Skip to content

Commit 259ff2a

Browse files
author
AWS
committed
AWS WAFV2 Update: test and verified, safe to release
1 parent 065a25f commit 259ff2a

File tree

3 files changed

+13
-47
lines changed

3 files changed

+13
-47
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "AWS WAFV2",
4+
"contributor": "",
5+
"description": "test and verified, safe to release"
6+
}

services/wafv2/src/main/resources/codegen-resources/endpoint-tests.json

Lines changed: 0 additions & 44 deletions
Original file line numberDiff line numberDiff line change
@@ -754,17 +754,6 @@
754754
"UseDualStack": true
755755
}
756756
},
757-
{
758-
"documentation": "For region us-iso-east-1 with FIPS enabled and DualStack enabled",
759-
"expect": {
760-
"error": "FIPS and DualStack are enabled, but this partition does not support one or both"
761-
},
762-
"params": {
763-
"Region": "us-iso-east-1",
764-
"UseFIPS": true,
765-
"UseDualStack": true
766-
}
767-
},
768757
{
769758
"documentation": "For region us-iso-east-1 with FIPS enabled and DualStack disabled",
770759
"expect": {
@@ -778,17 +767,6 @@
778767
"UseDualStack": false
779768
}
780769
},
781-
{
782-
"documentation": "For region us-iso-east-1 with FIPS disabled and DualStack enabled",
783-
"expect": {
784-
"error": "DualStack is enabled but this partition does not support DualStack"
785-
},
786-
"params": {
787-
"Region": "us-iso-east-1",
788-
"UseFIPS": false,
789-
"UseDualStack": true
790-
}
791-
},
792770
{
793771
"documentation": "For region us-iso-east-1 with FIPS disabled and DualStack disabled",
794772
"expect": {
@@ -802,17 +780,6 @@
802780
"UseDualStack": false
803781
}
804782
},
805-
{
806-
"documentation": "For region us-isob-east-1 with FIPS enabled and DualStack enabled",
807-
"expect": {
808-
"error": "FIPS and DualStack are enabled, but this partition does not support one or both"
809-
},
810-
"params": {
811-
"Region": "us-isob-east-1",
812-
"UseFIPS": true,
813-
"UseDualStack": true
814-
}
815-
},
816783
{
817784
"documentation": "For region us-isob-east-1 with FIPS enabled and DualStack disabled",
818785
"expect": {
@@ -826,17 +793,6 @@
826793
"UseDualStack": false
827794
}
828795
},
829-
{
830-
"documentation": "For region us-isob-east-1 with FIPS disabled and DualStack enabled",
831-
"expect": {
832-
"error": "DualStack is enabled but this partition does not support DualStack"
833-
},
834-
"params": {
835-
"Region": "us-isob-east-1",
836-
"UseFIPS": false,
837-
"UseDualStack": true
838-
}
839-
},
840796
{
841797
"documentation": "For region us-isob-east-1 with FIPS disabled and DualStack disabled",
842798
"expect": {

services/wafv2/src/main/resources/codegen-resources/service-2.json

Lines changed: 7 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1261,7 +1261,7 @@
12611261
"AttributeValues":{
12621262
"type":"list",
12631263
"member":{"shape":"AttributeValue"},
1264-
"max":10,
1264+
"max":50,
12651265
"min":1
12661266
},
12671267
"BlockAction":{
@@ -5584,14 +5584,14 @@
55845584
"members":{
55855585
"Name":{
55865586
"shape":"EntityName",
5587-
"documentation":"<p>The name of the rule to override.</p> <note> <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p> </note>"
5587+
"documentation":"<p>The name of the rule to override.</p> <note> <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p> </note>"
55885588
},
55895589
"ActionToUse":{
55905590
"shape":"RuleAction",
55915591
"documentation":"<p>The override action to use, in place of the configured action of the rule in the rule group. </p>"
55925592
}
55935593
},
5594-
"documentation":"<p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p> <note> <p>Take care to verify the rule names in your overrides. If you provide a rule name that doesn't match the name of any rule in the rule group, WAF doesn't return an error and doesn't apply the override setting.</p> </note> <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>"
5594+
"documentation":"<p>Action setting to use in the place of a rule action that is configured inside the rule group. You specify one override for each rule whose action you want to change. </p> <note> <p>Verify the rule names in your overrides carefully. With managed rule groups, WAF silently ignores any override that uses an invalid rule name. With customer-owned rule groups, invalid rule names in your overrides will cause web ACL updates to fail. An invalid rule name is any name that doesn't exactly match the case-sensitive name of an existing rule in the rule group.</p> </note> <p>You can use overrides for testing, for example you can override all of rule actions to <code>Count</code> and then monitor the resulting count metrics to understand how the rule group would handle your web traffic. You can also permanently override some or all actions, to modify how the rule group manages your web traffic.</p>"
55955595
},
55965596
"RuleActionOverrides":{
55975597
"type":"list",
@@ -6450,6 +6450,10 @@
64506450
"OnSourceDDoSProtectionConfig":{
64516451
"shape":"OnSourceDDoSProtectionConfig",
64526452
"documentation":"<p>Specifies the type of DDoS protection to apply to web request data for a web ACL. For most scenarios, it is recommended to use the default protection level, <code>ACTIVE_UNDER_DDOS</code>. If a web ACL is associated with multiple Application Load Balancers, the changes you make to DDoS protection in that web ACL will apply to all associated Application Load Balancers.</p>"
6453+
},
6454+
"ApplicationConfig":{
6455+
"shape":"ApplicationConfig",
6456+
"documentation":"<p>Configures the ability for the WAF console to store and retrieve application attributes. Application attributes help WAF give recommendations for protection packs.</p> <p>When using <code>UpdateWebACL</code>, <code>ApplicationConfig</code> follows these rules:</p> <ul> <li> <p>If you omit <code>ApplicationConfig</code> from the request, all existing entries in the web ACL are retained.</p> </li> <li> <p>If you include <code>ApplicationConfig</code>, entries must match the existing values exactly. Any attempt to modify existing entries will result in an error.</p> </li> </ul>"
64536457
}
64546458
}
64556459
},

0 commit comments

Comments
 (0)