideAction</code>.</p>"
|
||||
}
|
||||
},
|
||||
"RulePriority": {
|
||||
|
@ -1712,6 +1760,11 @@
|
|||
"refs": {
|
||||
}
|
||||
},
|
||||
"WAFInvalidPermissionPolicyException": {
|
||||
"base": "<p>The operation failed because the specified policy is not in the proper format. </p> <p>The policy is subject to the following restrictions:</p> <ul> <li> <p>You can attach only one policy with each <code>PutPermissionPolicy</code> request.</p> </li> <li> <p>The policy must include an <code>Effect</code>, <code>Action</code> and <code>Principal</code>. </p> </li> <li> <p> <code>Effect</code> must specify <code>Allow</code>.</p> </li> <li> <p>The <code>Action</code> in the policy must be <code>waf:UpdateWebACL</code> or <code>waf-regional:UpdateWebACL</code>. Any extra or wildcard actions in the policy will be rejected.</p> </li> <li> <p>The policy cannot include a <code>Resource</code> parameter.</p> </li> <li> <p>The ARN in the request must be a valid WAF RuleGroup ARN and the RuleGroup must exist in the same region.</p> </li> <li> <p>The user making the request must be the owner of the RuleGroup.</p> </li> <li> <p>Your policy must be composed using IAM Policy version 2012-10-17.</p> </li> </ul>",
|
||||
"refs": {
|
||||
}
|
||||
},
|
||||
"WAFInvalidRegexPatternException": {
|
||||
"base": "<p>The regular expression (regex) you specified in <code>RegexPatternString</code> is invalid.</p>",
|
||||
"refs": {
|
||||
|
@ -1755,7 +1808,7 @@
|
|||
"WafAction": {
|
||||
"base": "<p>For the action that is associated with a rule in a <code>WebACL</code>, specifies the action that you want AWS WAF to perform when a web request matches all of the conditions in a rule. For the default action in a <code>WebACL</code>, specifies the action that you want AWS WAF to take when a web request doesn't match all of the conditions in any of the rules in a <code>WebACL</code>. </p>",
|
||||
"refs": {
|
||||
"ActivatedRule$Action": "<p>Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the <code>Rule</code>. Valid values for <code>Action</code> include the following:</p> <ul> <li> <p> <code>ALLOW</code>: CloudFront responds with the requested object.</p> </li> <li> <p> <code>BLOCK</code>: CloudFront responds with an HTTP 403 (Forbidden) status code.</p> </li> <li> <p> <code>COUNT</code>: AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. </p> </li> </ul> <p>The <code>Action</code> data type within <code>ActivatedRule</code> is used only when submitting an <code>UpdateWebACL</code> request. <code>ActivatedRule|Action</code> is not applicable and therefore not available for <code>UpdateRuleGroup</code>.</p>",
|
||||
"ActivatedRule$Action": "<p>Specifies the action that CloudFront or AWS WAF takes when a web request matches the conditions in the <code>Rule</code>. Valid values for <code>Action</code> include the following:</p> <ul> <li> <p> <code>ALLOW</code>: CloudFront responds with the requested object.</p> </li> <li> <p> <code>BLOCK</code>: CloudFront responds with an HTTP 403 (Forbidden) status code.</p> </li> <li> <p> <code>COUNT</code>: AWS WAF increments a counter of requests that match the conditions in the rule and then continues to inspect the web request based on the remaining rules in the web ACL. </p> </li> </ul> <p> <code>ActivatedRule|OverrideAction</code> applies only when updating or adding a <code>RuleGroup</code> to a <code>WebACL</code>. In this case you do not use <code>ActivatedRule|Action</code>. For all other update requests, <code>ActivatedRule|Action</code> is used instead of <code>ActivatedRule|OverrideAction</code>.</p>",
|
||||
"CreateWebACLRequest$DefaultAction": "<p>The action that you want AWS WAF to take when a request doesn't match the criteria specified in any of the <code>Rule</code> objects that are associated with the <code>WebACL</code>.</p>",
|
||||
"UpdateWebACLRequest$DefaultAction": "<p>A default action for the web ACL, either ALLOW or BLOCK. AWS WAF performs the default action if a request doesn't match the criteria in any of the rules in a web ACL.</p>",
|
||||
"WebACL$DefaultAction": "<p>The action to perform if none of the <code>Rules</code> contained in the <code>WebACL</code> match. The action is specified by the <a>WafAction</a> object.</p>"
|
||||
|
@ -1770,7 +1823,7 @@
|
|||
"WafOverrideAction": {
|
||||
"base": "<p>The action to take if any rule within the <code>RuleGroup</code> matches a request. </p>",
|
||||
"refs": {
|
||||
"ActivatedRule$OverrideAction": "<p>Use the <code>OverrideAction</code> to test your <code>RuleGroup</code>.</p> <p>Any rule in a <code>RuleGroup</code> can potentially block a request. If you set the <code>OverrideAction</code> to <code>None</code>, the <code>RuleGroup</code> will block a request if any individual rule in the <code>RuleGroup</code> matches the request and is configured to block that request. However if you first want to test the <code>RuleGroup</code>, set the <code>OverrideAction</code> to <code>Count</code>. The <code>RuleGroup</code> will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using <a>GetSampledRequests</a>. </p> <p>The <code>OverrideAction</code> data type within <code>ActivatedRule</code> is used only when submitting an <code>UpdateRuleGroup</code> request. <code>ActivatedRule|OverrideAction</code> is not applicable and therefore not available for <code>UpdateWebACL</code>.</p>"
|
||||
"ActivatedRule$OverrideAction": "<p>Use the <code>OverrideAction</code> to test your <code>RuleGroup</code>.</p> <p>Any rule in a <code>RuleGroup</code> can potentially block a request. If you set the <code>OverrideAction</code> to <code>None</code>, the <code>RuleGroup</code> will block a request if any individual rule in the <code>RuleGroup</code> matches the request and is configured to block that request. However if you first want to test the <code>RuleGroup</code>, set the <code>OverrideAction</code> to <code>Count</code>. The <code>RuleGroup</code> will then override any block action specified by individual rules contained within the group. Instead of blocking matching requests, those requests will be counted. You can view a record of counted requests using <a>GetSampledRequests</a>. </p> <p> <code>ActivatedRule|OverrideAction</code> applies only when updating or adding a <code>RuleGroup</code> to a <code>WebACL</code>. In this case you do not use <code>ActivatedRule|Action</code>. For all other update requests, <code>ActivatedRule|Action</code> is used instead of <code>ActivatedRule|OverrideAction</code>.</p>"
|
||||
}
|
||||
},
|
||||
"WafOverrideActionType": {
|
||||
|
@ -1813,7 +1866,7 @@
|
|||
"WebACLUpdates": {
|
||||
"base": null,
|
||||
"refs": {
|
||||
"UpdateWebACLRequest$Updates": "<p>An array of updates to make to the <a>WebACL</a>.</p> <p>An array of <code>WebACLUpdate</code> objects that you want to insert into or delete from a <a>WebACL</a>. For more information, see the applicable data types:</p> <ul> <li> <p> <a>WebACLUpdate</a>: Contains <code>Action</code> and <code>ActivatedRule</code> </p> </li> <li> <p> <a>ActivatedRule</a>: Contains <code>Action</code>, <code>Priority</code>, <code>RuleId</code>, and <code>Type</code>. The <code>OverrideAction</code> data type within <code>ActivatedRule</code> is used only when submitting an <code>UpdateRuleGroup</code> request. <code>ActivatedRule|OverrideAction</code> is not applicable and therefore not available for <code>UpdateWebACL</code>. </p> </li> <li> <p> <a>WafAction</a>: Contains <code>Type</code> </p> </li> </ul>"
|
||||
"UpdateWebACLRequest$Updates": "<p>An array of updates to make to the <a>WebACL</a>.</p> <p>An array of <code>WebACLUpdate</code> objects that you want to insert into or delete from a <a>WebACL</a>. For more information, see the applicable data types:</p> <ul> <li> <p> <a>WebACLUpdate</a>: Contains <code>Action</code> and <code>ActivatedRule</code> </p> </li> <li> <p> <a>ActivatedRule</a>: Contains <code>Action</code>, <code>OverrideAction</code>, <code>Priority</code>, <code>RuleId</code>, and <code>Type</code>. <code>ActivatedRule|OverrideAction</code> applies only when updating or adding a <code>RuleGroup</code> to a <code>WebACL</code>. In this case you do not use <code>ActivatedRule|Action</code>. For all other update requests, <code>ActivatedRule|Action</code> is used instead of <code>ActivatedRule|OverrideAction</code>. </p> </li> <li> <p> <a>WafAction</a>: Contains <code>Type</code> </p> </li> </ul>"
|
||||
}
|
||||
},
|
||||
"XssMatchSet": {
|
||||
|
@ -1866,6 +1919,7 @@
|
|||
"WAFDisallowedNameException$message": null,
|
||||
"WAFInternalErrorException$message": null,
|
||||
"WAFInvalidOperationException$message": null,
|
||||
"WAFInvalidPermissionPolicyException$message": null,
|
||||
"WAFInvalidRegexPatternException$message": null,
|
||||
"WAFLimitsExceededException$message": null,
|
||||
"WAFNonEmptyEntityException$message": null,
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue